-
1
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
2-s2.0-78649322624 10.1016/j.jnca.2010.07.006
-
Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 2011 34 1 1 11 2-s2.0-78649322624 10.1016/j.jnca.2010.07.006
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
3
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
September 2008 New York, NY, USA ACM 2-s2.0-60149097098 10.1145/1409944.1409960
-
Mathur S., Trappe W., Mandayam N., Ye C., Reznik A., Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. Proceedings of the 14th Annual International Conference on Mobile Computing and Networking (MobiCom '08) September 2008 New York, NY, USA ACM 128 139 2-s2.0-60149097098 10.1145/1409944.1409960
-
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking (MobiCom '08)
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
4
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
September 2009 New York, NY, USA ACM 2-s2.0-70450242725 10.1145/1614320.1614356
-
Jana S., Premnath S. N., Clark M., Kasera S. K., Patwari N., Krishnamurthy S. V., On the effectiveness of secret key extraction from wireless signal strength in real environments. Proceedings of the 15th annual international conference on Mobile computing and networking (MobiCom '09) September 2009 New York, NY, USA ACM 321 332 2-s2.0-70450242725 10.1145/1614320.1614356
-
Proceedings of the 15th Annual International Conference on Mobile Computing and Networking (MobiCom '09)
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
5
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
2-s2.0-77952604175 10.1109/TIFS.2010.2043187
-
Ye C., Mathur S., Reznik A., Shah Y., Trappe W., Mandayam N. B., Information-theoretically secret key generation for fading wireless channels. IEEE Transactions on Information Forensics and Security 2010 5 2 240 254 2-s2.0-77952604175 10.1109/TIFS.2010.2043187
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.B.6
-
6
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
2-s2.0-72249083097 10.1109/TMC.2009.88
-
Patwari N., Croft J., Jana S., Kasera S. K., High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing 2010 9 1 17 30 2-s2.0-72249083097 10.1109/TMC.2009.88
-
(2010)
IEEE Transactions on Mobile Computing
, vol.9
, Issue.1
, pp. 17-30
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, S.K.4
-
8
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
2-s2.0-0029234878 10.1109/26.385951
-
Hershey J. E., Hassan A. A., Yarlagadda R., Unconventional cryptographic keying variable management. IEEE Transactions on Communications 1995 43 1 3 6 2-s2.0-0029234878 10.1109/26.385951
-
(1995)
IEEE Transactions on Communications
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.E.1
Hassan, A.A.2
Yarlagadda, R.3
-
9
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
DOI 10.1006/dspr.1996.0023
-
Hassan A. A., Stark W. E., Hershey J. E., Chennakeshu S., Cryptographic key agreement for mobile radio. Digital Signal Processing 1996 6 4 207 212 2-s2.0-0030259976 10.1006/dspr.1996.0023 (Pubitemid 126395658)
-
(1996)
Digital Signal Processing: A Review Journal
, vol.6
, Issue.4
, pp. 207-212
-
-
Hassan, A.A.1
Stark, W.E.2
Hershey, J.E.3
Chennakeshu, S.4
-
11
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
DOI 10.1109/TAP.2005.858853
-
Aono T., Higuchi K., Ohira T., Komiyama B., Sasaoka H., Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Transactions on Antennas and Propagation 2005 53 11 3776 3784 2-s2.0-28644438588 10.1109/TAP.2005.858853 (Pubitemid 41748822)
-
(2005)
IEEE Transactions on Antennas and Propagation
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
12
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
DOI 10.1145/1161289.1161297, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
Zang L., Wenyuan X., Miller R., Trappe W., Securing wireless systems via lower layer enforcements. Proceedings of the 5th ACM Workshop on Wireless Security (WiSE '06) September 2006 ACM 33 42 2-s2.0-34247339387 10.1145/1161289.1161297 (Pubitemid 46634300)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 33-42
-
-
Zang, L.1
Wenyuan, X.2
Miller, R.3
Trappe, W.4
-
13
-
-
39049156464
-
Extracting secrecy from jointly Gaussian random variables
-
DOI 10.1109/ISIT.2006.262101, 4036441, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
Ye C., Reznik A., Shah Y., Extracting secrecy from jointly Gaussian random variables. Proceedings of the IEEE International Symposium on Information Theory (ISIT '06) July 2006 2593 2597 2-s2.0-39049156464 10.1109/ISIT.2006. 262101 (Pubitemid 351244572)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
-
18
-
-
45249104850
-
Wireless information-theoretic security
-
2-s2.0-45249104850 10.1109/TIT.2008.921908
-
Bloch M., Barros J., Rodrigues M. R. D., McLaughlin S. W., Wireless information-theoretic security. IEEE Transactions on Information Theory 2008 54 6 2515 2534 2-s2.0-45249104850 10.1109/TIT.2008.921908
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
24
-
-
77949631620
-
A note on information-theoretic secret key exchange over wireless channels
-
October 2009 2-s2.0-77949631620 10.1109/ALLERTON.2009.5394934
-
Zafer M. A., Agrawal D., Srivatsa M., A note on information-theoretic secret key exchange over wireless channels. Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton '09) October 2009 754 761 2-s2.0-77949631620 10.1109/ALLERTON.2009.5394934
-
Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton '09)
, pp. 754-761
-
-
Zafer, M.A.1
Agrawal, D.2
Srivatsa, M.3
-
25
-
-
70449479022
-
Secure physical layer key generation schemes: Performance and information theoretic limits
-
June 2009 2-s2.0-70449479022 10.1109/ICC.2009.5199440
-
Wallace J., Secure physical layer key generation schemes: performance and information theoretic limits. Proceedings of the IEEE International Conference on Communications (ICC '09) June 2009 1 5 2-s2.0-70449479022 10.1109/ICC.2009.5199440
-
Proceedings of the IEEE International Conference on Communications (ICC '09)
, pp. 1-5
-
-
Wallace, J.1
-
30
-
-
67449087822
-
Secret key generation and agreement in UWB communication channels
-
December 2008 2-s2.0-67449087822 10.1109/GLOCOM.2008.ECP.356
-
Madiseh M. G., McGuire M. L., Neville S. S., Cai L., Horie M., Secret key generation and agreement in UWB communication channels. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08) December 2008 1842 1846 2-s2.0-67449087822 10.1109/GLOCOM.2008.ECP.356
-
Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08)
, pp. 1842-1846
-
-
Madiseh, M.G.1
McGuire, M.L.2
Neville, S.S.3
Cai, L.4
Horie, M.5
-
35
-
-
80052337836
-
Secret key generation exploiting channel characteristics in wireless communications
-
Ren K., Su H., Wang Q., Secret key generation exploiting channel characteristics in wireless communications. IEEE Wireless Communications 2011 18 4 6 12
-
(2011)
IEEE Wireless Communications
, vol.18
, Issue.4
, pp. 6-12
-
-
Ren, K.1
Su, H.2
Wang, Q.3
-
36
-
-
0023985539
-
Privacy amplification by public discussion
-
2-s2.0-0023985539
-
Bennett C. H., Brassard G., Robert J. M., Privacy amplification by public discussion. SIAM Journal on Computing 1988 17 2 210 229 2-s2.0-0023985539
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.M.3
-
38
-
-
0001777508
-
Linking information reconciliation and privacy amplification
-
Cachin C., Linking information reconciliation and privacy amplification. Journal of Cryptology 1997 10 2 97 110 2-s2.0-0001777508 (Pubitemid 127754567)
-
(1997)
Journal of Cryptology
, vol.10
, Issue.2
, pp. 97-110
-
-
Cachin, C.1
-
39
-
-
84944486890
-
Gray codes and paths on the n-cube
-
Gilbert E. N., Gray codes and paths on the n-cube. Bell Systems Technical Journal 1958 37 815 826
-
(1958)
Bell Systems Technical Journal
, vol.37
, pp. 815-826
-
-
Gilbert, E.N.1
-
43
-
-
4143138747
-
Node-disjoint path routing in wireless networks: Tradeoff between path lifetime and total energy
-
June 2004 2-s2.0-4143138747
-
Tang J., Xue G., Node-disjoint path routing in wireless networks: Tradeoff between path lifetime and total energy. Proceedings of the IEEE International Conference on Communications (ICC '04) June 2004 3812 3816 2-s2.0-4143138747
-
Proceedings of the IEEE International Conference on Communications (ICC '04)
, pp. 3812-3816
-
-
Tang, J.1
Xue, G.2
-
47
-
-
0016102201
-
Single tone parameter estimation from discrete-time observations
-
2-s2.0-0016102201
-
Rife D. C., Boorstyn R. R., Single tone parameter estimation from discrete-time observations. IEEE Transactions on Information Theory 1974 IT-20 5 591 598 2-s2.0-0016102201
-
(1974)
IEEE Transactions on Information Theory
, vol.20
, Issue.5
, pp. 591-598
-
-
Rife, D.C.1
Boorstyn, R.R.2
-
48
-
-
0032186636
-
Parsec: A parallel simulation environment for complex systems
-
Bagrodia R., Meyer R., Takai M., Chen Y. A., Zeng X., Martin J., Song H. Y., Parsec: a parallel simulation environment for complex systems. Computer 1998 31 10 77 85 2-s2.0-0032186636 (Pubitemid 128550810)
-
(1998)
Computer
, vol.31
, Issue.10
, pp. 77-85
-
-
Bagrodia, R.1
Meyer, R.2
Takai, M.3
Chen, Y.-A.4
Zeng, X.5
Martin, J.6
Song, H.Y.7
|