[1] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. Di Renzo, “Safeguarding 5g Wireless Communication Networks Using Physical Layer Security,” IEEE Communications Magazine, vol. 53, no. 4, pp. 20–27, 2015.##
[2] C. E. Shannon, “A Mathematical Theory of Communication, Part i, Part ii,” Bell Syst. Tech. J., vol. 27, pp. 623–656, 1948.##
[3] C. E. Shannon, “Communication Theory of Secrecy Systems,” Bell Labs Technical Journal, vol. 28, no. 4, pp. 656–715, 1949.##
[4] A. D. Wyner, “The Wire-tap Channel,” Bell Labs Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975.##
[5] I. Csiszár and J. Korner, “Broadcast Channels with Confidential Messages,” IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339–348, 1978.##
[6] W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Trans. Inf. Theory, vol. 22, pp. 644–654, Nov. 1976.##
[7] A. Bidokhti, S. M. Pournaghei, and A. H. Khalili Tirandaz, “A Generalized Scheme for Extracting Biometric Keys from Keystroke Dynamics,” Journal of Electronical & Cyber Defence, vol. 5, no. 1, Serial no. 17, 2017. (In Persian)##
[8] R. Ahlswede and I. Csiszár, “Common Randomness in Information Theory and Cryptography. Part i: Secret Sharing,” IEEE Trans. Inf. Theory, vol. 39, pp. 1121–1132, Jul. 1993.##
[9] U. M. Maurer and S. Wolf, “Unconditionally Secure Key Agreement and the Intrinsic Conditional Information,” IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499–514, 1999.##
[10] M. Bloch, J. Barros, M. R. Rodrigues, and S. W. McLaughlin, “Wireless Information-Theoretic Security,” IEEE Trans. Inf. Theory, vol. 54, pp. 2515–2534, Jun. 2008.##
[11] R. Wilson, D. Tse, and R. A. Scholtz, “Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels,” IEEE Trans. Inf. Forens. Security, vol. 2, pp. 364–375, Sep. 2007.##
[12] S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, “Radiotelepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel,” In Proc. 14th ACM Int. Conf. Mobile Computing and Networking (MobiCom’08), pp. 128–139, Sep. 2008.##
[13] S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, “On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments,” in ACM MobiCom, 2009.##
[14] T. Shimizu, H. Iwai, and H. Sasaoka, “Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems,” IEEE Trans. Inf. Forens. Security, vol. 6, pp. 650–660, Sep. 2011.##
[15] J. M. Rüeger, Electronic Distance Measurement: An Introduction. Springer Science & Business Media, 2012.##
[16] J. J. Caffery Jr, Wireless Location in CDMA Cellular Radio Systems, vol. 535. Springer Science & Business edia, 2006.##
[17] C. Neuberg, P. Papadimitratos, C. Fragouli, and R. Urbanke, “A Mobile World of Security- the Model,” in Information Sciences and Systems (CISS), 2011 45th Annual Conference on, pp. 1–6, IEEE, 2011.##
[18] O. Gungor, F. Chen, and C. E. Koksal, “Secret Key Generation via Localization and Mobility,” IEEE Trans. on Veh. Technol., vol. 64, pp. 2214–2230, Jun. 2015.##
[19] N. Kazempour, M.Mirmohseni, and MR.Aref. "New Techniques for Localization Based Information Theoretic Secret Key Agreement," In 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), pp. 70-76. IEEE, 2017.##
[20] S. Salimi and P. Papadimitratos, “Pairwise Secret Key Agreement Based on Location-Derived Common Randomness,” arXiv preprint arXiv:1512.08652, 2015.##
[21] C. R. Rao, Linear Statistical Inference and Its Applications. New York:Wiley, 2nd ed., 1973.##
[22] Y. Qi and H. Kobayashi, “Cramer-Rao Lower Bound for Geolocation in Non-Line-of-Sight Environment,” in Proc. IEEE Conf. Acoustics, Speech, Signal Process., pp. 2473–2476, May 2002.##
[23] D. Bharadia, E. McMilin, and S. Katti, “Full Duplex Radios,” ACM SIGCOM.##
[24] S. Gezici, M. R. Gholami, S. Bayram, and M. Jansson, “Jamming of Wireless Localization Systems,” IEEE Trans. on Commun., vol. 64, pp. 2660–2676, Jun. 2016.##
[25] L. Gerdes, M. Riemensberger, and W. Utschick, “On the Equivalence of Degraded Gaussian MIMO Broadcast Channels,” Smart Antennas (WSA 2015); Proceedings of the 19th International ITG Workshop on, pp. 1–5, VDE, 2015.##