-
1
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in ACM CCS, 2007, pp. 401-410.
-
(2007)
ACM CCS
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
2
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Transactions on Antennas and Propagation, vol. 53, no. 11, pp. 3776-3784, 2005.
-
(2005)
IEEE Transactions on Antennas and Propagation
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
3
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments," in ACM MobiCom, 2009, pp. 321-332.
-
(2009)
ACM MobiCom
, pp. 321-332
-
-
Jana, S.1
Premnath, S.2
Clark, M.3
Kasera, S.4
Patwari, N.5
Krishnamurthy, S.6
-
4
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radio-telepathy: extracting a secret key from an unauthenticated wireless channel," in ACM MobiCom, 2008, pp. 128-139.
-
(2008)
ACM MobiCom
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
5
-
-
51449114762
-
Secure wireless communications: Secret keys through multipath
-
A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in IEEE ICASSP, 2008, pp. 3013-3016.
-
(2008)
IEEE ICASSP
, pp. 3013-3016
-
-
Sayeed, A.1
Perrig, A.2
-
6
-
-
79960885380
-
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
-
Q. Wang, H. Su, K. Ren, and K. Kim, "Fast and scalable secret key generation exploiting channel phase randomness in wireless networks,"in IEEE INFOCOM, 2011.
-
(2011)
IEEE INFOCOM
-
-
Wang, Q.1
Su, H.2
Ren, K.3
Kim, K.4
-
7
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
N. Patwari, J. Croft, S. Jana, and S. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements,"IEEE Transactions on Mobile Computing, pp. 17-30, 2009.
-
(2009)
IEEE Transactions on Mobile Computing
, pp. 17-30
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, S.4
-
8
-
-
77954527646
-
Robust uncorrelated bit extraction methodologies for wireless sensors
-
J. Croft, N. Patwari, and S. Kasera, "Robust uncorrelated bit extraction methodologies for wireless sensors," in ACM/IEEE ICNP, 2010, pp. 70-81.
-
(2010)
ACM/IEEE ICNP
, pp. 70-81
-
-
Croft, J.1
Patwari, N.2
Kasera, S.3
-
9
-
-
77953297543
-
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
-
K. Zeng, D. Wu, A. Chan, and P. Mohapatra, "Exploiting multiple-antenna diversity for shared secret key generation in wireless networks,"in IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
IEEE INFOCOM
, pp. 1-9
-
-
Zeng, K.1
Wu, D.2
Chan, A.3
Mohapatra, P.4
-
10
-
-
77952329424
-
Secret keys from entangled sensor motes: Implementation and analysis
-
M. Wilhelm, I. Martinovic, and J. Schmitt, "Secret keys from entangled sensor motes: implementation and analysis," in ACM Wisec, 2010, pp. 139-144.
-
(2010)
ACM Wisec
, pp. 139-144
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.3
-
11
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
J. Hershey, A. Hassan, and R. Yarlagadda, "Unconventional cryptographic keying variable management," IEEE Transactions on Communications, vol. 43, no. 1, pp. 3-6, 1995.
-
(1995)
IEEE Transactions on Communications
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.1
Hassan, A.2
Yarlagadda, R.3
-
12
-
-
47649111825
-
On the secrecy capabilities of itu channels
-
C. Ye, A. Reznik, G. Sternberg, and Y. Shah, "On the secrecy capabilities of itu channels," in IEEE VTC-2007 Fall, 2007.
-
(2007)
IEEE VTC-2007 Fall
-
-
Ye, C.1
Reznik, A.2
Sternberg, G.3
Shah, Y.4
-
13
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
R. Wilson, D. Tse, and R. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 364-375, 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.3
-
14
-
-
79957865221
-
Unconditionally secure communications over fading channels
-
M. Tope and J. McEachen, "Unconditionally secure communications over fading channels," in IEEE MILCOM, 2001.
-
(2001)
IEEE MILCOM
-
-
Tope, M.1
McEachen, J.2
-
15
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
Z. Li, W. Xu, R. Miller, and W. Trappe, "Securing wireless systems via lower layer enforcements," in Proceedings of the 5th ACM workshop on Wireless security, 2006, pp. 33-42.
-
Proceedings of the 5th ACM Workshop on Wireless Security, 2006
, pp. 33-42
-
-
Li, Z.1
Xu, W.2
Miller, R.3
Trappe, W.4
-
17
-
-
39049156464
-
Extracting secrecy from jointly gaussian random variables
-
C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly gaussian random variables," in IEEE ISIT, 2006, pp. 2593-2597.
-
(2006)
IEEE ISIT
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
-
18
-
-
84923996598
-
-
New York, NY, USA: Cambridge University Press
-
A. Goldsmith, Wireless Communications. New York, NY, USA: Cambridge University Press, 2005.
-
(2005)
Wireless Communications
-
-
Goldsmith, A.1
-
20
-
-
84861648576
-
-
ECE Department, Virginia Tech, Tech. Rep.
-
D. Luiz, A. Dasilva, T. Lin, T. Lin, D. Scott, and F. Midkiff, "Mobile adhoc network routing protocols: Methodologies and applications," ECE Department, Virginia Tech, Tech. Rep., 2004.
-
(2004)
Mobile Adhoc Network Routing Protocols: Methodologies and Applications
-
-
Luiz, D.1
Dasilva, A.2
Lin, T.3
Lin, T.4
Scott, D.5
Midkiff, F.6
-
21
-
-
0004089464
-
-
3rd ed. Secaucus, NJ, USA: Springer-Verlag New York, Inc.
-
J. H. V. Lint, Introduction to Coding Theory, 3rd ed. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 1998.
-
(1998)
Introduction to Coding Theory
-
-
Lint, J.H.V.1
|