-
1
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. A-Sadjadi, A. Kiayias,A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in Proc. ACM CCS, 2007, pp. 401-410.
-
(2007)
Proc. ACM CCS
, pp. 401-410
-
-
A-Sadjadi, B.1
Kiayiasa. Mercado, A.2
Yener, B.3
-
2
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strengths in real environments
-
Sep.
-
S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strengths in real environments," in Proc. ACM MobiCom, Sep. 2009, pp. 321-332.
-
(2009)
Proc. ACM MobiCom
, pp. 321-332
-
-
Jana, S.1
Premnath, S.2
Clark, M.3
Kasera, S.4
Patwari, N.5
Krishnamurthy, S.6
-
3
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
Sep.
-
S. Mathur,W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. ACM MobiCom, Sep. 2008, pp. 128-139.
-
(2008)
Proc. ACM MobiCom
, pp. 128-139
-
-
Mathurw. Trappe, S.1
Mandayam, N.2
Ye, C.3
Reznik, A.4
-
4
-
-
77953297543
-
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
-
Mar.
-
K. Zeng, D.Wu, A. Chan, and P. Mohapatra, "Exploiting multiple-antenna diversity for shared secret key generation in wireless networks," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Zeng, K.1
Wu, D.2
Chan, A.3
Mohapatra, P.4
-
5
-
-
51449114762
-
Secure wireless communications: Secret keys through multipath
-
Apr.
-
A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in Proc. IEEE ICASSP, Apr. 2008, pp. 3013-3016.
-
(2008)
Proc. IEEE ICASSP
, pp. 3013-3016
-
-
Sayeed, A.1
Perrig, A.2
-
6
-
-
52349107260
-
A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property
-
S. Yasukawa, H. Iwai, and H. Sasaoka, "A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property," in Proc. IEEE ISIT, 2008, pp. 732-736.
-
(2008)
Proc. IEEE ISIT
, pp. 732-736
-
-
Yasukawa, S.1
Iwai, H.2
Sasaoka, H.3
-
7
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
DOI 10.1109/TIFS.2007.902666
-
R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 364-375, Sep. 2007. (Pubitemid 47290572)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
8
-
-
70449479022
-
Secure physical layer key generation schemes: Performance and information theoretic limits
-
Jun.
-
J.W.Wallace, "Secure physical layer key generation schemes: Performance and information theoretic limits," in Proc. IEEE ICC, Jun. 2009, pp. 1-5.
-
(2009)
Proc. IEEE ICC
, pp. 1-5
-
-
Wallace, J.W.1
-
9
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
DOI 10.1109/TAP.2005.858853
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Trans. Antennas Propag., vol. 53, no. 11, pp. 3776-3784, Nov. 2005. (Pubitemid 41748822)
-
(2005)
IEEE Transactions on Antennas and Propagation
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
10
-
-
77949631620
-
A note on information-theoretic secret key exchange over wireless channels
-
Control, Comput., Monticello IL
-
M. Zafer, D. Agrawal, and M. Srivatsa, "A note on information-theoretic secret key exchange over wireless channels," in Proc. 47th Allerton Conf. Commun., Control, Comput., Monticello, IL, 2009, pp. 754-761.
-
(2009)
Proc. 47th Allerton Conf. Commun.
, pp. 754-761
-
-
Zafer, M.1
Agrawal, D.2
Srivatsa, M.3
-
11
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
12
-
-
0027629488
-
Common randomness in information theory and cryptography-Part I: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
13
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
15
-
-
60449113417
-
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
-
Y.W. Law,M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga, "Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols," Trans. Sensor Netw., vol. 5, no. 1, p. 6, 2009.
-
(2009)
Trans. Sensor Netw.
, vol.5
, Issue.1
, pp. 6
-
-
Law, Y.W.1
Palaniswami, M.2
Hoesel, L.V.3
Doumen, J.4
Hartel, P.5
Havinga, P.6
-
16
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros,M. R.D. Rodrigues, and S. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.4
-
17
-
-
44049095075
-
Secret communication via multi-antenna transmission
-
DOI 10.1109/CISS.2007.4298439, 4298439, Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings
-
Z. Li, W. Trappe, and R. Yates, "Secret communication via multi-antenna transmission," in Proc. CISS, 2007, pp. 905-910. (Pubitemid 351710548)
-
(2007)
Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings
, pp. 905-910
-
-
Li, Z.1
Trappe, W.2
Yates, R.3
-
18
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
Oakland, CA
-
M. Strasser, C. Popper, S. Capkun, and M. Cagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE Symp. Security Privacy, Oakland, CA, 2008, pp. 64-78.
-
(2008)
Proc. IEEE Symp. Security Privacy
, pp. 64-78
-
-
Strasser, M.1
Popper, C.2
Capkun, S.3
Cagalj, M.4
-
19
-
-
77953998228
-
Zero pre-shared secret key establishment in the presence of jammers
-
May
-
T. Jin, G. Noubir, and B. Thapa, "Zero pre-shared secret key establishment in the presence of jammers," in Proc. ACM MobiHoc,May 2009, pp. 219-228.
-
(2009)
Proc. ACM MobiHoc
, pp. 219-228
-
-
Jin, T.1
Noubir, G.2
Thapa, B.3
-
20
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1367, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1367
-
-
Wyner, A.D.1
-
21
-
-
45249092485
-
Secure broadcasting over fading channels
-
Jun.
-
A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.W.3
-
22
-
-
0347337828
-
Secure space-time communication
-
Dec.
-
A. O. Hero, III, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero Iii., A.O.1
-
23
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, pp. 97-139, 2008.
-
(2008)
SIAM J. Comput.
, vol.38
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
25
-
-
4544304392
-
A MIMO system with reciprocal transceivers for the time-division duplex mode
-
V. Jungnickel, U. Kruger, G. Istoc, T. Haustein, and C. von Helmolt, "A MIMO system with reciprocal transceivers for the time-division duplex mode," in Proc. IEEE Antennas Propag. Soc. Int. Symp., 2004, vol. 2, pp. 1267-1270.
-
(2004)
Proc. IEEE Antennas Propag. Soc. Int. Symp.
, vol.2
, pp. 1267-1270
-
-
Jungnickel, V.1
Kruger, U.2
Istoc, G.3
Haustein, T.4
Von Helmolt, C.5
-
26
-
-
0015648934
-
Noiseless coding of correlated information sources
-
Jul.
-
D. Slepian and J. K.Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inf. Theory, vol. IT-19, no. 4, pp. 471-480, Jul. 1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.IT-19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
-
27
-
-
0037356065
-
Distributed source coding using syndromes (DISCUS): Design and construction
-
Mar.
-
S. S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 626-643, Mar. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 626-643
-
-
Pradhan, S.S.1
Ramchandran, K.2
-
28
-
-
78049508239
-
Secret key agreement from correlated Gaussian sources by rate limited public communication
-
S. Watanabe and Y. Oohama, "Secret key agreement from correlated Gaussian sources by rate limited public communication," IEICE Trans. Fund. Electron., Commun. Comput. Sci., vol. E93-A, no. 11, pp. 1976-1983, 2010.
-
(2010)
IEICE Trans. Fund. Electron., Commun. Comput. Sci.
, vol.E93-A
, Issue.11
, pp. 1976-1983
-
-
Watanabe, S.1
Oohama, Y.2
-
29
-
-
80051770683
-
Secret key agreement from vector Gaussian sources by rate limited public communication
-
Sep.
-
S. Watanabe and Y. Oohama, "Secret key agreement from vector Gaussian sources by rate limited public communication," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 541-550, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 541-550
-
-
Watanabe, S.1
Oohama, Y.2
-
30
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.4
-
31
-
-
33746351314
-
Key derivation and randomness extraction
-
[Online]
-
O. Chevassut, P. Fouque, P. Gaudry, and D. Pointcheval, "Key derivation and randomness extraction," Rep. 2006/061, 2005 [Online]. Available: http://eprint.iacr.org/2005/061
-
(2005)
Rep. 2006/061
-
-
Chevassut, O.1
Fouque, P.2
Gaudry, P.3
Pointcheval, D.4
-
32
-
-
80052114652
-
-
Univ. Massachusetts Amherst, Amherst, MA, Tech. Rep. UM-CS-2010-032, May
-
C. Capar, M. Zafer, D. Goeckel, D. Towsley, and D. Agrawal, "Physical-layer-enhanced wireless secret key exchange," Univ. Massachusetts Amherst, Amherst, MA, Tech. Rep. UM-CS-2010-032, May 2010.
-
(2010)
Physical-layer-enhanced Wireless Secret Key Exchange
-
-
Capar, C.1
Zafer, M.2
Goeckel, D.3
Towsley, D.4
Agrawal, D.5
|