-
1
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography,"IEEE Trans. on Information Theory, vol. 22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Trans. on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
2
-
-
38349004892
-
Amigo: Proximity-based authentication of mobile devices
-
A. Varshavsky, A. Scannell, A. LaMarca, and E. de Lara, "Amigo: Proximity-based authentication of mobile devices," in In Proceedings of UbiComp 2007: Ubiquitous Computing, 2007, pp. 253-270.
-
Proceedings of UbiComp 2007: Ubiquitous Computing, 2007
, pp. 253-270
-
-
Varshavsky, A.1
Scannell, A.2
LaMarca, A.3
De Lara, E.4
-
4
-
-
85027496257
-
Secret key reconciliation by public discussion
-
Advances in Crytology Proc. - Eurocrypt '93
-
G. Brassard and L. Salvail, "Secret key reconciliation by public discussion," Advances in Crytology Proc. - Eurocrypt '93, Lecture Notes in Computer Science, vol. 765, pp. 410-423, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 410-423
-
-
Brassard, G.1
Salvail, L.2
-
5
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
8
-
-
79961042146
-
-
"http://gnuradio.org/trac."
-
-
-
-
10
-
-
39049106144
-
A nearest-neighbor approach to estimating divergence between continuous random vectors
-
Q. Wang, S. R. Kulkarni, and S. Verdu, "A nearest-neighbor approach to estimating divergence between continuous random vectors," in Int. Symp. on Inform. Theory, 2006, pp. 242-246.
-
(2006)
Int. Symp. on Inform. Theory
, pp. 242-246
-
-
Wang, Q.1
Kulkarni, S.R.2
Verdu, S.3
-
11
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments,"in Proceedings of the 15th Annual International Conference on Mobile Computing and Networking (MobiCom '09), September 2009, pp. 321-332.
-
Proceedings of the 15th Annual International Conference on Mobile Computing and Networking (MobiCom '09), September 2009
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
12
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. of the 14th annual conference on mobile computing and systems (MobiCom 2008), San Francisco, CA, Sept 2008.
-
Proc. of the 14th Annual Conference on Mobile Computing and Systems (MobiCom 2008), San Francisco, CA, Sept 2008
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
13
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
Accepted for publication at the June preprint available at 2010
-
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. Mandayam, "Information-theoretically secret key generation for fading wireless channels," Accepted for publication at the IEEE Trans. on Information Forensics and Security, June 2010, preprint available at http://arxiv.org/abs/ 0910.5027, 2010.
-
(2010)
IEEE Trans. on Information Forensics and Security
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.6
-
14
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 401-410.
-
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
15
-
-
79551483702
-
Tool release: Gathering 802.11n traces with channel state information
-
[Online]. Available
-
D. Halperin, W. Hu, A. Sheth, and D. Wetherall, "Tool release: gathering 802.11n traces with channel state information,"SIGCOMM Comput. Commun. Rev., vol. 41, pp. 53-53. [Online]. Available: http://doi.acm.org/10. 1145/1925861.1925870
-
SIGCOMM Comput. Commun. Rev.
, vol.41
, pp. 53-53
-
-
Halperin, D.1
Hu, W.2
Sheth, A.3
Wetherall, D.4
-
16
-
-
77955002645
-
Ensemble: Cooperative proximity-based authentication
-
New York, NY, USA: ACM, [Online]. Available
-
A. Kalamandeen, A. Scannell, E. de Lara, A. Sheth, and A. LaMarca, "Ensemble: cooperative proximity-based authentication," in Proceedings of the 8th international conference on Mobile systems, applications, and services. New York, NY, USA: ACM, 2010, pp. 331-344. [Online]. Available: http://doi.acm.org/10.1145/1814433.1814466
-
(2010)
Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services
, pp. 331-344
-
-
Kalamandeen, A.1
Scannell, A.2
De Lara, E.3
Sheth, A.4
LaMarca, A.5
-
17
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
R. Mayrhofer and H. Gellersen, "Shake well before use: Intuitive and secure pairing of mobile devices," IEEE Transactions on Mobile Computing, vol. 8, no. 6, pp. 792-806, 2009.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, Issue.6
, pp. 792-806
-
-
Mayrhofer, R.1
Gellersen, H.2
-
18
-
-
38149059722
-
Key generation based on acceleration data of shaking processes
-
D. Bichleri, G. Stromberg, and M. Huemer, "Key generation based on acceleration data of shaking processes," Ubiquitous Computing 2007, pp. 304-317, 2007.
-
(2007)
Ubiquitous Computing 2007
, pp. 304-317
-
-
Bichleri, D.1
Stromberg, G.2
Huemer, M.3
-
19
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
ser. CCS '03. New York, NY, USA: ACM, [Online]. Available
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in Proceedings of the 10th ACM conference on Computer and communications security, ser. CCS '03. New York, NY, USA: ACM, 2003, pp. 52-61. [Online]. Available: http://doi.acm.org/10.1145/948109.948119
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
|