Wireless Information-Theoretic Security - Part II: Practical Implementation (original) (raw)

Wireless Information-Theoretic Security

João Barros

IEEE Transactions on Information Theory, 2008

View PDFchevron_right

Information-Theoretic Security for Wireless Channels: Theory and Practice

João Barros

Proc. Inform. Theory and …

View PDFchevron_right

Secure Communications over Wireless Networks

Islam Sarkar

Future Generations, 2012

View PDFchevron_right

Wireless Information-Theoretic Security - Part I: Theoretical Aspects

joao barros

Computing Research Repository, 2006

View PDFchevron_right

Secure Communications over Wireless Channels

Praveen Gopala

2007

View PDFchevron_right

The Two Way Wiretap Channel: Theory and Practice

Ali Gamal

Computing Research Repository, 2010

View PDFchevron_right

Secret Key Agreement Using Conferencing in State-Dependent Multiple Access Channels with An Eavesdropper

Ali Bereyhi

View PDFchevron_right

On the Ergodic Secret-Key Agreement over Spatially Correlated Multiple-Antenna Channels with Public Discussion

Eduard Jorswieck

IEEE Transactions on Signal Processing, 2016

View PDFchevron_right

On the secrecy capacity of fading Gaussian wiretap channel

K. Hossan

2015 IEEE 14th Canadian Workshop on Information Theory (CWIT), 2015

View PDFchevron_right

An Improved Key-Agreement Protocol for Channels with Small Error Rate

Chin-Laung Lei

Journal of Internet Technology, 2019

View PDFchevron_right

Security gap assessment for the fast fading wiretap channel

Franco Chiaraluce

ICT 2013, 2013

View PDFchevron_right

Channel model and sounding method effects on wireless secret key rates

Andrew Harper

2012 IEEE Conference on Technologies for Homeland Security (HST), 2012

View PDFchevron_right

On the Secrecy Capacity of Fading Channels

Praveen Gopala

IEEE Transactions on Information Theory, 2000

View PDFchevron_right

Semantic Security with Practical Transmission Schemes over Fading Wiretap Channels

Franco Chiaraluce

Entropy, 2017

View PDFchevron_right

The Two-Way Wiretap Channel: Achievable Regions and Experimental Results

Ali Gamal

2010

View PDFchevron_right

Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel

HONG XING

View PDFchevron_right

Secure communication over radio channels

Shlomi Dolev

Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing - PODC '08, 2008

View PDFchevron_right

A Virtual Wiretap Channel for Secure Message Transmission

Setareh Sharifian

Lecture Notes in Computer Science, 2017

View PDFchevron_right

Secure Transmission of Delay-Sensitive Data over Wireless Fading Channels

Mustafa Meliksah Ozmen

IEEE Transactions on Information Forensics and Security, 2017

View PDFchevron_right

Reliable and perfectly secret communication over the generalized Ozarow-Wyner’s wire-tap channel

stefano guarino

Computer Networks, 2016

View PDFchevron_right

Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis

Franco Chiaraluce

IEEE Transactions on Information Forensics and Security, 2000

View PDFchevron_right

Power Allocation Scheme for Secret KeyGeneration in Wireless Communication

Ridha soua

IET Communications

View PDFchevron_right

New results on Secret Key Establishment over a pair of broadcast channels

Hadi Ahmadi

2010 International Symposium On Information Theory & Its Applications, 2010

View PDFchevron_right

Channel level crossing-based security for communications over fading channels

George Karagiannidis

IET Information Security, 2013

View PDFchevron_right

Combining artificial noise beam forming and concatenated coding schemes to effectively secure wireless communications

Nir Shapira

Analog Integrated Circuits and Signal Processing, 2017

View PDFchevron_right

SECURED KEY EXCHANGE BY INFORMATION RECONCILIATION AND PRIVACY AMPLIFICATION USING RECEIVED SIGNAL STRENGTH

Editor IJRET

View PDFchevron_right

Physical characteristics of wireless communication channels for secret key establishment: A survey of the research

Mirko Bottarelli

Computers & Security, 2018

View PDFchevron_right

A tight estimation of the security gap over the fast fading wiretap channel

Franco Chiaraluce

2013

View PDFchevron_right