-
1
-
-
84869665602
-
-
http://en.wikipedia.org/wiki/key size.
-
-
-
-
2
-
-
84869671702
-
-
http://www.tinyos.net.
-
-
-
-
3
-
-
70349712498
-
Dialog codes for secure wireless communications
-
Technical Report, Ohio State University, OSU-CISRC-5/08-TR23
-
A. Arora and L. Sang. Dialog codes for secure wireless communications. Technical Report, Ohio State University, OSU-CISRC-5/08-TR23, 2008.
-
(2008)
-
-
Arora, A.1
Sang, L.2
-
4
-
-
85062838317
-
Safeguarding cryptographic keys
-
June
-
G. Blakley. Safeguarding cryptographic keys. Proc. AFIPS 1979 NCC, 48:pp. 313-317, June 1979.
-
(1979)
Proc. AFIPS 1979 NCC
, vol.48
, pp. 313-317
-
-
Blakley, G.1
-
5
-
-
77953853641
-
Shake them up!: A movement-based pairing protocol for cpu-constrained devices
-
C. Castelluccia and P. Mutaf. Shake them up!: a movement-based pairing protocol for cpu-constrained devices. Mobisys, 2005.
-
(2005)
Mobisys
-
-
Castelluccia, C.1
Mutaf, P.2
-
6
-
-
0022199386
-
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. FOCS85, pages pp. 383-395, 1985.
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. FOCS85, pages pp. 383-395, 1985.
-
-
-
-
7
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner. Broadcast channels with confidential messages. IEEE Trans. Information Theory, 24(3):339-348, May 1978.
-
(1978)
IEEE Trans. Information Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
11
-
-
55349095058
-
The wiretap channel with feedback: Encryption over the channel
-
Nov
-
L. Lai, H. E. Gamal, and H. V. Poor. The wiretap channel with feedback: Encryption over the channel. IEEE Transactions on Information Theory, 54(11):5059-5067, Nov 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.11
, pp. 5059-5067
-
-
Lai, L.1
Gamal, H.E.2
Poor, H.V.3
-
14
-
-
84869673512
-
-
MoteIV
-
MoteIV. http://www.moteiv.com/.
-
-
-
-
17
-
-
51449114762
-
Secure wireless communications: Secret keys through multipath
-
A. Sayeed and A. Perrig. Secure wireless communications: Secret keys through multipath. ICASSP, 2008.
-
(2008)
ICASSP
-
-
Sayeed, A.1
Perrig, A.2
-
18
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
20
-
-
45249101530
-
-
E. Tekin and A. Yener. The general gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming. IEEE Transactions on Information Theory - Special Issue on Information Theoretic Security, 54(6):2735-2751, 2008.
-
E. Tekin and A. Yener. The general gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming. IEEE Transactions on Information Theory - Special Issue on Information Theoretic Security, 54(6):2735-2751, 2008.
-
-
-
-
21
-
-
34547922334
-
Applications of ldpc codes to the wiretap channel
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla. Applications of ldpc codes to the wiretap channel. IEEE Transactions on Information Theory, 53(8):2933-2945, 2007.
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
22
-
-
0026219389
-
Generalized hamming weights for linear codes
-
V. K. Wei. Generalized hamming weights for linear codes. IEEE Transactions on Information Theory, 37(5):1412-1418, 1991.
-
(1991)
IEEE Transactions on Information Theory
, vol.37
, Issue.5
, pp. 1412-1418
-
-
Wei, V.K.1
-
23
-
-
0016562514
-
The wire-tap channel. in
-
A. D. Wyner. The wire-tap channel. in Bell Syst. Tech. J., 54(8), pages 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|