-
1
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
ACM
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in CCS '07: Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 401-410.
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
2
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
ACM
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: extracting a secret key from an unauthenticated wireless channel," in MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networking. ACM, 2008, pp. 128-139.
-
(2008)
MobiCom '08: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
4
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels.I. definitions and a completeness result
-
April
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels .I. definitions and a completeness result," Information Theory, IEEE Transactions on, vol. 49, no. 4, pp. 822-831, April 2003.
-
(2003)
Information Theory, IEEE Transactions on
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.1
Wolf, S.2
-
5
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM Journal on Computing, vol. 26, pp. 1484-1509, 1997.
-
(1997)
SIAM Journal on Computing
, vol.26
, pp. 1484-1509
-
-
Shor, P.W.1
-
6
-
-
70349883977
-
Key generation exploiting mimo channel evolution: Algorithm and theoretical limits
-
European Association on Antennas and Propagation
-
J. W. Wallace, C. Chen, and M. A. Jensen, "Key generation exploiting mimo channel evolution: algorithm and theoretical limits," in Proceedings of 3rd European Conference on Antennas and Propagation. European Association on Antennas and Propagation, 2009.
-
(2009)
Proceedings of 3rd European Conference on Antennas and Propagation
-
-
Wallace, J.W.1
Chen, C.2
Jensen, M.A.3
-
7
-
-
0033881606
-
Secure information transmission for mobile radio
-
Feburary
-
H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," IEEE Communications Letters, vol. 4, no. 2, pp. 52-55, Feburary 2000.
-
(2000)
IEEE Communications Letters
, vol.4
, Issue.2
, pp. 52-55
-
-
Koorapaty, H.1
Hassan, A.2
Chennakeshu, S.3
-
8
-
-
33947126657
-
Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels: RSSI interleaving scheme
-
October
-
T. Aono, K. Higuchi, M. Taromaru, T. Ohira, and H. Sasaoka, "Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels : RSSI interleaving scheme," Wireless Technology, 2005. The European Conference on, pp. 173-176, October 2005.
-
(2005)
Wireless Technology, 2005 the European Conference on
, pp. 173-176
-
-
Aono, T.1
Higuchi, K.2
Taromaru, M.3
Ohira, T.4
Sasaoka, H.5
-
9
-
-
50249098715
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
September
-
R. Wilson, D. Tse, and R. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," Ultra-Wideband, 2007. ICUWB 2007. IEEE International Conference on, pp. 270-275, September 2007.
-
(2007)
Ultra-Wideband, 2007. ICUWB 2007. IEEE International Conference on
, pp. 270-275
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.3
-
11
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
12
-
-
39049156464
-
Extracting secrecy from jointly gaussian random variables
-
July
-
C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly gaussian random variables," Information Theory, 2006 IEEE International Symposium on, pp. 2593-2597, July 2006.
-
(2006)
Information Theory, 2006 IEEE International Symposium on
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
-
13
-
-
0001777508
-
Linking information reconciliation and privacy amplification
-
C. Cachin and U. M. Maurer, "Linking information reconciliation and privacy amplification," Journal of Cryptology, vol. 10, pp. 97-110, 1997.
-
(1997)
Journal of Cryptology
, vol.10
, pp. 97-110
-
-
Cachin, C.1
Maurer, U.M.2
-
14
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, "Wireless information-theoretic security," Information Theory, IEEE Transactions on, vol. 54, no. 6, pp. 2515-2534, June 2008.
-
(2008)
Information Theory, IEEE Transactions on
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.4
-
15
-
-
0036687246
-
A stochastic mimo radio channel model with experimental validation
-
August
-
J. Kermoal, L. Schumacher, K. Pedersen, P. Mogensen, and F. Frederiksen, "A stochastic mimo radio channel model with experimental validation," Selected Areas in Communications, IEEE Journal on, vol. 20, no. 6, pp. 1211-1226, August 2002.
-
(2002)
Selected Areas in Communications, IEEE Journal on
, vol.20
, Issue.6
, pp. 1211-1226
-
-
Kermoal, J.1
Schumacher, L.2
Pedersen, K.3
Mogensen, P.4
Frederiksen, F.5
-
17
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
18
-
-
0037356065
-
Distributed source coding using syndromes (discus): Design and construction
-
Mar
-
S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (discus): design and construction," Information Theory, IEEE Transactions on, vol. 49, no. 3, pp. 626-643, Mar 2003.
-
(2003)
Information Theory, IEEE Transactions on
, vol.49
, Issue.3
, pp. 626-643
-
-
Pradhan, S.1
Ramchandran, K.2
-
19
-
-
0026015905
-
Approximate entropy as a measure of system complexity
-
National Academy of Sciences of the USA, March
-
S. M. Pincus, "Approximate entropy as a measure of system complexity," in Proceedings of the National Academy of Sciences of the USA. National Academy of Sciences of the USA, March 1991, pp. 2297-2301.
-
(1991)
Proceedings of the National Academy of Sciences of the USA
, pp. 2297-2301
-
-
Pincus, S.M.1
-
20
-
-
39749164774
-
Estimating mutual information
-
Jun
-
A. Kraskov, H. Stögbauer, and P. Grassberger, "Estimating mutual information," Phys. Rev. E, vol. 69, no. 6, p. 066138, Jun 2004.
-
(2004)
Phys. Rev. E
, vol.69
, Issue.6
, pp. 066138
-
-
Kraskov, A.1
Stögbauer, H.2
Grassberger, P.3
-
21
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in the ether: Using the physical layer for wireless authentication," in IEEE ICC'07, 2007, pp. 4646-4651.
-
(2007)
IEEE ICC'07
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
|