Author:
Abd Aziz Azlan,Magzoub Albashier Mohammed Ahmed,Mahmud Azwan,Alias Mohamad Yusoff,Amir Hamzah Nurul Asyiqin
Publisher
Atlantis Press International BV
Reference12 articles.
1. Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security: Technical challenges, recent advances, and future trends, “Proceedings of IEEE, vol. 104, p. 1727 1765, Sep.2016
2. U. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inform. Theory, vol. 39, no. 3, pp. 733–742, May 1993.
3. G. Shamir, J. Boutros, A. Alloum, and L. Wang, “Non-systematic LDPC codes for redundant data,” in Proc. Inaugural Workshop for the Center of Information Theory and its Applications, San Diego, California, Feb. 2006.
4. W. Harrison and S. McLaughlin, “Physical-layer security: Combining error control coding and cryptography,” in Proc. IEEE International Conference on Communications (ICC ‘09), Dresden, Germany, Jun. 2009, pp. 1–5.
5. D. Klinc, J. Ha, S. McLaughlin, J. Barros, and B.-J. Kwak, “LDPC codes for physical layer security,” in Proc. IEEE Global Telecommunications Conference (GLOBECOM 2009), Honolulu, HI, Nov. 2009, pp. 1–6.