-
1
-
-
84969778370
-
-
arXiv preprint, arXiv: 1310. 3902
-
D. Chen, S. Jiang, Z. Qin, "Rate Efficient Authentication over aWiretap Channel", arXiv preprint, arXiv: 1310. 3902, 2013.
-
(2013)
Rate Efficient Authentication over AWiretap Channel
-
-
Chen, D.1
Jiang, S.2
Qin, Z.3
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
84864117726
-
Physical layer authentication over MIMO fading wiretap channels
-
July
-
P. Baracca, N. Laurenti, and S. Tomasin, "Physical Layer Authentication over MIMO Fading Wiretap Channels", IEEE Transactions on Wireless Communications, vol. 11, no. 7, pp. 2564-2573, July 2012.
-
(2012)
IEEE Transactions on Wireless Communications
, vol.11
, Issue.7
, pp. 2564-2573
-
-
Baracca, P.1
Laurenti, N.2
Tomasin, S.3
-
4
-
-
84885016494
-
Performance evaluation of keyless authentication based on noisy channel
-
V. Gorodetsky, I. Kotenko and V. A. Skormin (Eds.), Springer-Verlag, Heidelberg
-
V. Korzhik, V. Yakovlev, G. M. Luna, R. Chesnokov, "Performance Evaluation of Keyless Authentication Based on Noisy Channel", MMM-ACNS 2007, CCIS 1, V. Gorodetsky, I. Kotenko and V. A. Skormin (Eds.), Springer-Verlag, Heidelberg, pp. 115-126, 2007.
-
(2007)
MMM-ACNS 2007 CCIS 1
, pp. 115-126
-
-
Korzhik, V.1
Yakovlev, V.2
Luna, G.M.3
Chesnokov, R.4
-
5
-
-
84927145316
-
-
arXiv: 1303. 0707v1
-
A. Ferrante, N. Laurenti, C. Masiero, M. Pavon, and S. Tomasin, "On the Achievable Error Region of Physical Layer Authentication Techniques over Rayleigh Fading Channels", arXiv: 1303. 0707v1
-
On the Achievable Error Region of Physical Layer Authentication Techniques over Rayleigh Fading Channels
-
-
Ferrante, A.1
Laurenti, N.2
Masiero, C.3
Pavon, M.4
Tomasin, S.5
-
7
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár, et al., "Broadcast channels with confidential messages", IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
-
8
-
-
33750056552
-
Almost independence and secrecy capacity
-
Jan.
-
I. Csiszár, "Almost independence and secrecy capacity", Probl. Inf. Transm., vol. 32, pp. 40-47, Jan. 1996.
-
(1996)
Probl. Inf. Transm.
, vol.32
, pp. 40-47
-
-
Csiszár, I.1
-
9
-
-
0031701886
-
Common randomness in information theory and cryptography, Part II: CR capacity
-
Jan.
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part II: CR capacity", IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 225-240, Jan. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.1
, pp. 225-240
-
-
Ahlswede, R.1
Csiszár, I.2
-
11
-
-
84983269168
-
Authentication theory/coding theory
-
LNCS
-
G. J. Simmons, "Authentication theory/coding theory", Proc. CRYPTO'84, vol. LNCS-196, pp. 411-431, 1985.
-
(1985)
Proc. CRYPTO'84
, vol.196
, pp. 411-431
-
-
Simmons, G.J.1
-
12
-
-
0034228863
-
Authentication theory and hypothesis testing
-
U. M. Maurer, "Authentication theory and hypothesis testing", IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1350-1356, 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1350-1356
-
-
Maurer, U.M.1
-
13
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result
-
U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result", IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.M.1
Wolf, S.2
-
14
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels II: The simulatability condition
-
U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels II: The simulatability condition", IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 832-838
-
-
Maurer, U.M.1
Wolf, S.2
-
15
-
-
0037396951
-
Secret-key agreement over unauthenticated publicchannels-Part III: Privacy amplification
-
U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated publicchannels-Part III: Privacy amplification", IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 832-838
-
-
Maurer, U.M.1
Wolf, S.2
-
16
-
-
84863913546
-
Physical-Layer secrecy for OFDM transmissions over fading channels
-
F. Renna, N. Laurenti, H. V. Poor, "Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels, " IEEE Trans. on Inform. Forens. and Security, vol. 7, no. 4, pp. 1354-1367, 2012.
-
(2012)
IEEE Trans. on Inform. Forens. and Security
, vol.7
, Issue.4
, pp. 1354-1367
-
-
Renna, F.1
Laurenti, N.2
Poor, H.V.3
-
17
-
-
0018456171
-
Universal classes of hash functions
-
J. L. Carter, et al., "Universal classes of hash functions", Journal of computer and system sciences, vol. 18, no. 2, pp. 143-154, 1979.
-
(1979)
Journal of Computer and System Sciences
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, J.L.1
-
18
-
-
0000410707
-
Universal hashing and authentication codes
-
D. R. Stinson, "Universal hashing and authentication codes", Designs, Codes, Cryptogr., vol. 4, no. 3, pp. 369-380 1994.
-
(1994)
Designs, Codes, Cryptogr.
, vol.4
, Issue.3
, pp. 369-380
-
-
Stinson, D.R.1
-
19
-
-
61349140043
-
Authentication over noisy channels
-
Feb. 2009
-
L. Lai, H. ElGamal, et al., "Authentication Over Noisy Channels", IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 906-916, Feb. 2009
-
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 906-916
-
-
Lai, L.1
ElGamal, H.2
|