Wireless Information-Theoretic Security
DOI10.1109/TIT.2008.921908zbMATH Open1304.94096MaRDI QIDQ3604436FDOQ3604436
Authors: Matthieu Bloch, João Paulo Barros, M. R. D. Rodrigues, Steven W. McLaughlin
Publication date: 24 February 2009
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Recommendations
secrecy capacitywireless channelssecret key agreementlow-density parity-check (LDPC) codesInformation-theoretic security
Communication theory (94A05) Coding theorems (Shannon theory) (94A24) Authentication, digital signatures and secret sharing (94A62) Network protocols (68M12)
Cited In (21)
- Polarization filtering and WFRFT-based secure transmission scheme for wireless communications
- A secure MAKAP for wireless communication
- Physical layer security in light-fidelity systems
- An approach to physical layer security in MIMO wireless via vector perturbation precoding
- Coordinated beamforming for secure transmission in the downlink multicell MIMO systems
- Authentication scheme for mobile OFDM based on security information technology of physical layer over time-variant and multipath fading channels
- Toward Wireless Security without Computational Assumptions—Oblivious Transfer Based on Wireless Channel Characteristics
- Secrecy control of wireless networks with finite encoding blocklength
- An efficient scheme of quantum wireless multi-hop communication using coefficient matrix
- On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis
- Wireless-channel key exchange
- On the Secrecy Capacity of Fading Channels
- The Wire-Tap Channel
- New approach of adapttve secure transmission through flat fading channel based on three-pass protocol
- Secret key extraction algorithm for wireless channel based on K-L transform
- Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna
- Secrecy analysis for IoT relaying networks deploying NOMA with energy harvesting
- Information theoretic security
- A virtual wiretap channel for secure message transmission
- Signal-flow-based analysis of wireless security protocols
- Strong Secrecy for Wireless Channels (Invited Talk)
This page was built for publication: Wireless Information-Theoretic Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3604436)