Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
Computer Security, Information Technology Laboratory, NIST, 2004. ,
Assessing the Security of a Clean-Slate Internet Architecture Layer, Seventh Workshop on Secure Network Protocols (NPSec), 2012. ,
Introduction to Modern Cryptography, 2014. ,
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Securing resource-constrained wireless ad hoc networks, 2007 IEEE Sarnoff Symposium, pp.24-30, 2009. ,
DOI : 10.1109/SARNOF.2007.4567365
A survey on sensor networks, IEEE Communications Magazine, vol.40, issue.8, pp.102-114, 2002. ,
DOI : 10.1109/MCOM.2002.1024422
TinyPK, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, pp.59-64, 2004. ,
DOI : 10.1145/1029102.1029113
Securing Mobile Ad Hoc Networks with Certificateless Public Keys, IEEE Transactions on Dependable and Secure Computing, vol.3, issue.4, pp.386-399, 2006. ,
DOI : 10.1109/TDSC.2006.58
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.585-598, 2008. ,
DOI : 10.1109/INFOCOM.2006.303
Securing wireless sensor networks: a survey, IEEE Communications Surveys & Tutorials, vol.10, issue.3, pp.6-28, 2008. ,
DOI : 10.1109/COMST.2008.4625802
The Wire-Tap Channel, Bell System Technical Journal, vol.54, issue.8, pp.1355-1387, 1975. ,
DOI : 10.1002/j.1538-7305.1975.tb02040.x
Elements of Information Theory, 2001. ,
Physical Layer Security, 2011. ,
DOI : 10.1017/CBO9780511977985
Wiretap Channel with Side Information, 2007. ,
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.3, pp.1550-1573, 2014. ,
DOI : 10.1109/SURV.2014.012314.00178
Broadcast channels with confidential messages, IEEE Transactions on Information Theory, vol.24, issue.3, pp.339-348, 1978. ,
DOI : 10.1109/TIT.1978.1055892
The Gaussian wire-tap channel, IEEE Transactions on Information Theory, vol.24, issue.4, pp.451-456, 1978. ,
DOI : 10.1109/TIT.1978.1055917
Secrecy Capacity of Wireless Channels, 2006 IEEE International Symposium on Information Theory, pp.356-360, 2006. ,
DOI : 10.1109/ISIT.2006.261613
Wireless Information-Theoretic Security, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2515-2534, 2008. ,
DOI : 10.1109/TIT.2008.921908
The challenges facing physical layer security, IEEE Communications Magazine, vol.53, issue.6, pp.16-20, 2015. ,
DOI : 10.1109/MCOM.2015.7120011
On the effectiveness of secret key extraction from wireless signal strength in real environments, Proceedings of the 15th annual international conference on Mobile computing and networking, MobiCom '09, 2009. ,
DOI : 10.1145/1614320.1614356
Verification of Secret Key Generation from UWB Channel Observations, Proc. IEEE ICC'09, pp.1-5, 2009. ,
Empirical Analysis of UWB Channel Characteristics for Secret Key Generation in Indoor Environments, Proc. IEEE PIMRC'10, 2010. ,
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements, IEEE Transactions on Mobile Computing, vol.9, issue.1, pp.17-30, 2010. ,
DOI : 10.1109/TMC.2009.88
On the Security of UWB Secret Key Generation Methods against Deterministic Channel Prediction Attacks, Proc. IEEE Vehicular Technology Conference, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00747839
Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, vol.39, issue.3, pp.733-742, 1993. ,
DOI : 10.1109/18.256484
Common randomness in information theory and cryptography. I. Secret sharing, IEEE Transactions on Information Theory, vol.39, issue.4, pp.1121-1132, 1993. ,
DOI : 10.1109/18.243431
Unconditionally secure key agreement and the intrinsic conditional information, IEEE Transactions on Information Theory, vol.45, issue.2, pp.499-514, 1999. ,
DOI : 10.1109/18.748999
Quantum Cryptography, " in A Multidisciplinary Introduction to Information Security, 2011. ,
An Overview of the State of the Art for Practical Quantum Key Distribution, 2015. ,
Key Generation Using External Source Excitation: Capacity, Reliability, and Secrecy Exponent, IEEE Transactions on Information Theory, vol.58, issue.4, pp.2455-2474, 2012. ,
DOI : 10.1109/TIT.2011.2176311
Fast secret key generation in static wireless networks: A virtual channel approach, 2013 Proceedings IEEE INFOCOM, pp.2292-2300, 2013. ,
DOI : 10.1109/INFCOM.2013.6567033
On the Secrecy Capacity of Fading Channels, IEEE Transactions on Information Theory, vol.54, issue.10, pp.4687-4698, 2008. ,
DOI : 10.1109/TIT.2008.928990
Dense Parity Check Based Secrecy Sharing in Wireless Communications, IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, pp.54-58, 2007. ,
DOI : 10.1109/GLOCOM.2007.18
Noncoherent Capacity of Secret-Key Agreement With Public Discussion, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.565-574, 2011. ,
DOI : 10.1109/TIFS.2011.2158999
A Unified Framework for Key Agreement Over Wireless Fading Channels, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.480-490, 2012. ,
DOI : 10.1109/TIFS.2011.2180527
Secret-Key Agreement Over Non-Coherent Block-Fading Channels With Public Discussion, IEEE Transactions on Information Theory, vol.62, issue.12, 2013. ,
DOI : 10.1109/TIT.2016.2618861
Secure information transmission for mobile radio, IEEE Communications Letters, vol.4, issue.2, pp.52-55, 2000. ,
DOI : 10.1109/4234.824754
A secret key exchange scheme for near field communication, 2014 IEEE Wireless Communications and Networking Conference (WCNC), 2014. ,
DOI : 10.1109/WCNC.2014.6952046
Physical Layer Security over OFDM-Based Links: Conjugate-and-Return, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), 2015. ,
DOI : 10.1109/VTCSpring.2015.7146015
Intrinsic Information of Wideband Channels, IEEE Journal on Selected Areas in Communications, vol.31, issue.9, 2013. ,
DOI : 10.1109/JSAC.2013.130919
Secret-key agreement over unauthenticated public channels-part I: definitions and a completeness result, IEEE Transactions on Information Theory, vol.49, issue.4, pp.822-831, 2003. ,
DOI : 10.1109/TIT.2003.809563
Key agreement over wireless fading channels with an active attacker, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.1391-1396, 2010. ,
DOI : 10.1109/ALLERTON.2010.5707076
Key establishment via common state information in networked control systems, Proc. American Control Conference (ACC), pp.2234-2239, 2011. ,
A Generalized Scheme for the Creation of Shared Secret Keys through Uncorrelated Reciprocal Channels in Multiple Domains, 2009 Proceedings of 18th International Conference on Computer Communications and Networks, pp.1-8, 2009. ,
DOI : 10.1109/ICCCN.2009.5235210
Secret key generation exploiting channel characteristics in wireless communications, IEEE Wireless Communications, vol.18, issue.4, pp.6-12, 2011. ,
DOI : 10.1109/MWC.2011.5999759
Cryptographic Key Agreement for Mobile Radio, Digital Signal Processing, vol.6, issue.4, pp.207-212, 1996. ,
DOI : 10.1006/dspr.1996.0023
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks, 2011 Proceedings IEEE INFOCOM, pp.1422-1430, 2011. ,
DOI : 10.1109/INFCOM.2011.5934929
Secure wireless communications: Secret keys through multipath, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.3013-3016, 2008. ,
DOI : 10.1109/ICASSP.2008.4518284
Unconditionally secure communications over fading channels, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277), pp.54-58, 2001. ,
DOI : 10.1109/MILCOM.2001.985763
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels, IEEE Transactions on Antennas and Propagation, vol.53, issue.11, pp.3776-3784, 2005. ,
DOI : 10.1109/TAP.2005.858853
Robust key generation from signal envelopes in wireless networks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315295
Radio-telepathy, Proceedings of the 14th ACM international conference on Mobile computing and networking, MobiCom '08 ,
DOI : 10.1145/1409944.1409960
AmbiSec: Securing Smart Spaces Using Entropy Harvesting, Proc. AmI'10, pp.73-85, 2010. ,
DOI : 10.1007/978-3-642-16917-5_8
Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.644-650, 2010. ,
DOI : 10.1109/EUC.2010.103
Adaptive wireless channel probing for shared key generation, 2011 Proceedings IEEE INFOCOM, pp.2165-2173, 2011. ,
DOI : 10.1109/INFCOM.2011.5935028
Information-Theoretically Secret Key Generation for Fading Wireless Channels, IEEE Transactions on Information Forensics and Security, vol.5, issue.2, pp.240-254, 2010. ,
Secrecy extraction from correlated fading channels: An upper bound, 2009 International Conference on Wireless Communications & Signal Processing, pp.1-3, 2009. ,
DOI : 10.1109/WCSP.2009.5371757
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels: Design, Implementation, and Analysis, ArXiv.org, Tech. Rep, 2010. ,
Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness, IEEE Transactions on Information Forensics and Security, vol.7, issue.5, pp.1484-1497, 2012. ,
DOI : 10.1109/TIFS.2012.2206385
Analysis of Secret Key Robustness in Indoor Radio Channel Measurements, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pp.1-5, 2015. ,
DOI : 10.1109/VTCSpring.2015.7145702
URL : https://hal.archives-ouvertes.fr/hal-01194191
Adaptive Key Generation in Secret Key Agreement Scheme based on the Channel Characteristics in OFDM Towards Robust Key Extraction from Multipath Wireless Channels, Proc. [70] Y. El Hajj Shehadeh, O. Alfandi, and D. Hogrefe, pp.385-395, 2012. ,
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks, 2010 Proceedings IEEE INFOCOM, 2010. ,
DOI : 10.1109/INFCOM.2010.5462004
Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits, 2009 IEEE International Conference on Communications, pp.1-5, 2009. ,
DOI : 10.1109/ICC.2009.5199440
Secret key generation in correlated multi-dimensional Gaussian channels, 2014 IEEE International Conference on Communications (ICC), pp.2171-2177, 2014. ,
DOI : 10.1109/ICC.2014.6883645
Maximizing the Secret Key Rate for Informed Radios under Different Channel Conditions, IEEE Transactions on Wireless Communications, vol.12, issue.10, pp.5146-5153, 2013. ,
DOI : 10.1109/TWC.2013.090313.122034
A Scheme of Private key Agreement Based on Delay Profiles in UWB Systems, 2006 IEEE Sarnoff Symposium, pp.1-6, 2006. ,
DOI : 10.1109/SARNOF.2006.4534731
Dynamic Secret Key Generation Exploiting Ultra- Wideband Wireless Channel Characteristics, Proc. IEEE Wireless Communications and Networking Conference (WCNC), pp.1701-1706, 2015. ,
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels, IEEE Transactions on Information Forensics and Security, vol.2, issue.3, 2007. ,
Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios, 6th Annual Communication Networks and Services Research Conference (cnsr 2008), pp.88-95, 2008. ,
DOI : 10.1109/CNSR.2008.52
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements, Proc. NTMS'09, 2009. ,
Secret key extraction from a UWB channel: Analysis in a real environment, 2014 IEEE International Conference on Ultra-WideBand (ICUWB), 2014. ,
DOI : 10.1109/ICUWB.2014.6958955
Time Correlation Analysis of Secret Key Generation via UWB Channels, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp.1-6, 2010. ,
DOI : 10.1109/GLOCOM.2010.5683999
Secret key generation from mobility, 2011 IEEE GLOBECOM Workshops (GC Wkshps), pp.874-878, 2011. ,
DOI : 10.1109/GLOCOMW.2011.6162581
Secret Key Generation Based on AoA Estimation for Low SNR Conditions, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pp.1-7, 2015. ,
DOI : 10.1109/VTCSpring.2015.7146072
Key Establishment Employing Reconfigurable Antennas: Impact of Antenna Complexity, IEEE Transactions on Wireless Communications, vol.13, issue.11, pp.6300-6310, 2014. ,
DOI : 10.1109/TWC.2014.2330835
Physical layer wireless security made fast and channel independent, 2011 Proceedings IEEE INFOCOM, pp.1125-1133, 2011. ,
DOI : 10.1109/INFCOM.2011.5934889
Secure physical-layer key generation protocol and key encoding in wireless communications, 2010 IEEE Globecom Workshops, pp.94-98, 2010. ,
DOI : 10.1109/GLOCOMW.2010.5700466
Secret-key generation from wireless channels: Mind the reflections, 2014 IEEE International Conference on Communications Workshops (ICC), pp.783-788, 2014. ,
DOI : 10.1109/ICCW.2014.6881295
Secret key management and dynamic security coding system, 2014 IEEE Fifth International Conference on Communications and Electronics (ICCE), pp.548-553, 2014. ,
DOI : 10.1109/CCE.2014.6916762
Ultra-wideband communications - An idea whose time has come, IEEE Signal Processing Magazine, vol.21, issue.6, pp.26-54, 2004. ,
DOI : 10.1109/MSP.2004.1359140
La Technologie UWB Radio Impulsionnelle: un Etat des Lieux des Solutions enMatì ere de Localisation Haute Précision et de Transfert de DonnéesDonnées`Donnéesà Courte Portée, pp.62-74, 2013. ,
A Comprehensive Standardized Bibliography 169 ,
PyLayers: An open source dynamic simulator for indoor propagation and localization, 2013 IEEE International Conference on Communications Workshops (ICC), 2013. ,
DOI : 10.1109/ICCW.2013.6649206
URL : https://hal.archives-ouvertes.fr/hal-01127772
Performance Analysis of LDR UWB Non-Coherent Receivers in Multipath Environments, 2005 IEEE International Conference on Ultra-Wideband, 2005. ,
DOI : 10.1109/ICU.2005.1570037
A low Power, Low Data Rate Impulse Radio Ultra Wide Band Transceiver, Proc. FUNEMS'10, 2010. ,
Signal-based Security in Wireless Networks, 2012. ,
On the Security of UWB Secret Key Generation Methods against Deterministic Channel Prediction Attacks, Proc. IEEE VTC Fall'12, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00747839
Random patterns of secret keys from sampled IR-UWB channel responses, 2014 IEEE International Conference on Ultra-WideBand (ICUWB), 2014. ,
DOI : 10.1109/ICUWB.2014.6958954
URL : https://hal.archives-ouvertes.fr/hal-01127769
Quantization, IEEE Transactions on Information Theory, vol.44, issue.6, pp.2325-2383, 1998. ,
DOI : 10.1109/18.720541
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, Information Technology Laboratory, NIST, 2010. ,
Extracting Secrecy from Jointly Gaussian Random Variables, 2006 IEEE International Symposium on Information Theory, pp.2593-2597, 2006. ,
DOI : 10.1109/ISIT.2006.262101
Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis, IEEE Transactions on Information Forensics and Security, vol.5, issue.3, pp.381-392, 2010. ,
The deconvolution problem: An overview, Proceedings of the IEEE, vol.74, issue.1, pp.82-85, 1986. ,
DOI : 10.1109/PROC.1986.13407
Evaluation of an ultra-wide-band propagation channel, IEEE Transactions on Antennas and Propagation, vol.50, issue.5, pp.561-570, 2002. ,
DOI : 10.1109/TAP.2002.1011221
Ultra-Wideband Compressed Sensing: Channel Estimation, IEEE Journal of Selected Topics in Signal Processing, vol.1, issue.3, pp.383-395, 2007. ,
DOI : 10.1109/JSTSP.2007.906657
Instantaneous Companding of Quantized Signals, Bell System Technical Journal, vol.36, issue.3, pp.653-709, 1957. ,
DOI : 10.1002/j.1538-7305.1957.tb03858.x
Multi-objective Management in Freight Logistics Increasing Capacity, Service Level and Safety with Optimization Algorithms, 2008. ,
Effect of Bandwidth on the Number of Multipath Components in Realistic Wireless Indoor Channels, 2011 IEEE International Conference on Communications (ICC), pp.1-6, 2011. ,
DOI : 10.1109/icc.2011.5962896
Channel Estimation and Synchronization with Sub-Nyquist Sampling and Application to Ultra-Wideband Systems, Proc. IEEE ISCAS'04, 2004. ,
Characterization of ultra-wide bandwidth wireless indoor channels: a communication-theoretic view, IEEE Journal on Selected Areas in Communications, vol.20, issue.9, pp.1613-1627, 2002. ,
DOI : 10.1109/JSAC.2002.805031
Channel estimation for ultra-wideband communications, IEEE Journal on Selected Areas in Communications, vol.20, issue.9, pp.1638-1645, 2002. ,
DOI : 10.1109/JSAC.2002.805053
Synchronization and channel estimation for UWB signals, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), pp.764-768, 2003. ,
DOI : 10.1109/GLOCOM.2003.1258341
Ultra Wide-Band Communications with Blind Channel Estimation Based on First-Order Statistics, Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, pp.529-532, 2004. ,
Time of Arrival Estimation for UWB Localizers in Realistic Environments, EURASIP Journal on Advances in Signal Processing, vol.2, issue.9, p.32082, 2006. ,
DOI : 10.1109/TVT.2005.856196
Hybrid sparse/diffuse UWB channel estimation, 2011 IEEE 12th International Workshop on Signal Processing Advances in Wireless Communications, pp.201-205, 2011. ,
DOI : 10.1109/SPAWC.2011.5990395
Optimal Pilot Waveform Assisted Modulation for Ultrawideband Communications, IEEE Transactions on Wireless Communications, vol.3, issue.4, pp.1236-1249, 2002. ,
DOI : 10.1109/TWC.2004.830827
Enhanced-accuracy channel estimation and ranging for IR-UWB energy detectors, 2010 IEEE International Conference on Ultra-Wideband, pp.1-6, 2010. ,
DOI : 10.1109/ICUWB.2010.5616870
A generalized sampling theory without band-limiting constraints, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, pp.959-969, 1998. ,
DOI : 10.1109/82.718806
Sampling signals with finite rate of innovation, IEEE Transactions on Signal Processing, vol.50, issue.6, pp.1417-1428, 2002. ,
DOI : 10.1109/TSP.2002.1003065
Sparse Sampling of Signal Innovations, IEEE Signal Processing Magazine, vol.25, issue.2, pp.31-40, 2008. ,
DOI : 10.1109/MSP.2007.914998
Sampling and reconstruction of signals with finite rate of innovation in the presence of noise, IEEE Transactions on Signal Processing, vol.53, issue.8, pp.2788-2805, 2005. ,
DOI : 10.1109/TSP.2005.850321
Sampling in the Age of Sparsity Available: http://lcav.epfl.ch/files, 2009. ,
Compressed sensing, IEEE Transactions on Information Theory, vol.52, issue.4, pp.1289-1306, 2006. ,
DOI : 10.1109/TIT.2006.871582
URL : https://hal.archives-ouvertes.fr/inria-00369486
An Introduction To Compressive Sampling, IEEE Signal Processing Magazine, vol.25, issue.2, pp.21-30, 2008. ,
DOI : 10.1109/MSP.2007.914731
Compressive sampling of pulse trains: Spread the spectrum!, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.2877-2880, 2009. ,
DOI : 10.1109/ICASSP.2009.4960224
URL : https://hal.archives-ouvertes.fr/hal-00481954
Sparse channel estimation based on compressed sensing for ultra wideband systems, 2011 IEEE International Conference on Ultra-Wideband (ICUWB), pp.365-369, 2011. ,
DOI : 10.1109/ICUWB.2011.6058865
Compressed Sensing Maximum Likelihood Channel Estimation for Ultra-Wideband Impulse Radio, 2009 IEEE International Conference on Communications, pp.1-5, 2009. ,
DOI : 10.1109/ICC.2009.5198842
Ultra-wideband channel estimation based on Bayesian compressive sensing, 2010 10th International Symposium on Communications and Information Technologies, pp.779-782, 2010. ,
DOI : 10.1109/ISCIT.2010.5665094
Bayesian compressive sensing for ultra-wideband channel models, 2012 35th International Conference on Telecommunications and Signal Processing (TSP), pp.320-324, 2012. ,
DOI : 10.1109/TSP.2012.6256307
Bayesian Compressive Sensing, IEEE Transactions on Signal Processing, vol.56, issue.6, pp.2346-2356, 2008. ,
DOI : 10.1109/TSP.2007.914345
The effect of channel models on compressed sensing based UWB channel estimation, 2011 IEEE International Conference on Ultra-Wideband (ICUWB), pp.375-379, 2011. ,
DOI : 10.1109/ICUWB.2011.6058867
Architectural analysis of compressed sensing based IR-UWB receiver for communication and ranging, 2014 IEEE International Conference on Ultra-WideBand (ICUWB), pp.222-227, 2014. ,
DOI : 10.1109/ICUWB.2014.6958982
Ultra-Wideband Positioning Systems: Theoretical Limits, Ranging Algorithms and Protocols, 2008. ,
DOI : 10.1017/CBO9780511541056
Space-Time Wireless Channels On Key Agreement in Wireless Sensor Networks based on Radio Transmission Properties, Proc. IEEE Workshop NPSec'09, 2002. ,
Secret Key Generation and Agreement in UWB Communication Channels, IEEE GLOBECOM 2008, 2008 IEEE Global Telecommunications Conference, pp.1-5, 2008. ,
DOI : 10.1109/GLOCOM.2008.ECP.356
A compressive sensing approach for secret key agreement based on UWB channel reciprocity, 2012 IEEE International Conference on Ultra-Wideband, pp.135-139, 2012. ,
DOI : 10.1109/ICUWB.2012.6340497
Channel level crossing-based security for communications over fading channels, IET Information Security, vol.7, issue.3, 2013. ,
DOI : 10.1049/iet-ifs.2011.0360
Secrecy Capacities for Multiple Terminals, IEEE Transactions on Information Theory, vol.50, issue.12, pp.3047-3061, 2004. ,
DOI : 10.1109/TIT.2004.838380
Multiterminal Secret Key Agreement, IEEE Transactions on Information Theory, vol.60, issue.6, pp.3379-3412, 2014. ,
DOI : 10.1109/TIT.2014.2313566
Group Secret Key Generation Algorithms, 2007 IEEE International Symposium on Information Theory, pp.2596-2600, 2007. ,
DOI : 10.1109/ISIT.2007.4557610
Cooperative Key Generation in Wireless Networks, IEEE Journal on Selected Areas in Communications, vol.30, issue.8, pp.1578-1588, 2012. ,
DOI : 10.1109/JSAC.2012.120924
Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels, IEEE Journal on Selected Areas in Communications, vol.30, issue.9, pp.1666-1674, 2012. ,
DOI : 10.1109/JSAC.2012.121010
Group Secret Key Generation Algorithm from Wireless Signal Strength, 2012 Sixth International Conference on Internet Computing for Science and Engineering, pp.239-245, 2012. ,
DOI : 10.1109/ICICSE.2012.64
Cooperative Key Agreement for Wireless Networking: Key Rates and Practical Protocol Design, IEEE Transactions on Information Forensics and Security, vol.9, issue.2, pp.272-284, 2014. ,
DOI : 10.1109/TIFS.2013.2293113
Combining UWB with Time Reversal for improved communication and positioning, Telecommunication Systems, vol.34, issue.3, pp.1145-1158, 2013. ,
DOI : 10.1007/s11235-011-9630-1
URL : https://hal.archives-ouvertes.fr/hal-00997281
Bayesian Interpolation, Neural Computation, vol.49, issue.3, pp.415-447, 1992. ,
DOI : 10.1093/comjnl/11.2.185
The expectation-maximization algorithm, IEEE Signal Processing Magazine, vol.13, issue.6, pp.47-60, 1996. ,
DOI : 10.1109/79.543975
The Expectation Maximization Algorithm. A Short Tutorial, 2009. ,
A Unifying Review of Linear Gaussian Models, Neural Computation, vol.45, issue.3, pp.305-345, 1999. ,
DOI : 10.1109/TIT.1967.1054010
Maximum Likelihood from Incomplete Data via the EM Algorithm, JOURNAL OF THE ROYAL STATISTICAL SOCIETY, SERIES B, vol.39, issue.1, pp.1-38, 1977. ,
Are Social Media Making Us Stupid? [Opinion], IEEE Technology and Society Magazine, vol.34, issue.1, pp.8-9, 2015. ,
DOI : 10.1109/MTS.2015.2396049
Understanding the Human Machine [Commentary], IEEE Technology and Society Magazine, vol.32, issue.4, pp.25-30, 2013. ,
DOI : 10.1109/MTS.2013.2286431
Ruminations on the IQ2 Debate: We Are Becoming Enslaved by Our Technology [Opinion], IEEE Technology and Society Magazine, vol.34, issue.1, pp.6-7, 2015. ,
DOI : 10.1109/MTS.2015.2396050
The Internet of People for a Post- Oil World Available: http://situatedtechnologies, 2011. ,
The Right to Be Unobserved, IEEE Security & Privacy, vol.13, issue.4, pp.12-19, 2015. ,
DOI : 10.1109/MSP.2015.76
The Circle [Book Review], IEEE Technology and Society Magazine, vol.34, issue.1, pp.4-5, 2015. ,
DOI : 10.1109/MTS.2015.2395964
Big Brother in the Information Age: Concerns about Government Information Gathering over Time, IEEE Security & Privacy, vol.13, issue.4, pp.12-19, 2015. ,
DOI : 10.1109/MSP.2015.70
The Impact of EU Privacy Legislation on Biometric System Deployment: Protecting citizens but constraining applications, IEEE Signal Processing Magazine, vol.32, issue.5, pp.101-108, 2015. ,
DOI : 10.1109/MSP.2015.2426682
Assessment of cooperative and heterogeneous indoor localization algorithms with real radio devices, 2014 IEEE International Conference on Communications Workshops (ICC), 2014. ,
DOI : 10.1109/ICCW.2014.6881190
Enhancing Positioning Accuracy through Direct Position Estimators Based on Hybrid RSS Data Fusion, VTC Spring 2009, IEEE 69th Vehicular Technology Conference ,
DOI : 10.1109/VETECS.2009.5073539
URL : https://hal.archives-ouvertes.fr/hal-00379638
Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks, IEEE Wireless Communications, vol.17, issue.5, pp.56-62, 2010. ,
DOI : 10.1109/MWC.2010.5601959
Detecting identity-based attacks in wireless networks using signalprints, Proceedings of the 5th ACM workshop on Wireless security , WiSe '06, 2006. ,
DOI : 10.1145/1161289.1161298
Robust location distinction using temporal link signatures, Proceedings of the 13th annual ACM international conference on Mobile computing and networking , MobiCom '07, 2007. ,
DOI : 10.1145/1287853.1287867
Securing Sensor Networks with Location-Based Keys, Proc. IEEE WCNC'05, 2005. ,
Secret Key Generation Via Localization and Mobility, IEEE Transactions on Vehicular Technology, vol.64, issue.6, pp.1-16, 2014. ,
DOI : 10.1109/TVT.2014.2342714
Joint distributed synchronization and positioning in UWB ad hoc networks using TOA, IEEE Transactions on Microwave Theory and Techniques, vol.54, issue.4, pp.1896-1911, 2006. ,
DOI : 10.1109/TMTT.2006.872082
Handbook of Applied Cryptography, 1996. ,
DOI : 10.1201/9781439821916
The Wire-tap Channel, Bell Systems Technical Journal, vol.54, issue.8, pp.1355-1387, 1975. ,
Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, vol.39, issue.3, pp.733-742, 1993. ,
DOI : 10.1109/18.256484
Common Randomness in Information Theory and Cryptography. I. Secret Sharing, IEEE Transactions on Information Theory, vol.39, issue.4, pp.1121-1132, 1993. ,
Signal-based Security in Wireless Networks, 2012. ,
Effect of Bandwidth on the Number of Multipath Components in Realistic Wireless Indoor Channels, 2011 IEEE International Conference on Communications (ICC), pp.1-6, 2011. ,
DOI : 10.1109/icc.2011.5962896
Ultra-Wideband Compressed Sensing: Channel Estimation, IEEE Journal of Selected Topics in Signal Processing, vol.1, issue.3, pp.383-395, 2007. ,
DOI : 10.1109/JSTSP.2007.906657
Channel Estimation and Synchronization with Sub-Nyquist Sampling and Application to Ultra-Wideband Systems, Proc. IEEE ISCAS'04, 2004. ,