Physical Layer Security in Wireless Communications 2016
DOI: 10.1201/b15496-7
|View full text |Cite
|
Sign up to set email alerts
|

LDPC Codes for the Gaussian Wiretap Channel

Abstract: Physical Layer Security in Wireless Communications the gains that multiple antennas provide. Additional and more complete treatments of the physical layer security problem can be found in [1][2][3][4] as well as other chapters in this book.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 73 publications
(108 reference statements)
0
2
0
Order By: Relevance
“…At this point, Alice also obtained the same K as Bob's,K is the same the actual value as the K in formula (5).…”
Section: Wlan Wireless Access Protocol-based Nfc Certification Of Colmentioning
confidence: 74%
See 1 more Smart Citation
“…At this point, Alice also obtained the same K as Bob's,K is the same the actual value as the K in formula (5).…”
Section: Wlan Wireless Access Protocol-based Nfc Certification Of Colmentioning
confidence: 74%
“…The process of WLAN authentication mainly include WEP, WPA/connected wpa2-psk, WPS three [1][2][3].However, the weakness of this encryption algorithm is to collect enough IV when RC4 stream of bytes and the first byte, key can be acquired [4]. WPA / wpa2-psk authentication method is widely used, and relatively safe, however, if the users can collect in the certification of 4-way handshake packet when using methods such as dictionary attacks can crack the PSK during the waiting time [5]. On the basis of WPA / WPA2-PSK, the WPS authentication mode is put forward [6].However, this authentication system can not be obtained or rule to judge the legitimacy of PSK users.…”
Section: Introductionmentioning
confidence: 99%