© Springer Science+Business Media, LLC 2010 All rights reserved.
This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, NewYork, NY 10013, USA),
except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
Cover design:
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Contents
1 Secrecy Capacity of Independent Parallel Channels
Zang Li, RoyYates andWade Trappe
2 Obtaining Secrecy Through Intentional Uncertainty
Satashu Goel and Rohit Negi
3 Distributed Secret Sharing over the Gaussian Interference Wiretap Channel
William Luh and Deepa Kundur
4 Cooperative Jamming: The Tale of Friendly Interference for Secrecy
Xiang He and AylinYener
5 Hybrid-ARQ
Schemes for Reliable and Secret Wireless Communications
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevi´c and H. Vincent Poor
6 Secret Communication Under Channel Uncertainty
Yingbin Liang, H. Vincent Poor and Shlomo Shamai (Shitz)
7 Cooperative Secrecy inWireless Communications
Ersen Ekrem and Sennur Ulukus
8 Source Coding Under Secrecy Constraints
Deniz G¨und¨uz, Elza Erkip and H. Vincent Poor
9 Secret Key Extraction from Level Crossings over
Unauthenticated Wireless Channels
Suhas Mathur,Wade Trappe, Narayan Mandayam, ChunxuanYe
and Alex Reznik
10 Secret Key Generation Among Multiple Terminals with
Applications toWireless Systems
ChunxuanYe and Alex Reznik
11 Secret Key Agreement Techniques Based on Multipath
Propagation Characteristics
Hideichi Sasaoka and Hisato Iwai
12 Secret Communication over Fading Channels
B. Azimi-Sadjadi, A. Kiayias, A. Mercado and B.Yener
13 Fingerprints in the Ether: Channel-Based Authentication
Liang Xiao, Larry Greenstein, Narayan Mandayam andWade Trappe
14 Message Authentication: Information Theoretic Bounds
Lifeng Lai, Hesham El Gamal and H. Vincent Poor
15 Trusted Cooperative Transmissions: Turning a Security
Weakness into a Security Enhancement
Yan Lindsay Sun and Zhu Han
16 Modulation Forensics for
Wireless Digital Communications in Frequency-Selective Fading Channels
W. Sabrina Lin and K. J. Ray Liu
● Screenshot ●