参考文献
[1] Wyner A D. The Wire-tap Channel[J]. The Bell System Tech- nical Journal, 1975, 54(8): 1355-1367.
[2] Bloch M, Barros J, Rodrigues M R, et al. Wireless Information-theoretic Security[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2515-2534.
[3] Maurer U M. Secret Key Agreement by Public Discussion from Common Information[J]. IEEE Transactions on Information Theory, 1993, 39(3): 733-742.
[4] 师呜若, 姜中华. 一种无线认证密钥协商协议[J]. 计算机工程, 2009, 35(7): 142-143, 149.
[5] Hershey J E, Hassan A A, Yarlagadda R. Unconventional Cryptographic Keying Variable Management[J]. IEEE Tran- sactions on Communications, 1995, 43(1): 3-6.
[6] Liu Yanpei, Draper S C, Sayeed A M. Exploiting Channel Diversity in Secret Key Generation from Multipath Fading Randomness[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(5): 1484-1497.
[7] Kooraparty H, Hassan A A, Chennakeshu S. Secure Information Transmission for Mobile Radio[J]. IEEE Communications Letters, 2000, 4(2): 52-55.
[8] Sayeed A, Perrig A. Secure Wireless Communications: Secret Keys Through Multipath[C]//Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing. Las Vegas, USA: [s. n.], 2008: 3013-3016.
[9] Wang Qian, Su Hai, Ren Kui, et al. Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks[C]//Proc. of the 30th IEEE International Conference on Computer Communications. Shanghai, China: [s. n.], 2011: 1422-1430.
[10] Wang Qian, Xu Kaihe, Ren Kui. Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels[J]. IEEE Journal on Selected Areas in Communications, 2012, 30(9): 1666-1674.
[11] Khisti A, Diggavi S N, Wornell G W. Secret-key Generation Using Correlated Sources and Channels[J]. IEEE Transactions on Information Theory, 2012, 58(6): 652-670.
[12] Nitinawarat S, Narayan P. Secret Key Generation for Correlated Gaussian Sources[J]. IEEE Transactions on Information Theory, 2012, 58(6): 3373-3391.
编辑 任吉慧
|