-
2
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
New York, NY, USA. ACM
-
Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, and Bulent Yener. Robust Key Generation from Signal Envelopes in Wireless Networks. In CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security, pages 401-410, New York, NY, USA, 2007. ACM.
-
(2007)
CCS ' 07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
3
-
-
34247224664
-
Key distribution mechanisms for wireless sensor networks: A survey, 2005
-
Computer Science Department, March
-
S. A. Camtepe and B. Yener. Key Distribution Mechanisms for Wireless Sensor Networks: A Survey, 2005. Technical Report TR-05-07 Renesselaer Polytechnic Institute, Computer Science Department, March 2005.
-
(2005)
Technical Report TR-05-07 Renesselaer Polytechnic Institute
-
-
Camtepe, S.A.1
Yener, B.2
-
4
-
-
0016473669
-
The probability plot correlation coefficient test for normality
-
James J. Filliben. The probability plot correlation coefficient test for normality. Technometrics, 17(1):111-117, 1975.
-
(1975)
Technometrics
, vol.17
, Issue.1
, pp. 111-117
-
-
Filliben, J.J.1
-
6
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
A. Liu and P. Ning. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Information Processing in Sensor Networks, 2008. IPSN'08. International Conference on, pages 245-256, 2008.
-
(2008)
IPSN'08. International Conference on 245-256
-
-
Liu, A.1
Ning, P.2
-
7
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
New York, NY, USA. ACM
-
Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, and Alex Reznik. Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. In MobiCom '08: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pages 128-139, New York, NY, USA, 2008. ACM.
-
(2008)
MobiCom ' 08: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
8
-
-
77952412339
-
Unbreakable keys from random noise
-
P. Tuyls, B. Skoric, and T. Kevenaar, editors. Springer-Verlag
-
Ueli Maurer, Renato Renner, and Stefan Wolf. Unbreakable keys from random noise. In P. Tuyls, B. Skoric, and T. Kevenaar, editors, Security with Noisy Data, pages 21-44. Springer-Verlag, 2007.
-
(2007)
Security with Noisy Data
, pp. 21-44
-
-
Maurer, U.1
Renner, R.2
Wolf, S.3
-
10
-
-
0040973114
-
Entropy estimation of symbol sequences
-
Thomas Schürmann and Peter Grassberger. Entropy estimation of symbol sequences. CHAOS, 6:414, 1996.
-
(1996)
CHAOS
, vol.6
, pp. 414
-
-
Schürmann, T.1
Grassberger, P.2
-
11
-
-
54849406264
-
Detecting 802.11 MAC layer spoofing using received signal strength
-
April
-
Yong Sheng, Keren Tan, Guanling Chen, David Kotz, and Andrew Campbell. Detecting 802.11 MAC layer spoofing using received signal strength. In Proceedings of the 27th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pages 1768-1776, April 2008.
-
(2008)
Proceedings of the 27th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)
, pp. 1768-1776
-
-
Sheng, Y.1
Tan, K.2
Chen, G.3
Kotz, D.4
Campbell, A.5
-
12
-
-
77952366141
-
How well do practical information measures estimate the Shannon entropy?
-
IEEE
-
Ulrich Speidel, Mark Titchener, and Jia Yang. How well do practical information measures estimate the Shannon entropy? In Proc. of the Fifth International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP 2006), pages 861-865. IEEE, 2006.
-
(2006)
Proc. of the Fifth International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP 2006)
, pp. 861-865
-
-
Speidel, U.1
Titchener, M.2
Yang, J.3
-
13
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
March
-
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul Gupta, and Sheueling Chang Shantz. Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In Proceedings of the third annual IEEE International Conference on Pervasive Computing and Communications (PerCom '05), pages 324-328, March 2005.
-
(2005)
Proceedings of the Third Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '05)
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Chang Shantz, S.5
-
14
-
-
74549208614
-
On key agreement in wireless sensor networks based on radio transmission properties
-
Princeton, New Jersey, USA, October. IEEE Computer Society
-
Matthias Wilhelm, Ivan Martinovic, and Jens B. Schmitt. On Key Agreement in Wireless Sensor Networks based on Radio Transmission Properties. In Proceedings of the 5th Annual Workshop on Secure Network Protocols (NPSec), pages 37-42, Princeton, New Jersey, USA, October 2009. IEEE Computer Society.
-
(2009)
Proceedings of the 5th Annual Workshop on Secure Network Protocols (NPSec)
, pp. 37-42
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
-
15
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
-
Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway. A Survey of Key Management Schemes in Wireless Sensor Networks. Computer communications, 30(11-12):2314-2341, 2007. (Pubitemid 47285291)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
|