Computer Science ›› 2017, Vol. 44 ›› Issue (Z11): 362-365.doi: 10.11896/j.issn.1002-137X.2017.11A.076
Previous Articles Next Articles
DAI Dong-ming and WU Xiao-fu
[1] AZIMI-SADJADI B,KIAYIAS A,MERCADO A,et al.Robust key generation from signal envelopes in wireless networks[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:401-410. [2] ZHANG J,DUONG T Q,MARSHALL A,et al.Key Generation From Wireless Channels:A Review[J].IEEE Access,2016,4:614-626. [3] JANA S,PREMNATH S N,CLARK M,et al.On the effectiveness of secret key extraction from wireless signal strength in real environments[C]∥Proceedings of the 15th Annual International Conference on Mobile Computing and Networking.ACM,2009:321-332. [4] MATHUR S,TRAPPE W,MANDAYAM N,et al.Radio-tele-pathy:extracting a secret key from an unauhenticated wireless channel[C]∥Proceedings of the 14th ACM International Conference on Mobile Computing and Networking.ACM,2008:128-139. [5] SAYEED A,PERRING A.Secure wireless communications:Secret keys through multipath[C]∥2008 IEEE International Conference on Acoustics,Speech and Signal Processing.IEEE,2008:3013-3016. [6] WANG Q,SU H,REN K,et al.Fast and scalable secret key generation exploiting channel phase randomness in wireless networks[C]∥INFOCOM,2011 Proceedings IEEE.IEEE,2011:1422-1430. [7] NITINAWARAT S,YE C,BARG A,et al.Secret key generation for a pairwise independent network model[J].IEEE Transac-tions on Information Theory,2010,56(12):6482-6489. [8] YE C,REZNIK A.Group secret key generation algorithms[C]∥2007 IEEE International Symposium on Information Theory.IEEE,2007:2596-2600. [9] KIM Y,PERRING A,TSUDIK G.Tree-based group key agreement[J].ACM Transactions on Information and System Security (TISSEC),2004,7(1):60-96. [10] LIU H,WANG Y,CHEN Y,et al.Group Secret Key Generation via Received Signal Strength:Protocols,Achievable Rates,and Implementation[J].IEEE Transactions on Mobile Computing,2014,13(12):2820-2835. [11] LAI L,HO S W.Key generation algorithms for pairwise independent networks based on graphical models[J].IEEE Transactions on Information Theory,2015,61(9):4828-4837. [12] XU P,CUMANAN K,DING Z,et al.Group Secret Key Generation in Wireless Networks:Algorithms and Rate Optimization[J].IEEE Transactions on Information Forensics and Security,2016,11(8):1831-1846. [13] THAI C D T,LEE J,QUEK T Q S.Secret group key generation in physical layer for mesh topology[C]∥2015 IEEE Global Communications Conference (GLOBECOM).IEEE,2015:1-6. [14] WEI Y,ZHU C,NI J.Group Secret Key Generation Algorithm from Wireless Signal Strength[C]∥Sixth International Conferen-ce on Internet Computing for Science and Engineering.IEEE Computer Society,2012:239-245. [15] LAI L,HO S W.Simultaneously generating multiple keys and multi-commodity flow in networks[C]∥Information Theory Workshop.IEEE,2012:627-631. [16] CSISZAR I,NARAYAN P.Secrecy capacities for multiple terminals[J].IEEE Transactions on Information Theory,2004,50(12):3047-3061. [17] TSE D,VISWANATH P.Fundamentals of wireless communication[M].Cambridge university press,2005. [18] GOLDSMITH A.Wireless communications[M].Cambridge university press,2005. [19] SHANNON C E.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,28(4):656-715. [20] YE C,REZNIK A,SHAH Y.Extracting Secrecy from JointlyGaussian Random Variables[C]∥IEEE International Symposiumon Information Theory.IEEE,2006:2593-2597. [21] WILSON R,TSE D,SCHOLTZ R A.Channel Identification:Secret Sharing using Reciprocity in Ultrawideband Channels[C]∥IEEE International Conference on Ultra-Wideband.IEEE,2007:270-275. |
No related articles found! |
|