-
2
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
ACM
-
S. Mathur, W. Trappe, N. B. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: extracting a secret key from an unauthenticated wireless channel." in MOBICOM. ACM, 2008, pp. 128-139.
-
(2008)
MOBICOM
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.B.3
Ye, C.4
Reznik, A.5
-
3
-
-
0001998264
-
Conjugate coding
-
S. Wiesner, "Conjugate coding," ACM Sigact News, vol. 15, no. 1, pp. 78-88, 1983.
-
(1983)
ACM Sigact News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
-
4
-
-
70450242725
-
On the effectiveness of secret key extraction using wireless signal strength in real environments
-
S. Jana, S. P. Nandha, M. Clark, S. K. Kasera, N. Patwari, and S. Krishnamurty, "On the effectiveness of secret key extraction using wireless signal strength in real environments," in Mobicom, 2009.
-
(2009)
Mobicom
-
-
Jana, S.1
Nandha, S.P.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurty, S.6
-
5
-
-
39049156464
-
Extracting secrecy from jointly gaussian random variables
-
C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly gaussian random variables," in Information Theory, 2006 IEEE International Symposium on, July 2006, pp. 2593-2597.
-
Information Theory, 2006 IEEE International Symposium On, July 2006
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
-
7
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
R. Impagliazzo, L. A. Levin, and M. Luby, "Pseudo-random generation from one-way functions," in STOC'89, 1989.
-
(1989)
STOC'89
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
10
-
-
77953312318
-
Advances in network simulation (ns)
-
L. Breslau, D. Estrin, K. Fall, S. Floyd, J. Heidemann, A. Helmy, P. Huang, S. McCanne, K. Varadhan, Y. Xu, and H. Yu., "Advances in network simulation (ns)," IEEE Computer, 2000.
-
(2000)
IEEE Computer
-
-
Breslau, L.1
Estrin, D.2
Fall, K.3
Floyd, S.4
Heidemann, J.5
Helmy, A.6
Huang, P.7
McCanne, S.8
Varadhan, K.9
Xu, Y.10
Yu, H.11
-
11
-
-
51349144836
-
On the levy-walk nature of human mobility
-
IEEE April
-
I. Rhee, M. Shin, S. Hong, K. Lee, and S. Chong, "On the levy-walk nature of human mobility," INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, pp. 924-932, April 2008.
-
(2008)
INFOCOM 2008. the 27th Conference on Computer Communications
, pp. 924-932
-
-
Rhee, I.1
Shin, M.2
Hong, S.3
Lee, K.4
Chong, S.5
-
12
-
-
60149103674
-
Advancing wireless link signatures for location distinction
-
J. Zhang, M. H. Firooz, N. Patwari, and S. K. Kasera, "Advancing wireless link signatures for location distinction," in ACM Intl. Conf. on Mobile Computing Networking (Mobicom'08), Sept. 2008.
-
ACM Intl. Conf. on Mobile Computing Networking (Mobicom'08), Sept. 2008
-
-
Zhang, J.1
Firooz, M.H.2
Patwari, N.3
Kasera, S.K.4
|