-
1
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. Antennas and Propagation, IEEE Transactions on, 53(11):3776-3784, 2005.
-
(2005)
Antennas and Propagation, IEEE Transactions on
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
2
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
Nov.
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 401-410, Nov. 2007.
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
6
-
-
0027627694
-
The indoor radio propagation channel
-
H. Hashemi. The indoor radio propagation channel. Proceedings of the IEEE, 81(7):943-968, 1993.
-
(1993)
Proceedings of the IEEE
, vol.81
, Issue.7
, pp. 943-968
-
-
Hashemi, H.1
-
7
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
Jan.
-
J. Hershey, A. Hassan, and R. Yarlagadda. Unconventional cryptographic keying variable management. IEEE Trans. Commun., 43(1):3-6, Jan. 1995.
-
(1995)
IEEE Trans. Commun.
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.1
Hassan, A.2
Yarlagadda, R.3
-
9
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
ACM
-
S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the 15th annual international conference on Mobile computing and networking, pages 321-332. ACM, 2009.
-
(2009)
Proceedings of the 15th Annual International Conference on Mobile Computing and Networking
, pp. 321-332
-
-
Jana, S.1
Premnath, S.2
Clark, M.3
Kasera, S.4
Patwari, N.5
Krishnamurthy, S.6
-
12
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
D. Malan, M. Welsh, and M. Smith. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In Sensor and Ad Hoc Communications and Networks, 2004, pages 71-80, 2004.
-
(2004)
Sensor and Ad Hoc Communications and Networks, 2004
, pp. 71-80
-
-
Malan, D.1
Welsh, M.2
Smith, M.3
-
13
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
ACM New York, NY, USA
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 128-139. ACM New York, NY, USA, 2008.
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
17
-
-
72249083097
-
High rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
Jan
-
N. Patwari, J. Croft, S. Jana, and S. Kasera. High rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing, Jan 2010. http://span.ece.utah.edu/uploads/ hrubeJournalr1.pdf.
-
(2010)
IEEE Transactions on Mobile Computing
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, S.4
-
18
-
-
3843081053
-
A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications
-
A. Rukhin et al. A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications. NIST Special Publication, pages 800-822, 2001.
-
(2001)
NIST Special Publication
, pp. 800-822
-
-
Rukhin, A.1
|