SEARCH

SEARCH BY CITATION

References

  • 1
    Sun H, Lin DD. Dynamic security analysis of group key agreement protocol. IEE Proceedings on Communications 2005; 152(2): 134137.
  • 2
    Rizomiliotis P, Rekleitis E, Gritzalis S. Security analysis of the Song–Mitchell authentication protocol for low-cost RFID tags. IEEE Communications Letters 2009; 13(4): 274276.
  • 3
    Lim IH, Hong S, Choi MS, et al. Security protocols against cyber attacks in the distribution automation system. IEEE Transactions on Power Delivery 2010; 25(1): 448455.
  • 4
    Wong FL, Stajano F. Security protocols against cyber attacks in the distribution automation system. IEEE Transactions on Pervasive Computing 2007; 6(4): 3139.
  • 5
    Narayanan RM. Through-wall radar imaging using UWB noise waveforms. Journal of the Franklin Institute 2008; 345(6): 659678.
  • 6
    Di Benedetto MG, Giancola G. Understanding Ultra Wideband Radio Fundamentals. Prentice Hall: Upper Saddle River, New Jersey, 2004.
  • 7
    Reed JH. An Introduction to Ultra Wideband Communication Systems. Prentice Hall: Upper Saddle River, New Jersey, 2005.
  • 8
    Narayanan RM, Xu Y, Hoffmeyer PD, Curtis JO. Design, performance, and applications of a coherent ultra wideband random noise radar. Optical Engineering 1998; 37(6): 18551869.
  • 9
    Candés E, Romberg J. Sparse and incoherence in compressive sampling. Inverse Problem 2007; 23(3): 969985.
  • 10
    Candés E, Wakin M. An introduction to compressive sensing. IEEE Signal Processing Magazine 2008; 25(3): 2130.
  • 11
    Candés E, Romberg J, Tao T. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Transactions on Information Theory 2006; 52(2): 485509.
  • 12
    Candés EJ. The restricted isometry property and its implications for compressed sensing. Compte Rendus de l'Academie des Sciences, Paris, Series I 2008; 346: 589592.
  • 13
    Donoho DL. Compressed Sensing. IEEE Transactions on Information Theory 2006; 52(4): 12891306.
  • 14
    Donoho DL, Huo X. Uncertainty principles and ideal atomic decomposition. IEEE Transactions on Information Theory 2002; 47(7): 28452862.
  • 15
    Baraniuk R, Davenport M, Devore R, Wakin M. A simple proof of the restricted isometry property for random matrices. Constructive Approximation 2008; 28(3): 253263.
  • 16
    Baraniuk R. Compressive sensing. IEEE Signal Processing Magazine n.d; 24(4): 118121.
  • 17
    Tropp J, Gilbert AC. Signal recovery from partial information via orthogonal matching pursuit. IEEE Transactions on Information Theory 2007; 53(12): 46554666.
  • 18
    Bertsimas D, Tsitsiklis JN. Introduction to Linear Optimization. Athena Scientific: Nashua, NH, USA, 1997.
  • 19
    Shannon CE. Communication theory of secrecy systems. Bell System Technical Journal 1949; 28(4): 656715.
  • 20
    Rachlin Y, Baron D. The secrecy of compressed sensing measurements. 46th Annual Allerton Conference on Communication, Control, and Computing, 2008; 813817.