메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2950-2954

Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy

Author keywords

[No Author keywords available]

Indexed keywords

ACHIEVABLE SECRECY RATES; CRYPTOGRAPHIC KEY; INFORMATION-THEORETIC SECURITY; NET GAIN; PASSIVE EAVESDROPPERS; RECEIVER IMPERFECTIONS; SECURE COMMUNICATIONS; WIRELESS CHANNEL;

EID: 84883419094     PISSN: 21578095     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2013.6620766     Document Type: Conference Paper
Times cited : (12)

References (18)
  • 3
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.1
  • 4
    • 0017973511 scopus 로고
    • Broadcast channels with condential messages
    • I. Csiszar and J. Korner, "Broadcast channels with condential messages," IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339-348, 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 5
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 733-742, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 6
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography. I. Secret sharing
    • R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography. i. secret sharing," IEEE Transactions on Information Theory, vol. 39, no. 4, pp. 1121-1132, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 9
    • 33847353721 scopus 로고    scopus 로고
    • Secret communication in presence of colluding eavesdroppers
    • S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in IEEE Military Communications Conference, 2005, pp. 1501-1506.
    • (2005) IEEE Military Communications Conference , pp. 1501-1506
    • Goel, S.1    Negi, R.2
  • 10
    • 84958598231 scopus 로고    scopus 로고
    • Unconditional security against memorybounded adversaries
    • C. Cachin and U. Maurer, "Unconditional security against memorybounded adversaries," Advances in Cryptology, pp. 292-306, 1997.
    • (1997) Advances in Cryptology , pp. 292-306
    • Cachin, C.1    Maurer, U.2
  • 11
    • 84883329227 scopus 로고    scopus 로고
    • Imft 25-nm mlc nand: Technology scaling barriers broken
    • R. Kuchibhatla, "Imft 25-nm mlc nand: technology scaling barriers broken," EE Times News and Analysis, 2010.
    • (2010) EE Times News and Analysis
    • Kuchibhatla, R.1
  • 13
    • 78149250982 scopus 로고    scopus 로고
    • A fundamental physical limit to data transmission and processing
    • S. Krone and G. Fettweis, "A fundamental physical limit to data transmission and processing," Signal Processing Letters, IEEE, vol. 17, no. 3, pp. 305-307, 2010.
    • (2010) Signal Processing Letters, IEEE , vol.17 , Issue.3 , pp. 305-307
    • Krone, S.1    Fettweis, G.2
  • 14
    • 84875711517 scopus 로고    scopus 로고
    • Exploiting the noncommutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments
    • A. Sheikholeslami, D. Goeckel, and H. Pishro-nik, "Exploiting the noncommutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments," 50th Annual Allerton Conference, pp. 233-240, 2012.
    • (2012) 50th Annual Allerton Conference , pp. 233-240
    • Sheikholeslami, A.1    Goeckel, D.2    Pishro-Nik, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.