-
1
-
-
73149118063
-
Correlated link shadow fading in multi-hop wireless networks
-
Agrawal P, Patwari N (2009) Correlated link shadow fading in multi-hop wireless networks. Wireless Commun IEEE Trans 8(8): 4024-4036.
-
(2009)
Wireless Commun IEEE Trans
, vol.8
, Issue.8
, pp. 4024-4036
-
-
Agrawal, P.1
Patwari, N.2
-
2
-
-
84872847641
-
-
In: IEICE Technical Report, Kyoto
-
Aono T, Higuchi K, Taromaru M, Ohira T, Sasaoka H (2005) Experiments of IEEE 802. 15. 4 ESPARSKey (Encryption Scheme Parasite Array Radiator Secret Key)-RSSI Interleaving Scheme. In: IEICE Technical Report. vol 105, Kyoto, pp 31-36.
-
(2005)
Experiments of IEEE 802. 15. 4 ESPARSKey (Encryption Scheme Parasite Array Radiator Secret Key)-RSSI Interleaving Scheme
, vol.105
, pp. 31-36
-
-
Aono, T.1
Higuchi, K.2
Taromaru, M.3
Ohira, T.4
Sasaoka, H.5
-
3
-
-
60149088258
-
Robust Key Generation from signal envelopes in wireless networks
-
ACM, New York
-
Azimi-Sadjadi B, Kiayias A, Mercado A, Yener B (2007) Robust Key Generation from signal envelopes in wireless networks. In: CCS '07: Proceedings of the 14th ACM conference on computer and communications security. ACM, New York, pp 401-410.
-
(2007)
CCS '07: Proceedings of the 14th ACM conference on computer and communications security
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
4
-
-
34047126869
-
Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee Standards
-
Baronti P, Pillai P, Chook VWC, Chessa S, Gotta A, Hu Y-F (2007) Wireless sensor networks: a survey on the state of the art and the 802. 15. 4 and ZigBee Standards. Comput Commun 30(7): 1655-1695.
-
(2007)
Comput Commun
, vol.30
, Issue.7
, pp. 1655-1695
-
-
Baronti, P.1
Pillai, P.2
Chook, V.W.C.3
Chessa, S.4
Gotta, A.5
Hu, Y.-F.6
-
5
-
-
70449587547
-
-
In: IEEE international conference on communications, 2009. ICC '09
-
Barsocchi P, Lenzi S, Chessa S, Giunta G (2009) Virtual calibration for RSSI-based indoor localization with IEEE 802. 15. 4. In: IEEE international conference on communications, 2009. ICC '09, pp 1-5.
-
(2009)
Virtual calibration for RSSI-based indoor localization with IEEE 802. 15. 4
, pp. 1-5
-
-
Barsocchi, P.1
Lenzi, S.2
Chessa, S.3
Giunta, G.4
-
6
-
-
78649516322
-
AmbiSec: securing smart spaces using entropy harvesting
-
(AmI 2010), Malaga, Spain, November
-
Barsocchi P, Chessa S, Martinovic I, Oligeri G (2010) AmbiSec: securing smart spaces using entropy harvesting. In: Proceedings of the first international joint conference on ambient intelligence (AmI 2010), Malaga, Spain, November, pp 73-85.
-
(2010)
Proceedings of the first international joint conference on ambient intelligence
, pp. 73-85
-
-
Barsocchi, P.1
Chessa, S.2
Martinovic, I.3
Oligeri, G.4
-
8
-
-
84872835829
-
-
Crossbow
-
Crossbow http://www. xbow. com.
-
-
-
-
9
-
-
0017973511
-
Broadcast channels with confidential messages
-
Csiszar I, Korner J (1978) Broadcast channels with confidential messages. IEEE Trans Inform Theory 24(3): 339-348.
-
(1978)
IEEE Trans Inform Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
11
-
-
0037702249
-
The nesc language: A holistic approach to networked embedded systems
-
(PLDI)
-
Gay D, Welsh M, Levis P, Brewer E, von Behren R, Culler D (2003) The nesc language: a holistic approach to networked embedded systems. In: Proceedings of programming language design and implementation (PLDI), pp 1-11.
-
(2003)
Proceedings of programming language design and implementation
, pp. 1-11
-
-
Gay, D.1
Welsh, M.2
Levis, P.3
Brewer, E.4
von Behren, R.5
Culler, D.6
-
13
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
ACM, New York
-
Jana S, Premnath SN, Clark M, Kasera SK, Patwari N, Krishnamurthy SV (2009) On the effectiveness of secret key extraction from wireless signal strength in real environments. In: MobiCom '09: proceedings of the 15th annual international conference on Mobile computing and networking. ACM, New York, pp 321-332.
-
(2009)
MobiCom '09: Proceedings of the 15th annual international conference on Mobile computing and networking
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
14
-
-
21644489172
-
enlisting hardware architecture to thwart malicious code injection
-
Series lecture notes in computer science, Springer, Berlin
-
Lee RB, Karig DK, McGregor JP, Shi Z (2004) enlisting hardware architecture to thwart malicious code injection. In: Security in pervasive computing. Series lecture notes in computer science, vol 2802, Springer, Berlin, pp 170-179.
-
(2004)
Security in pervasive computing
, vol.2802
, pp. 170-179
-
-
Lee, R.B.1
Karig, D.K.2
McGregor, J.P.3
Shi, Z.4
-
15
-
-
33744910431
-
TinyOS: An operating system for sensor networks
-
Springer, Berlin
-
Levis P, Madden S, Polastre J, Szewczyk R, Woo A, Gay D, Hill J, Welsh M, Brewer E, Culler D (2004) TinyOS: An operating system for sensor networks. In: Ambient intelligence. Springer, Berlin.
-
(2004)
Ambient intelligence
-
-
Levis, P.1
Madden, S.2
Polastre, J.3
Szewczyk, R.4
Woo, A.5
Gay, D.6
Hill, J.7
Welsh, M.8
Brewer, E.9
Culler, D.10
-
16
-
-
60149097098
-
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
-
ACM, New York
-
Mathur S, Trappe W, Mandayam N, Ye C, Reznik A (2008) Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: MobiCom '08: Proceedings of the 14th ACM international conference on mobile computing and networking. ACM, New York, pp 128-139.
-
(2008)
MobiCom '08: Proceedings of the 14th ACM international conference on mobile computing and networking
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
17
-
-
78149248764
-
Protocols for secret key agreement by public discussion based on common information
-
Series lecture notes in computer science. Springer, Berlin
-
Maurer U (1993) Protocols for secret key agreement by public discussion based on common information. In: Advances in cryptology-CRYPTO '92. Series lecture notes in computer science, vol 740, Springer, Berlin, pp 461-470.
-
(1993)
Advances in cryptology-CRYPTO '92
, vol.740
, pp. 461-470
-
-
Maurer, U.1
-
18
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels-Parts I-III
-
Maurer U, Wolf S (2003) Secret-key agreement over unauthenticated public channels-parts I-III. IEEE Trans Inform Theory 49(4): 822-851.
-
(2003)
IEEE Trans Inform Theory
, vol.49
, Issue.4
, pp. 822-851
-
-
Maurer, U.1
Wolf, S.2
-
19
-
-
77952412339
-
Unbreakable keys from random noise
-
In: Tuyls P, Skoric B, Kevenaar T (eds), Springer, Berlin
-
Maurer U, Renner R, Wolf S (2007) Unbreakable keys from random noise. In: Tuyls P, Skoric B, Kevenaar T (eds) Security with noisy data. Springer, Berlin, pp 21-44.
-
(2007)
Security with noisy data
, pp. 21-44
-
-
Maurer, U.1
Renner, R.2
Wolf, S.3
-
22
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
Patwari N, Croft J, Jana S, Kasera SK (2010) High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans Mobile Comput 9(1): 17-30.
-
(2010)
IEEE Trans Mobile Comput
, vol.9
, Issue.1
, pp. 17-30
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, S.K.4
-
27
-
-
51249123020
-
A Practical evaluation of radio signal strength for ranging-based localization
-
Whitehouse K, Karlof C, Culler D (2007) A Practical evaluation of radio signal strength for ranging-based localization. SIGMOBILE Mob Comput Commun Rev 11(1): 41-52.
-
(2007)
SIGMOBILE Mob Comput Commun Rev
, vol.11
, Issue.1
, pp. 41-52
-
-
Whitehouse, K.1
Karlof, C.2
Culler, D.3
-
30
-
-
0016562514
-
The wire-tap channel
-
Wyner A (1975) The wire-tap channel. Bell Syst Tech J 54(8): 1355-1387.
-
(1975)
Bell Syst Tech J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
32
-
-
60149103674
-
Advancing wireless link signatures for location distinction
-
ACM, New York
-
Zhang J, Firooz MH, Patwari N, Kasera SK (2008) Advancing wireless link signatures for location distinction. In: MobiCom '08: proceedings of the 14th ACM international conference on mobile computing and networking. ACM, New York, pp 26-37.
-
(2008)
MobiCom '08: Proceedings of the 14th ACM international conference on mobile computing and networking
, pp. 26-37
-
-
Zhang, J.1
Firooz, M.H.2
Patwari, N.3
Kasera, S.K.4
|