-
1
-
-
28444433009
-
Random key predistribution schemes for sensor networks
-
doi: 10.1109/SECPRI.2003.1199337
-
H. Chan, A. Perrig, D.X. Song, Random key predistribution schemes for sensor networks, in: Security and Privacy, 2003. Proceedings. 2003 Symposium on 2003, pp. 197-213, doi: 10.1109/SECPRI.2003.1199337.
-
Security and Privacy, 2003. Proceedings. 2003 Symposium on 2003
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.X.3
-
3
-
-
56649100493
-
Hapadep: Human-assisted pure audio device pairing
-
C. Soriente, G. Tsudik, E. Uzun, Hapadep: human-assisted pure audio device pairing, in: 11th International Conference on Information Security (ISC), 2008, pp. 385-400.
-
(2008)
11th International Conference on Information Security (ISC)
, pp. 385-400
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
4
-
-
33751023773
-
Secure device pairing based on a visual channel (short paper)
-
N. Saxena, J.-E. Ekberg, K. Kostiainen, N. Asokan, Secure device pairing based on a visual channel (short paper), in: IEEE Symposium on Security and Privacy (S&P), 2006, pp. 306-313.
-
(2006)
IEEE Symposium on Security and Privacy (S&P)
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
6
-
-
0029234878
-
John e. hershey, amer a. hassan, and rao yarlagadda
-
J.E. Hershey, A.A. Hassan, and R. Yarlagadda John e. hershey, amer a. hassan, and rao yarlagadda IEEE Transactions on Communications 43 1 1995 3 6
-
(1995)
IEEE Transactions on Communications
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.E.1
Hassan, A.A.2
Yarlagadda, R.3
-
7
-
-
85027496257
-
Secret-key reconciliation by public discussion
-
G. Brassard, L. Salvail, Secret-key reconciliation by public discussion, in: EUROCRYPT, 1993, pp. 410-423.
-
(1993)
EUROCRYPT
, pp. 410-423
-
-
Brassard, G.1
Salvail, L.2
-
8
-
-
0024866111
-
Pseudo-random generation from one-way functions (extended abstracts)
-
R. Impagliazzo, L.A. Levin, M. Luby, Pseudo-random generation from one-way functions (extended abstracts), in: 21st Annual ACM Symposium on Theory of Computing (STOC), 1989, pp. 12-24.
-
(1989)
21st Annual ACM Symposium on Theory of Computing (STOC)
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
9
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
R. Mayrhofer, and H. Gellersen Shake well before use: intuitive and secure pairing of mobile devices IEEE Transactions on Mobile Computing 8 6 2009 792 806
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, Issue.6
, pp. 792-806
-
-
Mayrhofer, R.1
Gellersen, H.2
-
11
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels IEEE Transactions on Antennas and Propagation 53 11 2005 3776 3784
-
(2005)
IEEE Transactions on Antennas and Propagation
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
12
-
-
77952329424
-
Secret keys from entangled sensor motes: Implementation and analysis
-
M. Wilhelm, I. Martinovic, J.B. Schmitt, Secret keys from entangled sensor motes: implementation and analysis, in: Proceedings of the Third ACM Conference on Wireless Network Security (WiSec), 2010, pp. 139-144.
-
(2010)
Proceedings of the Third ACM Conference on Wireless Network Security (WiSec)
, pp. 139-144
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
-
13
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, B. Yener, Robust key generation from signal envelopes in wireless networks, in: ACM Conference on Computer and Communications Security (CCS), 2007, pp. 401-410.
-
(2007)
ACM Conference on Computer and Communications Security (CCS)
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
14
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data, in: International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004, pp. 523-540.
-
(2004)
International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
15
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N.B. Mandayam, C. Ye, A. Reznik, Radio-telepathy: extracting a secret key from an unauthenticated wireless channel, in: 14th Annual International Conference on Mobile Computing and Networking (MOBICOM), 2008, pp. 128-139.
-
(2008)
14th Annual International Conference on Mobile Computing and Networking (MOBICOM)
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.B.3
Ye, C.4
Reznik, A.5
-
16
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, On the effectiveness of secret key extraction from wireless signal strength in real environments, in: 15th Annual International Conference on Mobile Computing and Networking (MOBICOM), 2009, pp. 321-332.
-
(2009)
15th Annual International Conference on Mobile Computing and Networking (MOBICOM)
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
17
-
-
77954527646
-
Robust uncorrelated bit extraction methodologies for wireless sensors
-
J. Croft, N. Patwari, S.K. Kasera, Robust uncorrelated bit extraction methodologies for wireless sensors, in: 9th International Conference on Information Processing in Sensor Networks (IPSN), 2010, pp. 70-81.
-
(2010)
9th International Conference on Information Processing in Sensor Networks (IPSN)
, pp. 70-81
-
-
Croft, J.1
Patwari, N.2
Kasera, S.K.3
-
18
-
-
78649516322
-
Ambisec: Securing smart spaces using entropy harvesting
-
P. Barsocchi, S. Chessa, I. Martinovic, G. Oligeri, Ambisec: securing smart spaces using entropy harvesting, in: First International Joint Conference on Ambient Intelligence (AmI2010), 2010, pp. 73-85.
-
(2010)
First International Joint Conference on Ambient Intelligence (AmI2010)
, pp. 73-85
-
-
Barsocchi, P.1
Chessa, S.2
Martinovic, I.3
Oligeri, G.4
-
20
-
-
84908985308
-
-
Crossbow. < http://www.xbow.com >.
-
Crossbow
-
-
-
22
-
-
41949122085
-
Computing binary combinatorial gray codes via exhaustive search with sat solvers
-
10.1109/TIT.2008.917695
-
I. Zinovik, D. Kroening, and Y. Chebiryak Computing binary combinatorial gray codes via exhaustive search with sat solvers IEEE Transactions on Information Theory 54 4 2008 1819 1823 10.1109/TIT.2008.917695
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.4
, pp. 1819-1823
-
-
Zinovik, I.1
Kroening, D.2
Chebiryak, Y.3
-
23
-
-
78649746650
-
Choosing key sizes for cryptography
-
10.1016/j.istr.2010.10.006
-
A.W. Dent Choosing key sizes for cryptography Information Security Technical Report 15 1 2010 21 27 10.1016/j.istr.2010.10.006
-
(2010)
Information Security Technical Report
, vol.15
, Issue.1
, pp. 21-27
-
-
Dent, A.W.1
|