#### Filter Results:

- Full text PDF available (20)

#### Publication Year

2001

2013

- This year (0)
- Last 5 years (3)
- Last 10 years (15)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Suhas Mathur, Wade Trappe, Narayan B. Mandayam, Chunxuan Ye, Alex Reznik
- MobiCom
- 2008

Securing communications requires the establishment of cryptographic keys, which is challenging in mobile scenarios where a key management infrastructure is not always present. In this paper, we present a protocol that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel… (More)

- Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe, Narayan B. Mandayam
- IEEE Transactions on Information Forensics and…
- 2010

The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the short-term fading process is inherently hard… (More)

- Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Prakash Narayan, Alex Reznik
- IEEE Transactions on Information Theory
- 2008

We consider secret key generation for a “pairwise independent network” model in which every pair of terminals observes correlated sources that are independent of sources observed by all other pairs of terminals. The terminals are then allowed to communicate publicly with all such communication being observed by all the terminals. The objective… (More)

- Chunxuan Ye, Raymond W. Yeung
- IEEE Trans. Information Theory
- 2001

a variable-length code is a fix-free code if no codeword is a prefix or a suffix of any other codeword. This class of codes is applied to speed up the decoding process, for the decoder can decode from both sides of the compressed file simultaneously. In this paper, we study some basic properties of fix-free codes. We prove a sufficient and a necessary… (More)

- Chunxuan Ye, Prakash Narayan
- Proceedings. International Symposium on…
- 2005

We consider a model for secrecy generation, with three terminals, by means of public interterminal communication, and examine the problem of characterizing all the rates at which all three terminals can generate a "secret key," and - simultaneously - two designated terminals can generate a "private key" which is effectively concealed from the remaining… (More)

- Chunxuan Ye, Alex Reznik, Yogendra Shah
- 2006 IEEE International Symposium on Information…
- 2006

We present a method for secrecy extraction from jointly Gaussian random sources. The approach is motivated by and has applications in enhancing security for wireless communications. The problem is also found to be closely related to some well known lossy source coding problems

- Chunxuan Ye, Alex Reznik
- 2007 IEEE International Symposium on Information…
- 2007

We consider a pair-wise independent network in which every pair of terminals observes a common pair-wise source that is independent of all the sources accessible to the other pairs. We propose a method for secret key agreement in such a network that is based on well-established point-to- point techniques and repeated application of the one-time pad over a… (More)

- Chunxuan Ye, Raymond W. Yeung
- IEEE Trans. Information Theory
- 2002

Upper bounds on the redundancy of Huffman codes have been extensively studied in the literature. Almost all of these bounds are in terms of the probability of either the most likely or the least likely source symbol. In this correspondence, we prove a simple upper bound in terms of the probability of any source symbol.

- Suhas Mathur, Alex Reznik, +5 authors Narayan B. Mandayam
- IEEE Wireless Commun.
- 2010

While conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, they do not directly leverage the unique properties of the wireless domain to address security threats. The wireless medium is a powerful source of domain-specific information that can complement and enhance traditional security… (More)

- Chunxuan Ye, Prakash Narayan
- ArXiv
- 2004

We consider a model with three terminals and examine the problem of characterizing the largest rates at which two pairs of terminals can simultaneously generate private keys, each of which is effectively concealed from the remaining terminal.