-
1
-
-
60149088258
-
Robust Key Generation from Signal Envelopes in Wireless Networks
-
New York, NY, USA, ACM
-
Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, and Bulent Yener. Robust Key Generation from Signal Envelopes in Wireless Networks. In CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security, pages 401-410, New York, NY, USA, 2007. ACM.
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
2
-
-
48049094399
-
Detecting and Localizing Wireless Spoofing Attacks
-
May
-
Y. Chen, W. Trappe, and R. Martin. Detecting and Localizing Wireless Spoofing Attacks. In Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, pages 193-202, May 2007.
-
(2007)
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks
, pp. 193-202
-
-
Chen, Y.1
Trappe, W.2
Martin, R.3
-
3
-
-
52149117439
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM Journal on Computing, 38:97, 2008.
-
(2008)
SIAM Journal on Computing
, vol.38
, pp. 97
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
5
-
-
0345253860
-
A Pseudorandom Generator from any One-way Function
-
Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby. A Pseudorandom Generator from any One-way Function. SIAM Journal on Computing, 28:12-24, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, pp. 12-24
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
7
-
-
52049085664
-
-
I. Martinovic, F. A. Zdarsky, M. Wilhelm, C. Wegmann, and Jens B. Schmitt. Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless. In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2008), Alexandria, VA, USA, March 2008.
-
I. Martinovic, F. A. Zdarsky, M. Wilhelm, C. Wegmann, and Jens B. Schmitt. Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless. In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2008), Alexandria, VA, USA, March 2008.
-
-
-
-
8
-
-
60149097098
-
Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel
-
New York, NY, USA, ACM
-
Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, and Alex Reznik. Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. In MobiCom '08: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pages 128-139, New York, NY, USA, 2008. ACM.
-
(2008)
MobiCom '08: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
9
-
-
0037396695
-
Secret-Key Agreement Over Unauthenticated Public Channels - Parts I-III
-
April
-
U. Maurer and S. Wolf. Secret-Key Agreement Over Unauthenticated Public Channels - Parts I-III. IEEE Transactions on Information Theory, 49(4):822-851, April 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.4
, pp. 822-851
-
-
Maurer, U.1
Wolf, S.2
-
12
-
-
58449108949
-
Universal Hash Functions for Emerging Ultra-Low-Power Networks
-
San Diego, CA, January, Society for Modeling and Simulation International SCS
-
Kaan Yüksel, Jens-Peter Kaps, and Berk Sunar. Universal Hash Functions for Emerging Ultra-Low-Power Networks. In Proceeding of The Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Diego, CA, January 2004. Society for Modeling and Simulation International (SCS).
-
(2004)
Proceeding of The Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS)
-
-
Yüksel, K.1
Kaps, J.-P.2
Sunar, B.3
|