Common use of Inform Clause in Contracts

Inform. Theory, Seattle, WA, June 2006. [12] ▇. ▇▇▇▇▇-▇▇▇▇▇▇▇, ▇. ▇▇▇▇▇▇▇, ▇. ▇▇▇▇▇▇▇, and ▇. ▇▇▇▇▇, “Robust key generation from signal envelopes in wireless networks,” in 14th ACM conference on Computer and communications security, 2007, pp. 401– 410. [13] ▇. ▇▇▇▇, ▇. ▇▇▇▇▇▇▇, ▇. ▇▇▇▇▇, ▇. ▇▇▇▇▇▇▇▇, and ▇. ▇▇▇▇▇▇▇, “Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels,” IEEE Transactions on Antennas and Prop- agation,, vol. 53, no. 11, pp. 3776—3784, 2005. [14] ▇. ▇▇▇▇, ▇. ▇▇▇▇▇▇▇▇▇▇, ▇. ▇▇▇▇▇▇▇▇, and ▇. ▇▇▇▇▇▇, “Fingerprints in the ether: Using the physical layer for wireless authentication,” in IEEE Int.. Conf. on Comm, 2007, pp. 4646–4651. [15] ▇. ▇▇▇▇▇, ▇. ▇▇▇▇▇▇, M. R. D. ▇▇▇▇▇▇▇▇▇, and ▇. ▇▇▇▇▇▇▇▇▇▇, “Wireless information-theoretic security,” IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2515—2534, 2008. [16] ▇. ▇▇▇▇▇▇, ▇. ▇▇▇▇▇▇, ▇. ▇▇▇▇▇▇▇▇, ▇. ▇▇, and ▇. ▇▇▇▇▇▇, “Ra- diotelepathy: extracting a secret key from an unauthenticated wireless channel,” in 14th ACM international conference on Mobile computing and networking, 2008, pp. 128—139. [17] ▇. ▇. ▇▇▇▇▇▇▇, “Channels with side information at the transmitter,” IBM Journal of Research and Development, vol. 2, pp. 289–293, Oct. 1958. [18] S. I. Gel’fand and ▇. ▇. ▇▇▇▇▇▇▇, “Coding for channels with random parameters,” Problems of Control and Information Theory, vol. 9, pp. 19–31, 1980. [19] ▇. ▇▇▇▇▇▇▇▇▇, Coding Theorems of Information Theory. Springer Verlag, 1978. [20] ▇. ▇▇▇▇▇ and ▇. ▇▇▇▇▇▇, “On the capacity of some channels with channel state information,” IEEE Trans. Inform. Theory, vol. 45, pp. 2007–2019, 1999.

Appears in 2 contracts

Sources: Secret Key Agreement, Secret Key Agreement