-
1
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. L. Rivest, A. Shamir and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
2
-
-
84900358192
-
-
U.S. National Bureau of Standards (NBS) Data Encryption Standard, Federal Information Processing Standards Publication 46 (FIPS-46), 1977.
-
U.S. National Bureau of Standards (NBS) "Data Encryption Standard," Federal Information Processing Standards Publication 46 (FIPS-46), 1977.
-
-
-
-
5
-
-
33646382089
-
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
-
Feb
-
N. R. Potlapally, S. Ravi, A. Raghunath and N. K. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Transactions on Mobile Computing, vol. 5, no. 2, pp. 128-143, Feb. 2006.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunath, A.3
Jha, N.K.4
-
6
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
Feb
-
H. Yang, H. Luo, F. Ye, S. Lu and L. Zhang, "Security in mobile ad hoc networks: challenges and solutions," IEEE Transactions on Wireless Communications, vol. 11, issue 1, pp. 38-47, Feb. 2004.
-
(2004)
IEEE Transactions on Wireless Communications
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
7
-
-
33646918277
-
Dynamic key management in sensor networks
-
April
-
M. Eltoweissy, M. Moharrum and R. Mukkamala, "Dynamic key management in sensor networks," IEEE Communications Magazine, vol. 44, issue 4, pp. 122-130, April 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 122-130
-
-
Eltoweissy, M.1
Moharrum, M.2
Mukkamala, R.3
-
8
-
-
33646918331
-
Evaluation of security mechanisms in wireless sensor networks
-
Aug
-
G. Guimaraes, E. Souto, D. Sadok, J. Kelner, "Evaluation of security mechanisms in wireless sensor networks," Proceedings of IEEE Systems Communications, pp. 428-433, Aug. 2005.
-
(2005)
Proceedings of IEEE Systems Communications
, pp. 428-433
-
-
Guimaraes, G.1
Souto, E.2
Sadok, D.3
Kelner, J.4
-
9
-
-
0016562514
-
The wire-tap channel
-
A. Wyner, "The wire-tap channel," Bell Systems Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Systems Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
11
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 733-742, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
12
-
-
0347337828
-
Secure space-time communication
-
A. O. Hero, III, "Secure space-time communication," IEEE Transactions on Information Theory, vol. 49, no. 12, pp. 3235-3249, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero III, A.O.1
-
13
-
-
44049105403
-
On the Secrecy Capacity of Fading Channels
-
Unpublished, at www.ece.osu.edu/̃helgamal
-
P. K. Gopala, L. Lai and H. El Gamal, "On the Secrecy Capacity of Fading Channels," Unpublished. (at www.ece.osu.edu/̃helgamal).
-
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
14
-
-
77954445239
-
Secure communication over fading channels
-
Sept
-
Y. Liang, H. V. Poor, "Secure communication over fading channels," Proceedings of 44th Annual Allerton Conference on Communication, Control, and Computing, Sept. 2006.
-
(2006)
Proceedings of 44th Annual Allerton Conference on Communication, Control, and Computing
-
-
Liang, Y.1
Poor, H.V.2
-
15
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
Jan
-
J. E. Hershey, A. A. Hassan and R. Yarlagadda, "Unconventional cryptographic keying variable management," IEEE Transaction on Communications, vol 43, no. 1, Jan. 1995.
-
(1995)
IEEE Transaction on Communications
, vol.43
, Issue.1
-
-
Hershey, J.E.1
Hassan, A.A.2
Yarlagadda, R.3
-
16
-
-
60149088258
-
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado and B. Yener Robust key generation from signal envelopes in wireless networks, to appear in 14th ACM Conference on Computer and Communications Security (CCS), 2007.
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado and B. Yener "Robust key generation from signal envelopes in wireless networks," to appear in 14th ACM Conference on Computer and Communications Security (CCS), 2007.
-
-
-
-
17
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Transactions on Antennas and Propagation, vol. 53, no. 11, pp. 3776-3784, 2005.
-
(2005)
IEEE Transactions on Antennas and Propagation
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
18
-
-
0033881606
-
Secure information transmission for mobile radio
-
H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," IEEE Communication Letters, vol. 4, no. 1, pp. 52-55, 2000.
-
(2000)
IEEE Communication Letters
, vol.4
, Issue.1
, pp. 52-55
-
-
Koorapaty, H.1
Hassan, A.2
Chennakeshu, S.3
-
19
-
-
84863732923
-
A physical transmission security layer for wireless multiple access communication systems
-
Sep
-
G. R. Tsouri and D. Wulich, "A physical transmission security layer for wireless multiple access communication systems," European Signal Processing Conference (EUSIPCO), Sep. 2007.
-
(2007)
European Signal Processing Conference (EUSIPCO)
-
-
Tsouri, G.R.1
Wulich, D.2
-
21
-
-
15344345377
-
Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications
-
IEEE, November
-
IEEE, Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE Standard 802.16e, November 2005
-
(2005)
IEEE Standard 802.16e
-
-
-
22
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Systems Technical Journal, vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Systems Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
24
-
-
84900372545
-
-
A. Viterbi, Principles of Coherent Communication, McGraw-Hill, 1966.
-
A. Viterbi, Principles of Coherent Communication, McGraw-Hill, 1966.
-
-
-
|