-
2
-
-
84875683741
-
-
"ipwraw," http://homepages.tu-darmstadt.de/~p-larbig/wlan, 2012.
-
(2012)
Ipwraw
-
-
-
3
-
-
84875660732
-
-
"Radiotap," http://www.radiotap.org, 2012.
-
(2012)
-
-
-
5
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
DOI 10.1109/TAP.2005.858853
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless Secret Key Generation Exploiting Reactance-Domain Scalar Response of Multipath Fading Channels," IEEE Trans. Antennas and Propagation, vol. 53, no. 11, pp. 3776-3784, Nov. 2005. (Pubitemid 41748822)
-
(2005)
IEEE Transactions on Antennas and Propagation
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
6
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust Key Generation from Signal Envelopes in Wireless Networks," Proc. 14th ACM Conf. Computer and Comm. Security (CCS), 2007.
-
(2007)
Proc. 14th ACM Conf. Computer and Comm. Security (CCS)
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
7
-
-
0026626314
-
Experimental quantum cryptography
-
C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental Quantum Cryptography," J. Cryptology, vol. 5, no. 1, pp. 3-28, 1992.
-
(1992)
J. Cryptology
, vol.5
, Issue.1
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
8
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch, J. Barros, M.R.D. Rodrigues, and S.W. McLaughlin, "Wireless Information-Theoretic Security," IEEE Trans. Information Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
-
(2008)
IEEE Trans. Information Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
10
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless Device Identification with Radiometric Signatures," Proc. ACM MobiCom, 2008.
-
(2008)
Proc. ACM MobiCom
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
13
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
DOI 10.1006/dspr.1996.0023
-
A.A. Hassan, W.E. Stark, J.E. Hershey, and S. Chennakeshu, "Cryptographic Key Agreement for Mobile Radio," Elsevier Digital Signal Processing, vol. 6, pp. 207-212, 1996. (Pubitemid 126395658)
-
(1996)
Digital Signal Processing: A Review Journal
, vol.6
, Issue.4
, pp. 207-212
-
-
Hassan, A.A.1
Stark, W.E.2
Hershey, J.E.3
Chennakeshu, S.4
-
14
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
Jan
-
J.E. Hershey, A.A. Hassan, and R. Yarlagadda, "Unconventional Cryptographic Keying Variable Management," IEEE Trans. Comm., vol. 43, no. 1, pp. 3-6, Jan. 1995.
-
(1995)
IEEE Trans. Comm
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.E.1
Hassan, A.A.2
Yarlagadda, R.3
-
15
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
R. Impagliazzo, L.A. Levin, and M. Luby, "Pseudo-Random Generation from One-Way Functions," Proc. 21st Ann. ACM Symp. Theory of Computing (STOC), pp. 12-24, 1989.
-
(1989)
Proc. 21st Ann. ACM Symp. Theory of Computing (STOC)
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
16
-
-
60349083720
-
On fast and accurate detection of unauthorized access points using clock skews
-
S. Jana and S.K. Kasera, "On Fast and Accurate Detection of Unauthorized Access Points Using Clock Skews," Proc. ACM MobiCom, 2008.
-
(2008)
Proc ACM MobiCom
-
-
Jana, S.1
Kasera, S.K.2
-
17
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, and S.V. Krishnamurthy, "On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments," Proc. ACM MobiCom, 2009.
-
(2009)
Proc ACM MobiCom
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
18
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
Z. Li, W. Xu, R. Miller, and W. Trappe, "Securing Wireless Systems via Lower Layer Enforcements," Proc. Fifth ACM Workshop Wireless Security (WiSe), 2006.
-
(2006)
Proc. Fifth ACM Workshop Wireless Security (WiSe)
-
-
Li, Z.1
Xu, W.2
Miller, R.3
Trappe, W.4
-
19
-
-
49649086664
-
Secret key extraction in ultra wideband channels for unsynchronized radios
-
May
-
M.G. Madiseh, M.L. McGuire, S.W. Neville, and A.A.B. Shirazi, "Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios," Proc. Sixth Ann. Comm. Networks Services Research Conf. (CNSR), May 2008.
-
(2008)
Proc. Sixth Ann. Comm. Networks Services Research Conf. (CNSR)
-
-
Madiseh, M.G.1
McGuire, M.L.2
Neville, S.W.3
Shirazi, A.A.B.4
-
20
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N.B. Mandayam, C. Ye, and A. Reznik, "Radio-Telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel," Proc. ACM MobiCom, 2008.
-
(2008)
Proc. ACM MobiCom
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.B.3
Ye, C.4
Reznik, A.5
-
21
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U.M. Maurer, "Secret Key Agreement by Public Discussion from Common Information," IEEE Trans. Information Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
22
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
Mar
-
U.M. Maurer and S. Wolf, "Unconditionally Secure Key Agreement and the Intrinsic Conditional Information," IEEE Trans. Information Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Information Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
26
-
-
0001998264
-
Conjugate coding
-
S. Wiesner, "Conjugate Coding," SIGACT News, vol. 15, no. 1, pp. 78-88, 1983.
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
-
27
-
-
77949875012
-
Radio tomographic imaging with wireless networks
-
May
-
J. Wilson and N. Patwari, "Radio Tomographic Imaging with Wireless Networks," IEEE Trans. Mobile Computing, vol. 9, no. 5, pp. 621-632, May 2010.
-
(2010)
IEEE Trans. Mobile Computing
, vol.9
, Issue.5
, pp. 621-632
-
-
Wilson, J.1
Patwari, N.2
-
28
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
DOI 10.1109/TIFS.2007.902666
-
R. Wilson, D. Tse, and R.A. Scholtz, "Channel Identification: Secret Sharing Using Reciprocity in UWB Channels," IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 364-375, Sept. 2007. (Pubitemid 47290572)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
29
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
June
-
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N.B. Mandayam, "Information-Theoretically Secret Key Generation for Fading Wireless Channels," IEEE Trans. Information Forensics and Security, vol. 5, no. 2, pp. 240-254, June 2010.
-
(2010)
IEEE Trans. Information Forensics and Security
, vol.5
, Issue.2
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.B.6
-
31
-
-
47649111825
-
On the secrecy capabilities of ITU channels
-
Oct
-
C. Ye, A. Reznik, G. Sternberg, and Y. Shah, "On the Secrecy Capabilities of ITU Channels," Proc. IEEE 66th Vehicular Technology Conf. (VTC), Oct. 2007.
-
(2007)
Proc. IEEE 66th Vehicular Technology Conf. (VTC)
-
-
Ye, C.1
Reznik, A.2
Sternberg, G.3
Shah, Y.4
|