共 20 条
[2]
[Anonymous], 2006, Elements of Information Theory
[3]
Boyd S., 2004, CONVEX OPTIMIZATION, VFirst, DOI DOI 10.1017/CBO9780511804441
[4]
Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness
[J].
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY,
2010,
:2518-2522
[5]
Khisti A., 2012, P ALL C COMM CONTR C, P1
[6]
Kraskov A, 2004, PHYS REV E, V69, DOI 10.1103/PhysRevE.69.066138
[9]
Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel
[J].
MOBICOM'08: PROCEEDINGS OF THE FOURTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING,
2008,
:128-+
[10]
MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484