相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Privacy, Secrecy, and Storage With Nested Randomized Polar Subcode Constructions
Onur Guenlue et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2022)
Channel State Information-Based Cryptographic Key Generation for Intelligent Transportation Systems
Soheyb Ribouh et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)
Quantum PUF for Security and Trust in Quantum Computing
Koustubh Phalak et al.
IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS (2021)
Physical Layer Security Enhancement With Reconfigurable Intelligent Surface-Aided Networks
Jiayi Zhang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Robust Key Generation With Hardware Mismatch for Secure MIMO Communications
Guyue Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing
Chao Lin et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Alternative Codes and Phase Rotation Extensions for Alternating Space-Time Coding-Based Physical Layer Security
Michael R. Cribbs et al.
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY (2021)
Physical Layer Security Aided Wireless Interference Networks in the Presence of Strong Eavesdropper Channels
Zhichao Sheng et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Physical Layer Secure MIMO Communications Against Eavesdroppers With Arbitrary Number of Antennas
Jie Tang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Physical-Layer Authentication Using Multiple Channel-Based Features
Ning Xie et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Physical Layer based Message Authentication with Secure Channel Codes
Dajiang Chen et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
Key and Message Semantic-Security Over State-Dependent Channels
Alexander Bunin et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Constant Modulus Secure Beamforming for Multicast Massive MIMO Wiretap Channels
Qiang Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Physical Layer Authentication for Non-Coherent Massive SIMO-Enabled Industrial IoT Communications
Zhifang Gu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Physical Layer Secret Key Generation in Static Environments
Nasser Aldaghri et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Generating a Binary Symmetric Channel for Wiretap Codes
Willie K. Harrison et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security
Dajiang Chen et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)
Keyless Authentication and Authenticated Capacity
Wenwen Tu et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2018)
Secure Degrees of Freedom of the Gaussian Diamond-Wiretap Channel
Si-Hyeon Lee et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2017)
A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance
Lingxiang Li et al.
IEEE SIGNAL PROCESSING LETTERS (2016)
Secret-Key Agreement Over Non-Coherent Block-Fading Channels With Public Discussion
Ashish Khisti
IEEE TRANSACTIONS ON INFORMATION THEORY (2016)
Secure Broadcasting With Imperfect Channel State Information at the Transmitter
Amal Hyadi et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)
On the Optimality of Keyless Authentication in a Noisy Model
Shaoquan Jiang
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Keyless Authentication in a Noisy Model
Shaoquan Jiang
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)
Physical Layer Authentication over MIMO Fading Wiretap Channels
Paolo Baracca et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2012)
Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes
Arunkumar Subramanian et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)
Authentication Over Noisy Channels
Lifeng Lai et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2009)
Information theoretic bounds on authentication systems in query model
Reihaneh Safavi-Naini et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2008)
Authentication theory and hypothesis testing
UM Maurer
IEEE TRANSACTIONS ON INFORMATION THEORY (2000)