[1] |
HAN G , JIANG J , SUN N ,et al. Secure communication for underwater acoustic sensor networks[J]. IEEE Communications Magazine, 2015,53(8): 54-60.
|
[2] |
LAL C , PETROCCIA R , PELEKANAKIS K ,et al. Toward the development of secure underwater acoustic networks[J]. IEEE Journal of Oceanic Engineering, 2017,42(4): 1075-1087.
|
[3] |
CHEN K , MA M , CHENG E ,et al. A survey on MAC protocols for underwater wireless sensor networks[J]. IEEE Communications Surveys & Tutorials, 2014,16(3): 1433-1447.
|
[4] |
笪良龙 . 海洋水声环境效应建模与应用[M]. 北京: 科学出版社, 2012.
|
|
DA L L . Modeling and application of oceanic acoustic environmental effect[M]. Beijing: Science PressPress, 2012.
|
[5] |
G?DEL K . On formally undecidable propositions of principia mathematica and related systems[M]. Courier Corporation, 1992.
|
[6] |
BENNETT C H , BRASSARD G , ROBERT J M . Privacy amplification by public discussion[J]. Siam Journal on Computing, 1988,17(2): 210-229.
|
[7] |
HAYASHI M , TAN Y F . Equivocations,exponents,and second-order coding rates under various Rényi information measures[J]. IEEE Transactions on Information Theory, 2017,63(2): 975-1005.
|
[8] |
JIANG Z , ZHOU J . A note on spectral norms of even-order r-circulant matrices[J]. Applied Mathematics and Computation, 2015,250: 368-371.
|
[9] |
KRESSNER D , LUCE R . Fast computation of the matrix exponential for a Toeplitz matrix[J]. SIAM Journal on Matrix Analysis and Applications, 2018,39(1): 23-47.
|
[10] |
BENNETT C H , BRASSARD G , CREPEAU C ,et al. Generalized privacy amplification[J]. IEEE Transactions on Information Theory, 1995,41(6): 1915-1923.
|
[11] |
ANCEAUME E , BUSNEL Y . A distributed information divergence estimation over data streams[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(2): 478-487.
|
[12] |
HAYASHI M . Security analysis of ε-almost dual universal2hash functions:smoothing of min entropy vs.smoothing of Rényi entropy of order 2[J]. IEEE Transactions on Information Theory, 2016,62(6): 3451-3476.
|
[13] |
WEGMAN M N , CARTER J L . New hash functions and their use in authentication and set equality[J]. Journal of Computer and System Sciences, 1981,22(3): 265-279.
|
[14] |
MAURER U , WOLF S . Secret-key agreement over unauthenticated public channels-part Ⅲ:privacy amplification[J]. IEEE Transactions on Information Theory, 2003,49(4): 832-838.
|
[15] |
BERTA M , FAWZI O , SCHOLZ V . Quantum-proof randomness extractors via operator space theory[J]. IEEE Transactions on Information Theory, 2017,63(4): 2480-2503.
|
[16] |
MILLER C A , SHI Y . Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices[J]. Journal of the ACM, 2016,63(4):33.
|
[17] |
TAN Y F , HAYASHI M . Analysis of remaining uncertainties and exponents under various conditional Rényi entropies[J]. IEEE Transactions on Information Theory, 2018,64(5): 3734-3755.
|
[18] |
ISHII M , DETREY J , GAUDRY P ,et al. Fast modular arithmetic on the Kalray MPPA-256 processor for an energy-efficient implementation of ECM[J]. IEEE Transactions on Computers, 2017,66(12): 2019-2030.
|
[19] |
KRAFT J , WASHINGTON L . An introduction to number theory with cryptography[M]. Chapman and Hall/CRC Press, 2018.
|
[20] |
HAYASHI M , TSURUMARU T . More efficient privacy amplification with less random seeds via dual universal hash function[J]. IEEE Transactions on Information Theory, 2016,62(4): 2213-2232.
|
[21] |
BARDENET R , DOUCET A , HOLMES C . On Markov chain Monte Carlo methods for tall data[J]. The Journal of Machine Learning Research, 2017,18(1): 1515-1557.
|
[22] |
王栋, 吴吉春 . 信息熵理论在水系统中的研究与应用[M]. 北京: 中国水利水电出版社, 2012.
|
|
WANG D , WU J C . Research and application of Information entropy theory in water system[M]. Beijing: China Water and Power PressPress, 2012.
|
[23] |
AMAR A , AVRASHI G , STOJANOVIC M . Low complexity residual doppler shift estimation for underwater acoustic multicarrier communication[J]. IEEE Transactions on Signal Processing, 2017,65(8): 2063-2076.
|