Energy harvesting in secret key generation systems under jamming attacks, 2017 IEEE International Conference on Communications (ICC), 2017. ,
DOI : 10.1109/ICC.2017.7996559
URL : https://hal.archives-ouvertes.fr/hal-01474839
Secret key generation in Rayleigh block fading AWGN channels under jamming attacks, 2017 IEEE International Conference on Communications (ICC), 2017. ,
DOI : 10.1109/ICC.2017.7996660
URL : https://hal.archives-ouvertes.fr/hal-01474850
Common randomness in information theory and cryptography. I. Secret sharing, IEEE Transactions on Information Theory, vol.39, issue.4, pp.1121-1132, 1993. ,
DOI : 10.1109/18.243431
Protocols for Secret Key Agreement by Public Discussion Based on Common Information, IEEE Trans. Inf. Theory, vol.39, issue.5, pp.733-742, 1993. ,
DOI : 10.1007/3-540-48071-4_32
Common randomness in information theory and cryptography. II. CR capacity, IEEE Transactions on Information Theory, vol.44, issue.1, pp.225-240, 1998. ,
DOI : 10.1109/18.651026
Generalized privacy amplification, IEEE Trans. Inf. Theory, vol.50, issue.2, pp.394-400, 1995. ,
DOI : 10.1109/isit.1994.394668
URL : ftp://ftp.inf.ethz.ch/pub/publications/papers/ti/isc/wwwisc/BBCM95.ps
Extracting Secrecy from Jointly Gaussian Random Variables, 2006 IEEE International Symposium on Information Theory, pp.2593-2597, 2006. ,
DOI : 10.1109/ISIT.2006.262101
Information-theoretically secret key generation for fading wireless channels, IEEE Trans. Inf. Forensics Security, vol.5, issue.2, pp.240-154, 2010. ,
Key Generation Using External Source Excitation: Capacity, Reliability, and Secrecy Exponent, IEEE Transactions on Information Theory, vol.58, issue.4, pp.2455-2474, 2012. ,
DOI : 10.1109/TIT.2011.2176311
URL : http://arxiv.org/pdf/1110.6476
Adaptive wireless channel probing for shared key generation based on PID controller, IEEE Trans. Mobile Comput, vol.12, issue.9, pp.1842-1852, 2013. ,
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.3, pp.1550-1573 ,
DOI : 10.1109/SURV.2014.012314.00178
Secret Key Generation Via Localization and Mobility, IEEE Transactions on Vehicular Technology, vol.64, issue.6, pp.2214-2230, 2015. ,
DOI : 10.1109/TVT.2014.2342714
Secret-key agreement over unauthenticated public channels-part III: privacy amplification, IEEE Transactions on Information Theory, vol.49, issue.4, pp.839-851, 2003. ,
DOI : 10.1109/TIT.2003.809559
Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2535-2549, 2008. ,
DOI : 10.1109/TIT.2008.921689
Radiotelepathy: Extracting a cryptographic key from an un-authenticated wireless channel, Proc. 14th ACM Annual Int. Conf. Mobile Comput. Netw, 2008. ,
A novel physical layer authenticated encryption protocol exploiting shared randomness, 2015 IEEE Conference on Communications and Network Security (CNS), pp.113-118, 2015. ,
DOI : 10.1109/CNS.2015.7346818
Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary, IEEE/ACM Transactions on Networking, vol.20, issue.5, pp.1440-1451, 2012. ,
DOI : 10.1109/TNET.2012.2183146
Tag signals for early authentication and secret key generation in wireless public networks, Eur. Conf. Netw. Commun. (EuCNC), pp.108-112, 2015. ,
Gaussian jamming in blockfading channels under long term power constraints, Proc. Int. Symp. Inf. Theory (ISIT), pp.24-29, 2007. ,
DOI : 10.1109/isit.2007.4557116
The MIMO Radar and Jammer Games, IEEE Transactions on Signal Processing, vol.60, issue.2, pp.687-699, 2012. ,
DOI : 10.1109/TSP.2011.2169251
URL : http://www.engr.uconn.edu/msl/paper/Song/Song_2012.pdf
CSI Usage over Parallel Fading Channels under Jamming Attacks: A Game Theory Study, IEEE Transactions on Communications, vol.60, issue.4, pp.1167-1175, 2012. ,
DOI : 10.1109/TCOMM.2012.021712.100018
Strategic Power Allocation With Incomplete Information in the Presence of a Jammer, IEEE Transactions on Communications, vol.64, issue.8, pp.3467-3479, 2016. ,
DOI : 10.1109/TCOMM.2016.2577686
Anti-Jamming Transmission Stackelberg Game With Observation Errors, IEEE Communications Letters, vol.19, issue.6, pp.949-952, 2015. ,
DOI : 10.1109/LCOMM.2015.2418776
Exploiting Adversarial Jamming Signals for Energy Harvesting in Interference Networks, IEEE Transactions on Wireless Communications, vol.16, issue.2, pp.1267-1280, 2017. ,
DOI : 10.1109/TWC.2016.2643658
Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks, Applied Mathematics and Computation, vol.296, pp.153-167, 2017. ,
DOI : 10.1016/j.amc.2016.10.022
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper, IEEE Transactions on Signal Processing, vol.61, issue.1, pp.82-91, 2013. ,
DOI : 10.1109/TSP.2012.2222386
Physical-Layer Security: From Information Theory to Security Engineering, 2011. ,
DOI : 10.1017/CBO9780511977985
Spread Spectrum Communications Handbook. Electronic Ed, 2002. ,
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008. ,
DOI : 10.1109/SP.2008.9
URL : http://www.csg.ethz.ch/people/mariost/UFH_SP08.pdf
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques, IEEE Journal on Selected Areas in Communications, vol.28, issue.5, pp.703-715, 2010. ,
DOI : 10.1109/JSAC.2010.100608
Capacity of Gaussian channels with energy harvesting and processing cost, IEEE Trans. Inf. Theory, vol.60, issue.5, pp.2563-2575, 2014. ,
RF-Based Energy Harvesting in Decode-and-Forward Relaying Systems: Ergodic and Outage Capacities, IEEE Transactions on Wireless Communications, vol.14, issue.11, pp.6425-5434, 2015. ,
DOI : 10.1109/TWC.2015.2453418
Energy Harvesting Wireless Communications: A Review of Recent Advances, IEEE Journal on Selected Areas in Communications, vol.33, issue.3, pp.360-381, 2015. ,
DOI : 10.1109/JSAC.2015.2391531
MIMO broadcasting for silmutaneous wireless information and power transfer, pp.1989-2001, 2013. ,
Wireless Communications, 2005. ,
DOI : 10.1017/CBO9780511841224
Theory of games and economic behavior Proactive eavesdropping via jamming for rate maximization over rayleigh fading channels, IEEE Wireless Commun. Lett, vol.5, issue.1, pp.80-83, 2007. ,
she was a Postdoctoral Researcher in a joint project between Princeton University, USA and the Alcatel-Lucent Chair on Flexible Radio in Supélec, France. She is currently an Assistant Professor with ETIS, UMR 8051 For young women doctoral candidates in science, Sc. and Ph.D. degrees both from the Université Paris-Sud 11 CNRS, France, and Inria. She was one of the ten recipients of the L'Oréal?UNESCO?French Academy of Science Fellowship, 2007. ,
Eng. degree in EEE from the University of Patras (Greece) and a D.E.A. degree in Electronics at the University Pierre et Marie Curie -Paris VI (France), November 2005 she obtained her Ph.D. in EE from Imperial College London (UK). She undertook post-doctoral positions at the Universities of Southampton (UK), TCU (Greece) and UCL (UK), between 2005 and 2008. She has served as a Senior Lecturer in Communications at Middlesex University (UK) from, 2008. ,