Wireless Information-Theoretic Security
Citations
1,529 citations
Cites background from "Wireless Information-Theoretic Secu..."
...As discussed in [7], [9], [16], and [17], for many emerging applications, existing key distribution methods are difficult to exploit effectively....
[...]
1,385 citations
Cites background from "Wireless Information-Theoretic Secu..."
...…of size ; denotes a diagonal matrix with the elements of the vector along its diagonal; denotes the 2-norm of the vector ; denotes an all-zero matrix of size ; denotes the circularly symmetric, complex Gaussian distribution with mean and variance ; denotes expectation; denotes the base-2 logarithm....
[...]
1,294 citations
Cites background or methods from "Wireless Information-Theoretic Secu..."
...nel state information [189], • exploiting the level crossing rates of the fading processes...
[...]
...Bloch and coauthors [189] adopted LDPC codes and multi-level coding for the information reconciliation phase of a practical secret key agreement protocol....
[...]
1,227 citations
Cites background from "Wireless Information-Theoretic Secu..."
...[ 6 ] S. W. Golomb, “Algebraic constructions for Costas arrays,” J. Combin....
[...]
...More recently, the effect of slow fading on the secrecy capacity was studied in [4]–[ 6 ]....
[...]
942 citations
References
17,102 citations
14,980 citations
"Wireless Information-Theoretic Secu..." refers background in this paper
...Moreover, almost at the same time, Diffie and Hellman [4] published the basic principles of public-key cryptography, which was to be adopted by nearly all contemporary security schemes....
[...]
8,777 citations
"Wireless Information-Theoretic Secu..." refers background in this paper
...The theoretical basis for this information-theoretic approach, which builds on Shannon’s notion of perfect secrecy [1], was laid by Wyner [2] and later by Csiszár and Körner [3], who proved in seminal papers that there exist channel codes guaranteeing both robustness to transmission errors and a prescribed degree of data confidentiality....
[...]
8,084 citations