-
1
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis et al., "Fuzzy Extractors: How to Generate Strong Keys From Biometrics and Other Noisy Data," SIAM J. Comp., vol. 38, no. 1, 2008, pp. 97-139.
-
(2008)
SIAM J. Comp.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
-
2
-
-
67650671123
-
Key agreement from close secrets over unsecured channels
-
Apr.
-
B. Kanukurthi and L. Reyzin, "Key Agreement from Close Secrets Over Unsecured Channels," Proc. EUROCRYPT '09, Apr. 2009, pp. 206-23.
-
(2009)
Proc. EUROCRYPT '09
, pp. 206-223
-
-
Kanukurthi, B.1
Reyzin, L.2
-
3
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication Theory of Secrecy Systems," Bell Sys. Tech. J., vol. 28, no. 4, 1949, pp. 656-715.
-
(1949)
Bell Sys. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
4
-
-
77951458752
-
Information-theoretically secure secret- key agreement by not authenticated public discussion
-
May
-
U. M. Maurer, "Information-Theoretically Secure Secret- Key Agreement by Not Authenticated Public Discussion," Proc. EURO-CRYPT '97, May 1997, pp. 209-25.
-
(1997)
Proc. EURO-CRYPT '97
, pp. 209-225
-
-
Maurer, U.M.1
-
5
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
DOI 10.1006/dspr.1996.0023
-
A. A. Hassan et al., "Cryptographic Key Agreement for Mobile Radio," Digital Sig. Proc., vol. 6, 1996, pp. 207-12. (Pubitemid 126395658)
-
(1996)
Digital Signal Processing: A Review Journal
, vol.6
, Issue.4
, pp. 207-212
-
-
Hassan, A.A.1
Stark, W.E.2
Hershey, J.E.3
Chennakeshu, S.4
-
6
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
Oct.
-
B. Azimi-Sadjadi et al., "Robust Key Generation from Signal Envelopes in Wireless Networks," Proc. CCS '07, Oct. 2007, pp. 401-10.
-
(2007)
Proc. CCS '07
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
-
7
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
Sept.
-
S. Mathur et al., "Radiotelepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel," Proc. MobiCom '08, Sept. 2008, pp. 128-39.
-
(2008)
Proc. MobiCom '08
, pp. 128-139
-
-
Mathur, S.1
-
8
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
Sept.
-
S. Jana et al., "On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments," Proc. MobiCom '09, Sept. 2009, pp. 321-32.
-
(2009)
Proc. MobiCom '09
, pp. 321-332
-
-
Jana, S.1
-
9
-
-
79960885380
-
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
-
Apr.
-
Q. Wang et al., "Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks," Proc. IEEE INFOCOM '11, Apr. 2011.
-
(2011)
Proc. IEEE INFOCOM '11
-
-
Wang, Q.1
-
11
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
N. Patwari et al., "High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements," IEEE Trans. Mobile Comp., vol. 9, no. 1, 2010, pp. 17-30.
-
(2010)
IEEE Trans. Mobile Comp.
, vol.9
, Issue.1
, pp. 17-30
-
-
Patwari, N.1
-
12
-
-
77953297543
-
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
-
Mar.
-
K. Zeng et al., "Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks," Proc. INFOCOM '10, Mar. 2010, pp. 1837-45.
-
(2010)
Proc. INFOCOM '10
, pp. 1837-1845
-
-
Zeng, K.1
-
13
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
N. Patwari et al., "High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements," IEEE Trans. Mobile Comp., vol. 9, no. 1, 2010, pp. 17-30.
-
(2010)
IEEE Trans. Mobile Comp.
, vol.9
, Issue.1
, pp. 17-30
-
-
Patwari, N.1
-
14
-
-
51449114762
-
Secure wireless communications: Secret keys through multipath
-
Mar.
-
A. M. Sayeed and A. Perrig, "Secure Wireless Communications: Secret Keys through Multipath," Proc. ICASSP '08, Mar. 2008, pp. 321-32.
-
(2008)
Proc. ICASSP '08
, pp. 321-332
-
-
Sayeed, A.M.1
Perrig, A.2
|