Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
…, T Ohira, B Komiyama, H Sasaoka - … on Antennas and …, 2005 - ieeexplore.ieee.org
We describe a secure communication scheme that uses the random fluctuation of the natural
environment of communication channels. Only the transmitter and the receiver share the …
environment of communication channels. Only the transmitter and the receiver share the …
Physical-layer secret key agreement in two-way wireless relaying systems
T Shimizu, H Iwai, H Sasaoka - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
We consider secret key agreement based on radio propagation characteristics in a two-way
relaying system where two legitimate parties named Alice and Bob communicate with each …
relaying system where two legitimate parties named Alice and Bob communicate with each …
[BOOK][B] Mobile communications
H Sasaoka - 2000 - books.google.com
The recent increase in the number of portable and mobile communications terminals in
Japan has been quite remarkable. In fact, since 1996, the growth in wireless terminals can be …
Japan has been quite remarkable. In fact, since 1996, the growth in wireless terminals can be …
An implementation of a CMA adaptive array for high speed GMSK transmission in mobile communications
…, T Shimura, N Matsuzawa, H Sasaoka - IEEE Transactions on …, 2002 - ieeexplore.ieee.org
The hardware implementation of an adaptive array as a technique for compensating multipath
fading in mobile communications is described. The number of the antenna elements is four…
fading in mobile communications is described. The number of the antenna elements is four…
Performance of modulation-level-controlled adaptive-modulation under limited transmission delay time for land mobile communications
Y Kamio, S Sampei, H Sasaoka… - 1995 IEEE 45th …, 1995 - ieeexplore.ieee.org
The performance of an adaptive-modulation/time division duplex (TDD) scheme to support
constant-bit-rate services under transmission delay time constraint conditions is evaluated in …
constant-bit-rate services under transmission delay time constraint conditions is evaluated in …
Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels: RSSI interleaving scheme
…, M Taromaru, T Ohira, H Sasaoka - The European …, 2005 - ieeexplore.ieee.org
A secure communication scheme that uses the random fluctuation of the natural environment
of communication channels is studied and an improved scheme for the secret key …
of communication channels is studied and an improved scheme for the secret key …
Adaptive key generation in secret key agreement scheme based on the channel characteristics in OFDM
S Yasukawa, H Iwai, H Sasaoka - … International Symposium on …, 2008 - ieeexplore.ieee.org
In this paper, we proposed an adaptive key generation based on the channel characteristics
in OFDM mobile radio. We have shown that DCT-based preprocessing can remove the …
in OFDM mobile radio. We have shown that DCT-based preprocessing can remove the …
A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property
S Yasukawa, H Iwai, H Sasaoka - 2008 IEEE International …, 2008 - ieeexplore.ieee.org
As a countermeasure for eavesdroppers in wireless communication, a secret key agreement
scheme using a variable directional antenna named ESPAR antenna was developed. In …
scheme using a variable directional antenna named ESPAR antenna was developed. In …
High capacity TDMA cellular system using coded 16QAM and cyclical slow frequency hopping
H Sasaoka - IEEE 43rd Vehicular Technology Conference, 1993 - ieeexplore.ieee.org
A high capacity time division multiple access (TDMA) cellular system that employs a pilot-symbol
aided 16 quadrature amplitude modulation (QAM), block coding, and cyclical slow …
aided 16 quadrature amplitude modulation (QAM), block coding, and cyclical slow …
A scheme of private key agreement based on the channel characteristics in OFDM land mobile radio
A Kitaura, H Sasaoka - … and Communications in Japan (Part III …, 2005 - Wiley Online Library
As a measure for preventing eavesdropping on land‐mobile communication, this paper
studies an application of a private key agreement based on the propagation characteristics of …
studies an application of a private key agreement based on the propagation characteristics of …