The Internet Archive has a preservation copy of this work in our general collections.
The file type is
In Part I of this two-part paper on confidential communication over wireless channels, we studied the fundamental security limits of quasi-static fading channels from the point of view of outage secrecy capacity with perfect and imperfect channel state information. In Part II, we develop a practical secret key agreement protocol for Gaussian and quasi-static fading wiretap channels. The protocol uses a four-step procedure to secure communications: establish common randomness via anarXiv:cs/0611121v1 fatcat:2gwzchjtoza77hcva3txd7wqye