-
1
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
4
-
-
51849084704
-
Securing wireless data networks against eavesdropping using smart antennas
-
17-20 June
-
S. Lakshmanan, C.-L. Tsao, R. Sivakumar, and K. Sundaresan, "Securing wireless data networks against eavesdropping using smart antennas," in Proc. Int. Conf. Distributed Computing Systems, 17-20 June 2008, pp. 19-27.
-
(2008)
Proc. Int. Conf. Distributed Computing Systems
, pp. 19-27
-
-
Lakshmanan, S.1
Tsao, C.-L.2
Sivakumar, R.3
Sundaresan, K.4
-
5
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
6
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
7
-
-
85036621397
-
Vulnerabilities of wireless key exchange based on channel reciprocity
-
N. Dottling, D. Lazich, J. Muller-Quade, and A. de Almeida, "Vulnerabilities of wireless key exchange based on channel reciprocity," in Information Security Applications, ser. Lecture Notes in Computer Science, 2011, vol. 6513, pp. 206-220.
-
(2011)
Information Security Applications, Ser. Lecture Notes in Computer Science
, vol.6513
, pp. 206-220
-
-
Dottling, N.1
Lazich, D.2
Muller-Quade, J.3
De Almeida, A.4
-
9
-
-
79957837002
-
On passive inference attacks against physical-layer key extraction
-
New York, NY, USA: ACM
-
M. Edman, A. Kiayias, and B. Yener, "On passive inference attacks against physical-layer key extraction," in Proc. ACM European Workshop on System Security, ser. EUROSEC '11. New York, NY, USA: ACM, 2011, pp. 8:1-8:6.
-
(2011)
Proc. ACM European Workshop on System Security, Ser. EUROSEC '11
, pp. 81-886
-
-
Edman, M.1
Kiayias, A.2
Yener, B.3
-
11
-
-
77955043386
-
MIMO-OFDM PHY Integrated (MOPI) scheme for confidential wireless transmission
-
J.-P. Cheng, Y.-H. Li, P.-C. Yeh, and C.-M. Cheng, "MIMO-OFDM PHY Integrated (MOPI) scheme for confidential wireless transmission," in Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), 2010, pp. 1-6.
-
(2010)
Proc. IEEE Wireless Comm. and Networking Conf. (WCNC)
, pp. 1-6
-
-
Cheng, J.-P.1
Li, Y.-H.2
Yeh, P.-C.3
Cheng, C.-M.4
-
13
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Springer-Verlag
-
U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Lecture Notes in Computer Science. Springer-Verlag, 2000, pp. 351-368.
-
(2000)
Lecture Notes in Computer Science
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
14
-
-
0001777508
-
Linking information reconciliation and privacy amplification
-
C. Cachin and U. Maurer, "Linking information reconciliation and privacy amplification," J. Cryptology, vol. 10, pp. 97-110, 1997. (Pubitemid 127754567)
-
(1997)
Journal of Cryptology
, vol.10
, Issue.2
, pp. 97-110
-
-
Cachin, C.1
-
15
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments," in Proc. ACM MobiCom, 2009, pp. 321-332.
-
(2009)
Proc. ACM MobiCom
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
16
-
-
0018456171
-
Universal classes of hash functions
-
April
-
J. L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Computer and System Sciences, vol. 18, no. 2, pp. 143-154, April 1979.
-
(1979)
J. Computer and System Sciences
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
17
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915- 1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.M.4
-
18
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
DOI 10.1006/dspr.1996.0023
-
A. A. Hassan, W. E. Stark, J. E. Hershey, and S. Chennakeshu, "Cryptographic key agreement for mobile radio," Digital Signal Processing, vol. 6, pp. 207-212, 1996. (Pubitemid 126395658)
-
(1996)
Digital Signal Processing: A Review Journal
, vol.6
, Issue.4
, pp. 207-212
-
-
Hassan, A.A.1
Stark, W.E.2
Hershey, J.E.3
Chennakeshu, S.4
-
19
-
-
0033881606
-
Secure information transmission for mobile radio
-
DOI 10.1109/4234.824754
-
H. Koorapaty, A. A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," IEEE Commun. Lett., vol. 4, no. 2, pp. 52-55, Feb. 2000. (Pubitemid 30564390)
-
(2000)
IEEE Communications Letters
, vol.4
, Issue.2
, pp. 52-55
-
-
Koorapaty, H.1
Hassan, A.A.2
Chennakeshu, S.3
-
20
-
-
39049156464
-
Extracting secrecy from jointly Gaussian random variables
-
DOI 10.1109/ISIT.2006.262101, 4036441, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly Gaussian random variables," in Proc. IEEE Int. Symp. Information Theory, July 2006, pp. 2593-2597. (Pubitemid 351244572)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
-
21
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
22
-
-
77951552840
-
Secrecy extraction from increased randomness in a time-variant MIMO channel
-
Dec.
-
C. Chen and M. A. Jensen, "Secrecy extraction from increased randomness in a time-variant MIMO channel," in Proc. IEEE GLOBECOM, Dec. 2009, pp. 1-6.
-
(2009)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Chen, C.1
Jensen, M.A.2
-
23
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
June
-
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam, "Information-theoretically secret key generation for fading wireless channels," IEEE Trans. Inf. Forens. Security, vol. 5, no. 2, pp. 240- 254, June 2010.
-
(2010)
IEEE Trans. Inf. Forens. Security
, vol.5
, Issue.2
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.B.6
-
25
-
-
51449114762
-
Secure wireless communications: Secret keys through multipath
-
April
-
A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in Proc. IEEE ICASSP, April 2008, pp. 3013-3016.
-
(2008)
Proc. IEEE ICASSP
, pp. 3013-3016
-
-
Sayeed, A.1
Perrig, A.2
-
26
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
DOI 10.1109/TIFS.2007.902666
-
R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inf. Forens. Security, vol. 2, no. 3, pp. 364-375, Sept. 2007. (Pubitemid 47290572)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
27
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
Jan
-
N. Patwari, J. Croft, S. Jana, and S. K. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," IEEE Trans. Mobile Comput., vol. 9, no. 1, pp. 17-30, Jan. 2010.
-
(2010)
IEEE Trans. Mobile Comput.
, vol.9
, Issue.1
, pp. 17-30
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, S.K.4
-
28
-
-
84860686731
-
Secret key establishment using temporally and spatially correlated wireless channel coefficients
-
Feb
-
C. Chen and M. A. Jensen, "Secret key establishment using temporally and spatially correlated wireless channel coefficients," IEEE Trans. Mobile Comput., vol. 10, no. 2, pp. 205-215, Feb. 2011.
-
(2011)
IEEE Trans. Mobile Comput.
, vol.10
, Issue.2
, pp. 205-215
-
-
Chen, C.1
Jensen, M.A.2
-
29
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
DOI 10.1109/TAP.2005.858853
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Trans. Antennas Propag., vol. 53, no. 11, pp. 3776-3784, Nov. 2005. (Pubitemid 41748822)
-
(2005)
IEEE Transactions on Antennas and Propagation
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
31
-
-
84862838196
-
Experimental assessment of secret key generation using parasitic reconfigurable apertures
-
Experimental assessment of secret key generation using parasitic reconfigurable apertures, in European Conference on Antennas and Propagation, 2012.
-
(2012)
European Conference on Antennas and Propagation
-
-
-
32
-
-
0242334025
-
Grassmannian beamforming for multiple-input multiple-output wireless systems
-
Oct
-
D. J. Love, R. W. Heath Jr., and T. Strohmer, "Grassmannian beamforming for multiple-input multiple-output wireless systems," IEEE Trans. Inf. Theory, vol. 49, no. 10, pp. 2735-2747, Oct. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.10
, pp. 2735-2747
-
-
Love, D.J.1
Heath Jr., R.W.2
Strohmer, T.3
-
33
-
-
0019009028
-
Singular value decomposition: Its computation and some applications
-
V. Klema and A. Laub, "The singular value decomposition: Its computation and some applications," IEEE Trans. Autom. Control, vol. 25, no. 2, pp. 164-176, April 1980. (Pubitemid 10475293)
-
(1980)
IEEE Transactions on Automatic Control
, vol.AC-25
, Issue.2
, pp. 164-176
-
-
Klema Virginia, C.1
Laub Alan, J.2
-
34
-
-
23844475192
-
Limited feedback unitary precoding for spatial multiplexing systems
-
DOI 10.1109/TIT.2005.850152
-
D. J. Love and R. W. Heath Jr., "Limited feedback unitary precoding for spatial multiplexing systems," IEEE Trans. Inf. Theory, vol. 51, no. 8, pp. 2967-2976, Aug. 2005. (Pubitemid 41158620)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.8
, pp. 2967-2976
-
-
Love, D.J.1
Heath Jr., R.W.2
-
35
-
-
0842310888
-
Limited feedback precoding for spatial multiplexing systems
-
Dec.
-
], "Limited feedback precoding for spatial multiplexing systems," in Proc. IEEE GLOBECOM, vol. 4, Dec. 2003, pp. 1857-1861.
-
(2003)
Proc. IEEE GLOBECOM
, vol.4
, pp. 1857-1861
-
-
-
36
-
-
67349139858
-
LTE: The evolution of mobile broadband
-
Apr
-
D. Astely, E. Dahlman, A. Furuskar, Y. Jading, M. Lindstrom, and S. Parkvall, "LTE: the evolution of mobile broadband," IEEE Commun. Mag., vol. 47, no. 4, pp. 44-51, Apr. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.4
, pp. 44-51
-
-
Astely, D.1
Dahlman, E.2
Furuskar, A.3
Jading, Y.4
Lindstrom, M.5
Parkvall, S.6
-
37
-
-
33947101967
-
Interpolation based unitary preceding for spatial multiplexing MIMO-OFDM with limited feedback
-
DOI 10.1109/TSP.2006.881251
-
J. Choi, B. Mondal, and R. W. Heath Jr., "Interpolation based unitary precoding for spatial multiplexing MIMO-OFDM with limited feedback," IEEE Trans. Signal Process., vol. 54, no. 12, pp. 4730-4740, Dec. 2006. (Pubitemid 46405614)
-
(2006)
IEEE Transactions on Signal Processing
, vol.54
, Issue.12
, pp. 4730-4740
-
-
Choi, J.1
Mondal, B.2
Heath Jr., R.W.3
-
39
-
-
0006932810
-
Common information is far less than mutual information
-
P. Gacs and J. Korner, "Common information is far less than mutual information," Probl. Inform. Control, vol. 2, no. 2, pp. 149-162, 1973.
-
(1973)
Probl. Inform. Control
, vol.2
, Issue.2
, pp. 149-162
-
-
Gacs, P.1
Korner, J.2
-
40
-
-
77955667690
-
Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis
-
Sept.
-
J. Wallace and R. Sharma, Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis, IEEE Trans. Inf. Forensics Security, Sept. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
-
-
Wallace, J.1
Sharma, R.2
-
41
-
-
0001454616
-
Asymptotic freeness almost everywhere for random matrices
-
F. Hiai and D. Petz, "Asymptotic freeness almost everywhere for random matrices," Acta Sci. Math. Szeged, vol. 66, pp. 801-826, 2000.
-
(2000)
Acta Sci. Math. Szeged
, vol.66
, pp. 801-826
-
-
Hiai, F.1
Petz, D.2
-
44
-
-
51249118442
-
Practical codebook design for limited feedback spatial multiplexing
-
May
-
B. Clerckx, Y. Zhou, and S. Kim, "Practical codebook design for limited feedback spatial multiplexing," in Proc. IEEE Int. Conf. on Comm., May 2008, pp. 3982-3987.
-
(2008)
Proc. IEEE Int. Conf. on Comm.
, pp. 3982-3987
-
-
Clerckx, B.1
Zhou, Y.2
Kim, S.3
-
45
-
-
1242321146
-
Signal correlation including antenna coupling
-
Feb
-
A. Derneryd and G. Kristensson, "Signal correlation including antenna coupling," Electronics Letters, vol. 40, no. 3, pp. 157-159, Feb. 2004.
-
(2004)
Electronics Letters
, vol.40
, Issue.3
, pp. 157-159
-
-
Derneryd, A.1
Kristensson, G.2
-
46
-
-
33947103220
-
Mutual coupling effect on thermal noise in multi-antenna wireless communication systems
-
DOI 10.1109/AUSCTW.2005.1624253, 1624253, Proceedings 6th Australian Communications Theory Workshop 2005
-
S. Krusevac, P. B. Rapajic, R. A. Kennedy, and P. Sadeghi, "Mutual coupling effect on thermal noise in multi-antenna wireless communication systems," in Proc. Communications Theory Workshop, Feb. 2005, pp. 209-214. (Pubitemid 46402043)
-
(2005)
Proceedings 6th Australian Communications Theory Workshop 2005
, vol.2005
, pp. 209-214
-
-
Krusevac, S.1
Rapajic, P.B.2
Kennedy, R.A.3
Sadeghi, P.4
|