Analysis of Secret Key Randomness Exploiting the Radio Channel Variability, International Journal of Antennas and Propagation, vol.2015, 2015. ,
DOI : 10.1109/25.282271
URL : https://hal.archives-ouvertes.fr/hal-01354008
A disc of scatterers based radio channel model for secure key generation, EUCAP, The Hague, Netherlands, Conference papers, pp.1290-1294, 2014. ,
Towards a key-free radio protocol for authentication and security of nodes and terminals in advanced waveforms, 2015. ,
Ray tracing simulations of indoor channel spatial correlation for physical layer security, EUCAP, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01188298
Analysis of secret key robustness in indoor radio channel measurements, VTC-spring, 2015. ,
Tag signals for early authentication and secret key generation in wireless public networks, EuCNC, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01188310
Secret key generation scheme from WIFI and LTE reference signals COST meeting presentations [TD.1] T. Mazloum, F. Mani, and A. Sibille, A disc of scatterers based radio channel model for secure key generation, p.9017, 2013. ,
Ray tracing simulations of indoor channel spatial correlation for physical layer security, TD(13) 08072, COST IC1004, 2014. ,
Winner ii channel model, 2007. ,
The Wire-Tap Channel, Bell System Technical Journal, vol.54, issue.8, pp.1355-1367, 1975. ,
DOI : 10.1002/j.1538-7305.1975.tb02040.x
Physical-layer security: From information theory to security engineering, 2011. ,
DOI : 10.1017/CBO9780511977985
Cryptography and Network Security: Principles and Practice, 2005. ,
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Wireless Information-Theoretic Security, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2515-2534, 2008. ,
DOI : 10.1109/TIT.2008.921908
Applications of LDPC Codes to the Wiretap Channel, IEEE Transactions on Information Theory, vol.53, issue.8, pp.2933-2945, 2007. ,
DOI : 10.1109/TIT.2007.901143
URL : https://hal.archives-ouvertes.fr/hal-00336754
Providing secrecy with lattice codes, 2008 46th Annual Allerton Conference on Communication, Control, and Computing, pp.1199-1206, 2008. ,
DOI : 10.1109/ALLERTON.2008.4797696
Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes, IEEE Transactions on Information Theory, vol.57, issue.10, pp.6428-6443, 2011. ,
DOI : 10.1109/TIT.2011.2162275
Physical layer security of mimoofdm systems by beamforming and artificial noise generation, Physical Communication on Advances in MIMO-OFDM, pp.313-321, 2011. ,
Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches, IEEE Signal Processing Magazine, vol.30, issue.5, pp.29-40, 2013. ,
DOI : 10.1109/MSP.2013.2256953
Secret communication using artificial noise, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005., pp.1906-1910, 2005. ,
DOI : 10.1109/VETECF.2005.1558439
STROBE: Actively securing wireless communications using Zero-Forcing Beamforming, 2012 Proceedings IEEE INFOCOM, pp.720-728, 2012. ,
DOI : 10.1109/INFCOM.2012.6195817
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, vol.39, issue.3, pp.733-742, 1993. ,
DOI : 10.1109/18.256484
Common randomness in information theory and cryptography. I. Secret sharing, IEEE Transactions on Information Theory, vol.39, issue.4, pp.1121-1132, 1993. ,
DOI : 10.1109/18.243431
Quantum cryptography: Public key distribution and coin tossing, Int. conf. on computers, systems and signal processing, pp.175-179, 1984. ,
DOI : 10.1016/j.tcs.2014.05.025
Quantum cryptography based on Bell???s theorem, Physical Review Letters, vol.67, issue.6, 1991. ,
DOI : 10.1103/PhysRevLett.67.661
Cryptographic Key Agreement for Mobile Radio, Digital Signal Processing, vol.6, issue.4, pp.207-212, 1996. ,
DOI : 10.1006/dspr.1996.0023
Unconventional cryptographic keying variable management, IEEE Transactions on Communications, vol.43, issue.1, pp.3-6, 1995. ,
DOI : 10.1109/26.385951
Analysis of Secret Key Robustness in Indoor Radio Channel Measurements, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), 2015. ,
DOI : 10.1109/VTCSpring.2015.7145702
URL : https://hal.archives-ouvertes.fr/hal-01194191
Analysis of Secret Key Randomness Exploiting the Radio Channel Variability, International Journal of Antennas and Propagation, vol.2015, p.2015 ,
DOI : 10.1109/25.282271
URL : https://hal.archives-ouvertes.fr/hal-01354008
Performance of secret key generation in non stationary channels, Proc. 2015 9th Europ. Conf. Antennas and Propagation (EuCAP'15), 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01188291
The theory of sound, 1896. ,
The theorem of poynting concerning the energy in the electromagnetic field and two general propositions concerning the propagation of light, Amsterdammer Akademie der Wetenschappen, vol.4, pp.176-1896 ,
Transceiver design and performance evaluation of MIMO systems with forward link channel knowledge, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004, pp.1386-1390, 2004. ,
DOI : 10.1109/VETECF.2004.1400251
Secret Key Extraction from Wireless Signal Strength in Real Environments, IEEE Transactions on Mobile Computing, vol.12, issue.5, pp.917-930, 2013. ,
DOI : 10.1109/TMC.2012.63
Empirical analysis of UWB channel characteristics for secret key generation in indoor environments, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp.1984-1989, 2010. ,
DOI : 10.1109/PIMRC.2010.5671596
Non-reciprocal transceivers in OFDM/SDMA systems: Impact and mitigation, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings, pp.183-186, 2003. ,
DOI : 10.1109/RAWCON.2003.1227923
Relative channel reciprocity calibration in mimo/tdd systems, Proc. 2010 Future Network and Mobile Summit, pp.1-10, 2010. ,
Lowcomplexity calibration of mutually coupled non-reciprocal multi-antenna ofdm transceivers, 7th IEEE Intl. Symp. on Wireless Commun. Sys. (ISWCS), p.285289, 2010. ,
Assessing and removing the impact of nonreciprocal transceiver circuitry for channel-based key establishment, Proc. 9th European Conf. on Antennas and Propagation (EuCAP), 2015. ,
The potential approaches to achieve channel reciprocity in FDD system with frequency correction algorithms, Proceedings of the 5th International ICST Conference on Communications and Networking in China, pp.1-5, 2010. ,
DOI : 10.4108/chinacom.2010.154
Wireless Communications, 2005. ,
Correlation model for shadow fading in mobile radio systems, Electronics Letters, vol.27, issue.23, pp.2145-2146, 1991. ,
DOI : 10.1049/el:19911328
First- and second-order characterization of direction dispersion and space selectivity in the radio channel, IEEE Transactions on Information Theory, vol.46, issue.6, pp.2027-2044, 2000. ,
DOI : 10.1109/18.868476
Basic relationship between multipath angular spread and narrowband fading in wireless channels, Electronics Letters, vol.34, issue.25, pp.2431-2432, 1998. ,
DOI : 10.1049/el:19981689
Experimental Characterization and Modeling of Outdoor-to-Indoor and Indoor-to-Indoor Distributed Channels, IEEE Transactions on Vehicular Technology, vol.59, issue.5, pp.2253-2265, 2010. ,
DOI : 10.1109/TVT.2010.2042475
Survey of Channel and Radio Propagation Models for Wireless MIMO Systems, EURASIP Journal on Wireless Communications and Networking, vol.2007, issue.1, 2007. ,
DOI : 10.1109/LCOMM.2003.815655
On the Security of UWB Secret Key Generation Methods against Deterministic Channel Prediction Attacks, 2012 IEEE Vehicular Technology Conference (VTC Fall), pp.1-5, 2012. ,
DOI : 10.1109/VTCFall.2012.6399358
URL : https://hal.archives-ouvertes.fr/hal-00747839
Ray tracing simulations of indoor channel spatial correlation for physical layer security, Proc. 2019 9th Europ. Conf. Antennas and Propagation (EuCAP'15), pp.1-5, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01188298
An advanced field prediction model including diffuse scattering, IEEE Transactions on Antennas and Propagation, vol.52, issue.7, pp.1717-1728, 2004. ,
DOI : 10.1109/TAP.2004.831299
The COST 2100 MIMO channel model, IEEE Wireless Communications, vol.19, issue.6, pp.92-99, 2012. ,
DOI : 10.1109/MWC.2012.6393523
A Statistical Model for Indoor Multipath Propagation, IEEE Journal on Selected Areas in Communications, vol.5, issue.2, pp.128-137, 1987. ,
DOI : 10.1109/JSAC.1987.1146527
Modeling the indoor MIMO wireless channel, IEEE Transactions on Antennas and Propagation, vol.50, issue.5, pp.591-599, 2002. ,
DOI : 10.1109/TAP.2002.1011224
What Makes a Good MIMO Channel Model?, 2005 IEEE 61st Vehicular Technology Conference, pp.156-160, 2005. ,
DOI : 10.1109/VETECS.2005.1543269
A stochastic MIMO channel model with joint correlation of both link ends, IEEE Transactions on Wireless Communications, vol.5, issue.1, pp.90-100, 2006. ,
DOI : 10.1109/TWC.2006.1576533
Modeling, analysis, and simulation of MIMO mobile-to-mobile fading channels, IEEE Transactions on Wireless Communications, vol.7, issue.2, pp.510-520, 2008. ,
DOI : 10.1109/TWC.2008.05913
A non-stationary one-ring scattering model, 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp.2620-2625, 2013. ,
DOI : 10.1109/WCNC.2013.6554975
A geometry-based stochastic MIMO model for vehicle-to-vehicle communications, IEEE Transactions on Wireless Communications, vol.8, issue.7, pp.3646-3657, 2009. ,
DOI : 10.1109/TWC.2009.080753
Non-Stationary Narrowband MIMO Inter-Vehicle Channel Characterization in the 5-GHz Band, IEEE Transactions on Vehicular Technology, vol.59, issue.4, pp.2007-2015, 2010. ,
DOI : 10.1109/TVT.2010.2040851
A general correlation model for shadow fading in mobile radio systems, IEEE Communications Letters, vol.6, issue.3, pp.102-104, 2002. ,
DOI : 10.1109/4234.991146
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels, IEEE Transactions on Antennas and Propagation, vol.53, issue.11, pp.3776-3784, 2005. ,
DOI : 10.1109/TAP.2005.858853
Reliable symmetric key generation for body area networks using wireless physical layer security in the presence of an on-body eavesdropper, Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL '11, pp.1-6, 2011. ,
DOI : 10.1145/2093698.2093851
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010. ,
DOI : 10.1109/INFCOM.2010.5462004
Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis, IEEE Trans. Inform. Forensics and Security, vol.5, pp.381-392, 2010. ,
Robust uncorrelated bit extraction methodologies for wireless sensors, Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN '10, pp.70-81, 2010. ,
DOI : 10.1145/1791212.1791222
Radio-telepathy, Proceedings of the 14th ACM international conference on Mobile computing and networking, MobiCom '08, pp.128-139, 2008. ,
DOI : 10.1145/1409944.1409960
Information-theoretically secret key generation for fading wireless channels, IEEE Trans. Information Forensics and Security, vol.5, pp.240-254, 2010. ,
Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients, IEEE Transactions on Mobile Computing, vol.10, issue.2, pp.205-215, 2011. ,
DOI : 10.1109/TMC.2010.114
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels, IEEE Transactions on Information Forensics and Security, vol.2, issue.3, pp.364-375, 2007. ,
DOI : 10.1109/TIFS.2007.902666
Verification of secret key generation from uwb channel observations, Proc. 2009 IEEE Int. Conf. Communications (ICC'09), pp.1-5, 2009. ,
Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness, IEEE Transactions on Information Forensics and Security, vol.7, issue.5, pp.1484-1497, 2012. ,
DOI : 10.1109/TIFS.2012.2206385
Polar coding for secret-key generation, Proc. 2013 IEEE Information Theory Workshop (ITW), pp.1-5, 2013. ,
Secret-key agreement over unauthenticated public channels-part III: privacy amplification, IEEE Transactions on Information Theory, vol.49, issue.4, pp.839-851, 2003. ,
DOI : 10.1109/TIT.2003.809559
Analysis of Alice-Bob-Eve scenarios for secret key generation from random channels, 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS), pp.1-4, 2014. ,
DOI : 10.1109/URSIGASS.2014.6929292
Tag signals for early authentication and Secret Key Generation in wireless public networks, 2015 European Conference on Networks and Communications (EuCNC), 2015. ,
DOI : 10.1109/EuCNC.2015.7194050
URL : https://hal.archives-ouvertes.fr/hal-01188310
Active and passive eavesdropper threats within public and private cililian networks -existing and potential future countermeasures -an overview, 2013. ,
Extracting Secrecy from Jointly Gaussian Random Variables, 2006 IEEE International Symposium on Information Theory, pp.2593-2597, 2006. ,
DOI : 10.1109/ISIT.2006.262101
A disc of scatterers based radio channel model for secure key generation, The 8th European Conference on Antennas and Propagation (EuCAP 2014), pp.1290-1294, 2014. ,
DOI : 10.1109/EuCAP.2014.6902012
Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios, 6th Annual Communication Networks and Services Research Conference (cnsr 2008), pp.88-95, 2008. ,
DOI : 10.1109/CNSR.2008.52
Secret key capacity for wireless nakagami and suzuki fading channels, Int. Journal of Computer Science and Network Security (IJCSNS), vol.7, issue.3, pp.296-303, 2007. ,
Random patterns of secret keys from sampled IR-UWB channel responses, 2014 IEEE International Conference on Ultra-WideBand (ICUWB), pp.74-79, 2014. ,
DOI : 10.1109/ICUWB.2014.6958954
URL : https://hal.archives-ouvertes.fr/hal-01127769
Secure wireless communications: Secret keys through multipath, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.3013-3016, 2008. ,
DOI : 10.1109/ICASSP.2008.4518284
Bit error rate and efficiency analysis of wireless reciprocal channel key generation, 2010 IEEE International Conference on Wireless Information Technology and Systems, pp.1-4, 2010. ,
DOI : 10.1109/ICWITS.2010.5612262
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements, 2009 3rd International Conference on New Technologies, Mobility and Security, pp.1-5, 2009. ,
DOI : 10.1109/NTMS.2009.5384826
Experimental aspects of secret key generation in indoor wireless environments, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC), pp.669-673, 2013. ,
DOI : 10.1109/SPAWC.2013.6612134
Secret key generation exploiting antenna beam steering and wave propagation reciprocity, 2005 European Microwave Conference, pp.9-12, 2005. ,
DOI : 10.1109/EUMC.2005.1608780
Experimental assessment of secret key generation using parasitic reconfigurable aperture antennas, 2012 6th European Conference on Antennas and Propagation (EUCAP), pp.1151-1155, 2012. ,
DOI : 10.1109/EuCAP.2012.6206173
Fast secret key generation in static wireless networks: A virtual channel approach, 2013 Proceedings IEEE INFOCOM, pp.2292-2300, 2013. ,
DOI : 10.1109/INFCOM.2013.6567033
On secret key generation from multiple observations of wireless channels, Proc. 2014 IEEE Int. Conf. on Communication Systems (ICCS), pp.147-151, 2014. ,
Secret Key Generation Using Physical Channels with Imperfect CSI, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), pp.1-5, 2014. ,
DOI : 10.1109/VTCFall.2014.6966172
Secret Information of Wireless Multi-Dimensional Gaussian Channels, IEEE Transactions on Wireless Communications, vol.14, issue.6, pp.3429-3442, 2015. ,
DOI : 10.1109/TWC.2015.2406320
Threshold Constraints on Symmetric Key Extraction from Rician Fading Estimates, IEEE Transactions on Mobile Computing, vol.12, issue.12, pp.2496-2506, 2013. ,
DOI : 10.1109/TMC.2012.226
On secret key generation from multiple observations of wireless channels, 2014 IEEE International Conference on Communication Systems, pp.147-151, 2014. ,
DOI : 10.1109/ICCS.2014.7024783
Secure Communications over Insecure Channels Based on Short Authenticated Strings, Advances in Cryptology CRYPTO 2005 (V. Shoup, pp.309-326, 2005. ,
DOI : 10.1007/11535218_19
Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits, 2009 IEEE International Conference on Communications, pp.1-5, 2009. ,
DOI : 10.1109/ICC.2009.5199440
Elements of Information Theory, 1991. ,
Time Correlation Analysis of Secret Key Generation via UWB Channels, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp.1-6, 2010. ,
DOI : 10.1109/GLOCOM.2010.5683999
Extracting secret key from wireless link dynamics in vehicular environments, 2013 Proceedings IEEE INFOCOM, pp.2283-2291, 2013. ,
DOI : 10.1109/INFCOM.2013.6567032
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST, 2010. ,
Secure information transmission for mobile radio, IEEE Communications Letters, vol.4, issue.2, pp.52-55, 2000. ,
DOI : 10.1109/4234.824754
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks, 2011 Proceedings IEEE INFOCOM, pp.1422-1430, 2011. ,
DOI : 10.1109/INFCOM.2011.5934929
Towards robust key extraction from multipath wireless channels, Journal of Communications and Networks, vol.14, issue.4, pp.385-395, 2012. ,
DOI : 10.1109/JCN.2012.6292245
Massive MIMO Performance Evaluation Based on Measured Propagation Data, IEEE Transactions on Wireless Communications, vol.14, issue.7, pp.3899-3911, 2015. ,
DOI : 10.1109/TWC.2015.2414413
Spatial channel characteristics in outdoor environments and their impact on BS antenna system performance, VTC '98. 48th IEEE Vehicular Technology Conference. Pathway to Global Wireless Revolution (Cat. No.98CH36151), pp.719-723, 1998. ,
DOI : 10.1109/VETEC.1998.683676
Room electromagnetics, IEEE Antennas and Propagation Magazine, vol.49, issue.2, pp.27-33, 2007. ,
DOI : 10.1109/MAP.2007.376642
The Contribution of Distributed Scattering in Radio Channels to Channel Capacity: Estimation and Modeling, 2006 Fortieth Asilomar Conference on Signals, Systems and Computers, pp.951-955, 2006. ,
DOI : 10.1109/ACSSC.2006.354892
Measurement results and modeling aspects for the UWB radio channel, 2002 IEEE Conference on Ultra Wideband Systems and Technologies (IEEE Cat. No.02EX580), pp.19-23, 2002. ,
DOI : 10.1109/UWBST.2002.1006310
Tgn channel models, 2004. ,
Tgac channel model addendum, 2010. ,
Empirical eigenanalysis of indoor UWB propagation channels, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., pp.3215-3219, 2004. ,
DOI : 10.1109/GLOCOM.2004.1378944
On the requirements for quasi-deterministic radio channel models for heterogeneous networks, 2012 International Symposium on Signals, Systems, and Electronics (ISSSE), pp.1-5, 2012. ,
DOI : 10.1109/ISSSE.2012.6374332
A Generic Model for MIMO Wireless Propagation Channels in Macro- and Microcells, IEEE Transactions on Signal Processing, vol.52, issue.1, pp.61-71, 2004. ,
DOI : 10.1109/TSP.2003.820144
The COST 259 Directional Channel Model-Part II: Macrocells, IEEE Transactions on Wireless Communications, vol.5, issue.12, pp.3434-3450, 2006. ,
DOI : 10.1109/TWC.2006.256967
Measurement of Large-Scale Cluster Power Characteristics for Geometric Channel Models, IEEE Transactions on Antennas and Propagation, vol.55, issue.11, pp.3361-3365, 2007. ,
DOI : 10.1109/TAP.2007.908844
On the Feasibility of Wireless Shadowing Correlation Models, IEEE Transactions on Vehicular Technology, vol.59, issue.9, pp.4222-4236, 2010. ,
DOI : 10.1109/TVT.2010.2082006
A multicell model of handover initiation in mobile cellular networks, IEEE Transactions on Vehicular Technology, vol.48, issue.3, pp.802-814, 1999. ,
DOI : 10.1109/25.764997
A Unified Disk Scattering Model and Its Angle-of-Departure and Time-of-Arrival Statistics, IEEE Transactions on Vehicular Technology, vol.62, issue.2, pp.473-485, 2013. ,
DOI : 10.1109/TVT.2012.2227859
Modelling of non-stationary mobile radio channels using two-dimensional brownian motion processes, 2013 International Conference on Advanced Technologies for Communications (ATC 2013), pp.241-246, 2013. ,
DOI : 10.1109/ATC.2013.6698114
Wideband Measurement-Based Modeling of Inter-Vehicle Channels in the 5-GHz Band, IEEE Transactions on Vehicular Technology, vol.62, issue.8, pp.3531-3540, 2013. ,
DOI : 10.1109/TVT.2013.2257905
Geometric model for DSPN satellite reception in the dense scatterer mobile environment, IEEE Transactions on Communications, vol.41, issue.3, pp.450-453, 1993. ,
DOI : 10.1109/26.221077
Three-Dimensional Urban EM Wave Propagation Model for Radio Network Planning and Optimization Over Large Areas, IEEE Transactions on Vehicular Technology, vol.58, issue.7, pp.3112-3123, 2009. ,
DOI : 10.1109/TVT.2009.2016973
Measurement and Modelling of Scattering From Buildings, IEEE Transactions on Antennas and Propagation, vol.55, issue.1, pp.143-153, 2007. ,
DOI : 10.1109/TAP.2006.888422
Introduction of diffuse scattering to enhance ray-tracing methods for the analysis of deterministic indoor UWB radio channels (Invited Paper), 2007 International Conference on Electromagnetics in Advanced Applications, pp.903-906, 2007. ,
DOI : 10.1109/ICEAA.2007.4387451
Distributions of multipath delay spread and average excess delay for 910-MHz urban mobile radio paths, IEEE Transactions on Antennas and Propagation, vol.23, issue.2, pp.206-213, 1975. ,
DOI : 10.1109/TAP.1975.1141042
Biconical antennas for intrinsic characterization of the UWB channel, IWAT 2005. IEEE International Workshop on Antenna Technology: Small Antennas and Novel Metamaterials, 2005., pp.101-104, 2005. ,
DOI : 10.1109/IWAT.2005.1461014
Statistical modeling and simulation of the RMS delay spread of indoor radio propagation channels, IEEE Transactions on Vehicular Technology, vol.43, issue.1, pp.110-120, 1994. ,
DOI : 10.1109/25.282271
Frequency dependency of delay spread and path loss in indoor ultra-wideband channels, IET Seminar on Ultra Wideband Systems, Technologies and Applications, pp.254-258, 2006. ,
DOI : 10.1049/ic:20060520
Frequency and Bandwidth Dependency of UWB Propagation Channels, 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications, pp.1-5, 2006. ,
DOI : 10.1109/PIMRC.2006.254447
Secret key generation scheme from WiFi and LTE reference signals, WinnComm 2016, p.2016 ,
DOI : 10.1007/s10470-017-0941-3
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Advances in Cryptology -EU- ROCRYPT 2004, pp.523-540, 2004. ,
DOI : 10.1007/978-3-540-24676-3_31
Generalized privacy amplification, IEEE Transactions on Information Theory, vol.41, issue.6, pp.1915-1923, 1995. ,
DOI : 10.1109/18.476316
Efficient Estimation and Compensation of Transceiver Non-Reciprocity in Precoded TDD Multi-User MIMO-OFDM Systems, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), pp.1-7, 2014. ,
DOI : 10.1109/VTCFall.2014.6965954