-
1
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
Garcia-Luna-Aceves, J.J., Sivakumar, R., Steenkiste, P. (eds.) ACM September
-
Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Garcia-Luna-Aceves, J.J., Sivakumar, R., Steenkiste, P. (eds.) Proceedings of the 14th ACM International Conference on Mobile Computing and Networking (MOBICOM 2008), pp. 128-139. ACM (September 2008)
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking (MOBICOM 2008)
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
2
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
Shin, K.G., Zhang, Y., Bagrodia, R., Govindan, R. (eds.) ACM September
-
Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Shin, K.G., Zhang, Y., Bagrodia, R., Govindan, R. (eds.) Proceedings of the 15th International Conference on Mobile Computing and Networking (MOBICOM 2009), pp. 321-332. ACM (September 2009)
-
(2009)
Proceedings of the 15th International Conference on Mobile Computing and Networking (MOBICOM 2009)
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
3
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
Poovendran, R., Juels, A. (eds.) ACM September
-
Li, Z., Xu, W., Miller, R., Trappe, W.: Securing wireless systems via lower layer enforcements. In: Poovendran, R., Juels, A. (eds.) Proceedings of the 5th ACM Workshop on Wireless Security (WiSe 2006), pp. 33-42. ACM (September 2006)
-
(2006)
Proceedings of the 5th ACM Workshop on Wireless Security (WiSe 2006)
, pp. 33-42
-
-
Li, Z.1
Xu, W.2
Miller, R.3
Trappe, W.4
-
4
-
-
35048865463
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
5
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
ACM May
-
Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from one-way functions. In: Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC 1989), pp. 12-24. ACM (May 1989)
-
(1989)
Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC 1989)
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
6
-
-
0001777508
-
Linking information reconciliation and privacy amplification
-
Cachin, C., Maurer, U.: Linking information reconciliation and privacy amplification. Journal of Cryptology 10(2), 97-110 (1997)
-
(1997)
Journal of Cryptology
, vol.10
, Issue.2
, pp. 97-110
-
-
Cachin, C.1
Maurer, U.2
-
7
-
-
80051886930
-
Reactive jamming in wireless networks: How realistic is the threat?
-
ACM, New York
-
Wilhelm, M., Martinovic, I., Schmitt, J.B., Lenders, V.: Reactive jamming in wireless networks: How realistic is the threat? In: Proceedings of the 4th ACM Conference on Wireless Network Security (WiSec 2011), pp. 47-52. ACM, New York (2011)
-
(2011)
Proceedings of the 4th ACM Conference on Wireless Network Security (WiSec 2011)
, pp. 47-52
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
Lenders, V.4
-
8
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
IEEE June
-
Xiao, L., Greenstein, L., Mandayam, N., Trappe, W.: Fingerprints in the ether: Using the physical layer for wireless authentication. In: Proceedings of the IEEE International Conference on Communications 2007 (ICC 2007), pp. 4646-4651. IEEE (June 2007)
-
(2007)
Proceedings of the IEEE International Conference on Communications 2007 (ICC 2007)
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
9
-
-
78149248764
-
Protocols for Secret Key Agreement by Public Discussion Based on Common Information
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Maurer, U.M.: Protocols for Secret Key Agreement by Public Discussion Based on Common Information. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 461-470. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 461-470
-
-
Maurer, U.M.1
-
10
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
Ning, P., De Capitani di Vimercati, S., Syverson, P.F. (eds.) ACM October
-
Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: Robust key generation from signal envelopes in wireless networks. In: Ning, P., De Capitani di Vimercati, S., Syverson, P.F. (eds.) Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 401-410. ACM (October 2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007)
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
11
-
-
84861623350
-
Collaborative secret key extraction leveraging received signal strength in mobile wireless networks
-
Greenberg, A.G., Sohraby, K. (eds.) ACM March
-
Liu, H., Yang, J., Wang, Y., Chen, Y.: Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In: Greenberg, A.G., Sohraby, K. (eds.) Proceedings of the 31st IEEE International Conference on Computer Communications (INFOCOM 2012), pp. 927-935. ACM (March 2012)
-
(2012)
Proceedings of the 31st IEEE International Conference on Computer Communications INFOCOM 2012
, pp. 927-935
-
-
Liu, H.1
Yang, J.2
Wang, Y.3
Chen, Y.4
-
12
-
-
77949827773
-
An adaptive quantization algorithm for secret key generation using radio channel measurements
-
Al Agha, K., Badra, M., Newby, G.B. (eds.) December
-
Hamida, S.B., Pierrot, J.B., Castelluccia, C.: An adaptive quantization algorithm for secret key generation using radio channel measurements. In: Al Agha, K., Badra, M., Newby, G.B. (eds.) Proceedings of the 3rd International Conference on New Technologies, Mobility and Security (NTMS 2009), pp. 1-5 (December 2009)
-
(2009)
Proceedings of the 3rd International Conference on New Technologies, Mobility and Security (NTMS 2009)
, pp. 1-5
-
-
Hamida, S.B.1
Pierrot, J.B.2
Castelluccia, C.3
-
13
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
Ye, C., Mathur, S., Reznik, A., Shah, Y., Trappe, W., Mandayam, N.B.: Information-theoretically secret key generation for fading wireless channels. IEEE Transactions on Information Forensics and Security 5(2), 240-254 (2010)
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.B.6
-
14
-
-
77953317584
-
Mobility assisted secret key generation using wireless link signatures
-
IEEE March
-
Zhang, J., Kasera, S.K., Patwari, N.: Mobility assisted secret key generation using wireless link signatures. In: Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM 2010), pp. 1-5. IEEE (March 2010)
-
(2010)
Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM 2010)
, pp. 1-5
-
-
Zhang, J.1
Kasera, S.K.2
Patwari, N.3
-
15
-
-
79960885380
-
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
-
IEEE April
-
Wang, Q., Su, H., Ren, K., Kim, K.: Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In: Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM 2011), pp. 1422-1430. IEEE (April 2011)
-
(2011)
Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM 2011)
, pp. 1422-1430
-
-
Wang, Q.1
Su, H.2
Ren, K.3
Kim, K.4
-
16
-
-
77952329424
-
Secret keys from entangled sensor motes: Implementation and analysis
-
ACM March
-
Wilhelm, M., Martinovic, I., Schmitt, J.B.: Secret keys from entangled sensor motes: Implementation and analysis. In: Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec 2010), pp. 139-144. ACM (March 2010)
-
(2010)
Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec 2010)
, pp. 139-144
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
-
17
-
-
79951803442
-
Secret key generation rate vs. reconciliation cost using wireless channel characteristics in body area networks
-
IEEE December
-
Ali, S.T., Sivaraman, V., Ostry, D.: Secret key generation rate vs. reconciliation cost using wireless channel characteristics in body area networks. In: Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010), pp. 644-650. IEEE (December 2010)
-
(2010)
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010)
, pp. 644-650
-
-
Ali, S.T.1
Sivaraman, V.2
Ostry, D.3
-
18
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
Aono, T., Higuchi, K., Ohira, T., Komiyama, B., Sasaoka, H.: Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Transactions on Antennas and Propagation 53(11), 3776-3784 (2005)
-
(2005)
IEEE Transactions on Antennas and Propagation
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
19
-
-
77954527646
-
Robust uncorrelated bit extraction methodologies for wireless sensors
-
Abdelzaher, T.F., Voigt, T., Wolisz, A. (eds.) ACM April
-
Croft, J., Patwari, N., Kasera, S.K.: Robust uncorrelated bit extraction methodologies for wireless sensors. In: Abdelzaher, T.F., Voigt, T., Wolisz, A. (eds.) Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), pp. 70-81. ACM (April 2010)
-
(2010)
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)
, pp. 70-81
-
-
Croft, J.1
Patwari, N.2
Kasera, S.K.3
-
20
-
-
85036621397
-
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity
-
Chung, Y., Yung, M. (eds.) WISA 2010. Springer, Heidelberg
-
Döttling, N., Lazich, D., Müller-Quade, J., de Almeida, A.S.: Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol. 6513, pp. 206-220. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6513
, pp. 206-220
-
-
Döttling, N.1
Lazich, D.2
Müller-Quade, J.3
De Almeida, A.S.4
-
21
-
-
79957837002
-
On passive inference attacks against physical-layer key extraction
-
ACM April
-
Edman, M., Kiayias, A., Yener, B.: On passive inference attacks against physical-layer key extraction. In: Proceedings of the 4th European Workshop on System Security (Eurosec 2011), pp. 8-13. ACM (April 2011)
-
(2011)
Proceedings of the 4th European Workshop on System Security (Eurosec 2011)
, pp. 8-13
-
-
Edman, M.1
Kiayias, A.2
Yener, B.3
|