[J]. IEEE Transactions on Information Forensics & Security, 2013, 8(11): 1731-1745. |
[2]
|
SIMMONS G J. Authentication theory/coding theory[C]// Proc of CRYPTO'84. Berlin, Heidelberg: Springer, 1985: 411-431. |
[3]
|
MAURER U M. Authentication theory and hypothesis testing[J]. IEEE Trans Inf Theory, 2000, 46(4): 1350-1356. |
[4]
|
WYNER A D. The wire-tap channel[J]. Bell Syst Tech J, 1975, 54: 1355-1387. |
[5]
|
CSISZAR I, KORNER J. Broadcast channels with confidential messages[J]. IEEE Trans Inf Theory, 1978, 24(3): 339-348. |
[6]
|
MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part I: Definitions and a completeness result[J]. IEEE Trans Inf Theory, 2003, 49(4): 822-831. |
[7]
|
MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part II: the simulatability condition[J]. IEEE Trans Inf Theory, 2003, 49(4): 832-838. |
[8]
|
MAURER U M, WOLF S. Secret-key agreement over unauthenticated public channels, part III: Privacy amplification[J]. IEEE Trans Inf Theory, 2003, 49(4): 839-851. |
[9]
|
CHEN D J, QIN Z, MAO X F, et al. Smokegrenade: an efficient key generation protocol with artificial interference |
[10]
|
CHEN D J, MAO X F, QIN Z, et al. Smokegrenade: a key generation protocol with artificial interference in wireless networks[C]//Proceedings of IEEE MASS. Hangzhou: IEEE, 2013: 200-208. |
[11]
|
KORZHIK V, YAKOVLEV V, MORALES L G, et al. Performance evaluation of keyless authentication based on noisy channel[C]//MMM-ACNS 2007. Berlin, Heidelberg: Springer-Verlag, 2007: 115-126. |
[12]
|
AHLSWEDE R, CSISZAR I. Common randomness in information theory and cryptography, part II: CR capacity [J]. IEEE Trans Inf Theory, 1998, 44(1): 225-240. |
[13]
|
LAI L F, ELGAMAL H, POOR H V. Authentication over noisy channels[J]. IEEE Trans Inf Theory, 2009, 55(2): 906-916. |
[14]
|
BARACCA P, LAURENTI N, TOMASIN S. Physical layer authentication over MIMO fading wiretap channels[J]. IEEE Transactions on Wireless Communications, 2012, 11(7): 2564-2573. |