-
1
-
-
0017018484
-
New directions in cryptography
-
Nov
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
2
-
-
38349033100
-
-
Security and Privacy in Ad-Hoc and Sensor Networks, ser. Lecture Notes in Computer Science. Berlin/Heidelberg: Springer
-
D. Kirovski, M. Sinclair, and D. Wilson, "The martini synch: Joint fuzzy hashing via error correction," in Security and Privacy in Ad-Hoc and Sensor Networks, ser. Lecture Notes in Computer Science. Berlin/Heidelberg: Springer, 2007, vol. 4572, pp. 16-30.
-
(2007)
The Martini Synch: Joint Fuzzy Hashing Via Error Correction
, vol.4572
, pp. 16-30
-
-
Kirovski, D.1
Sinclair, M.2
Wilson, D.3
-
3
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
Jun
-
R. Mayrhofer and H. Gellersen, "Shake well before use: Intuitive and secure pairing of mobile devices," IEEE Trans. Mobile Comput., vol. 8, no. 6, pp. 792-806, Jun. 2009.
-
(2009)
IEEE Trans. Mobile Comput.
, vol.8
, Issue.6
, pp. 792-806
-
-
Mayrhofer, R.1
Gellersen, H.2
-
5
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments," in Proc. MOBICOM 2009, 2009, pp. 321-332.
-
(2009)
Proc. MOBICOM
, vol.2009
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
6
-
-
77952329424
-
Secret keys from entangled sensor motes: Implementation and analysis
-
ACM
-
M.Wilhelm, I. Martinovic, and J. B. Schmitt, "Secret keys from entangled sensor motes: Implementation and analysis," in Proc. WiSec'10, 2010, pp. 139-144, ACM.
-
(2010)
Proc. WiSec'10
, pp. 139-144
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
-
7
-
-
0022099415
-
A secure and useful keyless cryptosystem
-
M. Young, "A secure and useful keyless cryptosystem," Inf. Process. Lett., pp. 35-38, 1985.
-
(1985)
Inf. Process. Lett.
, pp. 35-38
-
-
Young, M.1
-
8
-
-
77953853641
-
Shake them up!: A movement-based pairing protocol for cpu-constrained devices
-
ACM
-
C. Castelluccia and P. Mutaf, "Shake them up!: A movement-based pairing protocol for cpu-constrained devices," in Proc. MobiSys'05, 2005, pp. 51-64, ACM.
-
(2005)
Proc. MobiSys'05
, pp. 51-64
-
-
Castelluccia, C.1
Mutaf, P.2
-
9
-
-
77953297543
-
-
ser. INFOCOM'10. Piscataway, NJ: IEEE Press
-
K. Zeng, D.Wu, A. Chan, and P. Mohapatra, Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks, ser. INFOCOM'10. Piscataway, NJ: IEEE Press, 2010, pp. 1837-1845.
-
(2010)
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
, pp. 1837-1845
-
-
Zeng, K.1
Wu, D.2
Chan, A.3
Mohapatra, P.4
-
10
-
-
77954527646
-
Robust uncorrelated bit extraction methodologies for wireless sensors
-
ACM
-
J. Croft, N. Patwari, and S. K. Kasera, "Robust uncorrelated bit extraction methodologies for wireless sensors," in Proc. IPSN'10, 2010, pp. 70-81, ACM.
-
(2010)
Proc. IPSN'10
, pp. 70-81
-
-
Croft, J.1
Patwari, N.2
Kasera, S.K.3
-
11
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
ACM
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in Proc. CCS'07, 2007, pp. 401-410, ACM.
-
(2007)
Proc. CCS'07
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
12
-
-
35048881618
-
Are you with me? Using accelerometers to determine if two devices are carried by the same person
-
Berlin/Heidelberg: Springer 2004
-
J. Lester, B. Hannaford, and G. Borriello, "Are you with me? - Using accelerometers to determine if two devices are carried by the same person," in Book Series Lecture Notes in Computer Science. Berlin/Heidelberg: Springer, 2004, vol. 3001/2004, pp. 33-50.
-
(2004)
Book Series Lecture Notes in Computer Science
, vol.3001
, pp. 33-50
-
-
Lester, J.1
Hannaford, B.2
Borriello, G.3
-
13
-
-
84945588227
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
Ubicomp 2001: Ubiquitous Computing
-
L. E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H.-W. Gellersen, "Smart-its friends: A technique for users to easily establish connections between smart artefacts," in Ubi- Comp'01. London, U.K.: Springer-Verlag, 2001, pp. 116-122. (Pubitemid 33347301)
-
(2001)
Lecture Notes in Computer Science
, Issue.2201
, pp. 116-122
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.-W.6
-
14
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Mar
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, no. 1, pp. 97-139, Mar. 2008.
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
15
-
-
62449274873
-
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
-
Mar
-
J. Guajardo, B. Škorić, P. Tuyls, S. S. Kumar, T. Bel, A. H. Blom, and G.-J. Schrijen, "Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions," Inf. Syst. Frontiers, vol. 11, no. 1, pp. 19-41, Mar. 2009.
-
(2009)
Inf. Syst. Frontiers
, vol.11
, Issue.1
, pp. 19-41
-
-
Guajardo, J.1
Škorić, B.2
Tuyls, P.3
Kumar, S.S.4
Bel, T.5
Blom, A.H.6
Schrijen, G.-J.7
-
16
-
-
77952599296
-
Key extraction from general nondiscrete signals
-
Jun
-
E. A. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, and B. Škorić, "Key extraction from general nondiscrete signals," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 269-279, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 269-279
-
-
Verbitskiy, E.A.1
Tuyls, P.2
Obi, C.3
Schoenmakers, B.4
Škorić, B.5
-
18
-
-
62949108474
-
Measurement-based frame error model for simulating outdoor wi-fi networks
-
Mar
-
P. Barsocchi, G. Oligeri, and F. Potorti, "Measurement-based frame error model for simulating outdoor wi-fi networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1154-1158, Mar. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1154-1158
-
-
Barsocchi, P.1
Oligeri, G.2
Potorti, F.3
-
19
-
-
0019045740
-
Empirical formula for propagation loss in land mobile radio services
-
M. Hata, "Empirical formula for propagation loss in land mobile radio services," IEEE Trans. Veh. Technol., vol. 29, no. 3, pp. 317-325, Aug. 1980. (Pubitemid 11430748)
-
(1980)
IEEE Transactions on Vehicular Technology
, vol.VT-29
, Issue.3
, pp. 317-325
-
-
Hata Masaharu1
-
20
-
-
66649125215
-
Physically motivated fast-fading model for indoor peer-to-eer channels
-
May
-
B. Bandemer, C. Oestges, N. Czink, and A. Paulraj, "Physically motivated fast-fading model for indoor peer-to-eer channels," Electron. Lett., vol. 45, no. 10, pp. 515-517, May 2009.
-
(2009)
Electron. Lett.
, vol.45
, Issue.10
, pp. 515-517
-
-
Bandemer, B.1
Oestges, C.2
Czink, N.3
Paulraj, A.4
-
23
-
-
49449093129
-
Secure time synchronization in sensor networks
-
July
-
S. Ganeriwal, C. Pöpper, S. Capkun, and M. B. Srivastava, "Secure time synchronization in sensor networks," ACM Trans. Inf. Syst. Security, vol. 11, pp. 23-35, July 2008.
-
(2008)
ACM Trans. Inf. Syst. Security
, vol.11
, pp. 23-35
-
-
Ganeriwal, S.1
Pöpper, C.2
Capkun, S.3
Srivastava, M.B.4
-
24
-
-
84872114018
-
Towards practical identification of hf rfid devices
-
Jul
-
B. Danev, S. Capkun, R. J. Masti, and T. S. Benjamin, "Towards practical identification of hf rfid devices," ACM Trans. Inf. Syst. Security, vol. 15, no. 2, pp. 7:1-7:24, Jul. 2012.
-
(2012)
ACM Trans. Inf. Syst. Security
, vol.15
, Issue.2
, pp. 71-724
-
-
Danev, B.1
Capkun, S.2
Masti, R.J.3
Benjamin, T.S.4
-
25
-
-
84863962575
-
Physical-layer identification of wired ethernet devices
-
Aug
-
R. Gerdes, M. Mina, S. Russell, and T. Daniels, "Physical-layer identification of wired ethernet devices," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1339-1353, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1339-1353
-
-
Gerdes, R.1
Mina, M.2
Russell, S.3
Daniels, T.4
-
26
-
-
77952407534
-
Attacks on physical-layer identification
-
ACM
-
B. Danev, H. Luecken, S. Capkun, and K. El Defrawy, "Attacks on physical-layer identification," in Proc. WiSec'10, 2010, pp. 89-98, ACM.
-
(2010)
Proc. WiSec'10
, pp. 89-98
-
-
Danev, B.1
Luecken, H.2
Capkun, S.3
El Defrawy, K.4
-
27
-
-
84872115831
-
-
Active Attacks Against Modulation-Based Radiometric Identification Rensselaer Polytechnic Institute, Department of Computer Science
-
E. Matthew and Y. Blent, Active Attacks Against Modulation-Based Radiometric Identification Rensselaer Polytechnic Institute, Department of Computer Science, Tech. Rep., 2009.
-
(2009)
Tech. Rep.
-
-
Matthew, E.1
Blent, Y.2
-
28
-
-
70350625235
-
Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol
-
Berlin, Heidelberg: Springer-Verlag
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Tapiador, and A. Ribagorda, "Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol," in Information Security Applications. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 56-68.
-
(2009)
Information Security Applications
, pp. 56-68
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Tapiador, J.M.3
Ribagorda, A.4
-
29
-
-
56749174919
-
-
Los Alamitos, CA: IEEE Computer Society
-
G. de Meulenaer, F. Gosset, F.-X. Standaert, and O. Pereira, On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks, ser. WIMOB'08. Los Alamitos, CA: IEEE Computer Society, 2008, pp. 580-585.
-
(2008)
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks, Ser. WIMOB'08
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, F.-X.3
Pereira, O.4
-
30
-
-
80051904512
-
The communication and computation cost of wireless security: Extended abstract
-
ACM
-
D. Singelee, S. Seys, L. Batina, and I. Verbauwhede, "The communication and computation cost of wireless security: Extended abstract," in Proc. WiSec'11, 2011, pp. 1-4, ACM.
-
(2011)
Proc. WiSec'11
, pp. 1-4
-
-
Singelee, D.1
Seys, S.2
Batina, L.3
Verbauwhede, I.4
-
31
-
-
0001174154
-
Polynomial codes over certain finite fields
-
I. S. Reed and G. Solomon, "Polynomial codes over certain finite fields," J. Soc. Indust. Appl. Math., vol. 8, pp. 300-304, 1960.
-
(1960)
J. Soc. Indust. Appl. Math.
, vol.8
, pp. 300-304
-
-
Reed, I.S.1
Solomon, G.2
-
32
-
-
0032178374
-
A digital fountain approach to reliable distribution of bulk data
-
J. W. Byers, M. Luby, M. Mitzenmacher, and A. Rege, "A digital fountain approach to reliable distribution of bulk data," SIGCOMM Comput. Commun. Rev., vol. 28, no. 4, pp. 56-67, Oct. 1998. (Pubitemid 128566447)
-
(1998)
Computer Communication Review
, vol.28
, Issue.4
, pp. 56-67
-
-
Byers, J.W.1
Luby, M.2
Mitzenmacher, M.3
Rege, A.4
-
33
-
-
58049179097
-
Mobility simulation for the evaluation of umts power control algorithms
-
Nov.
-
C. Joumaa, A. Caminada, and S. Lamrous, "Mobility simulation for the evaluation of umts power control algorithms," in Proc. New Technologies, Mobility and Security, 2008 (NTMS'08), Nov. 2008, pp. 1-5.
-
(2008)
Proc. New Technologies, Mobility and Security 2008 (NTMS'08)
, pp. 1-5
-
-
Joumaa, C.1
Caminada, A.2
Lamrous, S.3
-
36
-
-
84872100052
-
An introduction to openssl programming
-
Sep
-
E. Rescorla, "An introduction to openssl programming," Linux J., vol. 2001, no. 89, p. 3, Sep. 2001.
-
(2001)
Linux J.
, vol.2001
, Issue.89
, pp. 3
-
-
Rescorla, E.1
-
37
-
-
84944878354
-
-
1st ed. Boca Raton, FL: CRC Press, Inc.
-
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot, Handbook of Applied Cryptography, 1st ed. Boca Raton, FL: CRC Press, Inc., 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Oorschot, P.C.V.3
-
38
-
-
0034445661
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System architecture directions for networked sensors," SIGPLAN Not., vol. 35, no. 11, pp. 93-104, Nov. 2000. (Pubitemid 32474159)
-
(2000)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
39
-
-
79851471661
-
A random number generator for low power cryptographic application
-
Nov.
-
J. Lan, W. L. Goh, Z. H. Kong, and K. S. Yeo, "A random number generator for low power cryptographic application," in Proc. 2010 Int. SoC Design Conf. (ISOCC), Nov. 2010, pp. 328-331.
-
(2010)
Proc. 2010 Int. SoC Design Conf. (ISOCC)
, pp. 328-331
-
-
Lan, J.1
Goh, W.L.2
Kong, Z.H.3
Yeo, K.S.4
-
40
-
-
0000653210
-
Selecting cryptographic key sizes
-
DOI 10.1007/s00145-001-0009-4
-
A. K. Lenstra and E. R. Verheul, "Selecting cryptographic key sizes," J. Cryptology, vol. 14, pp. 255-293, 1999. (Pubitemid 33770276)
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
41
-
-
70350585044
-
Energy-efficient implementation of ECDH key exchange for wireless sensor networks
-
Berlin, Heidelberg: Springer-Verlag
-
C. Lederer, R. Mader, M. Koschuch, J. Grosschädl, A. Szekely, and S. Tillich, Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks, ser. WISTP'09. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 112-127.
-
(2009)
Ser. WISTP'09
, pp. 112-127
-
-
Lederer, C.1
Mader, R.2
Koschuch, M.3
Grosschädl, J.4
Szekely, A.5
Tillich, S.6
-
42
-
-
84870059338
-
Shake: Single hash key establishment for resource constrained devices
-
Jan
-
P. Barsocchi, G. Oligeri, and C. Soriente, "Shake: Single hash key establishment for resource constrained devices," Ad Hoc Networks, vol. 11, no. 1, pp. 288-297, Jan. 2012.
-
(2012)
Ad Hoc Networks
, vol.11
, Issue.1
, pp. 288-297
-
-
Barsocchi, P.1
Oligeri, G.2
Soriente, C.3
-
43
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
S.Mathur, N. M. C. Ye, and A. Reznik, "Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. MobiCom, 2008, pp. 128-139.
-
(2008)
Proc. MobiCom
, pp. 128-139
-
-
Mathur, S.1
Ye, N.M.C.2
Reznik, A.3
|