-
1
-
-
38149059722
-
Key generation based on acceleration data of shaking processes
-
Berlin, Heidelberg. Springer-Verlag
-
D. Bichler, G. Stromberg, M. Huemer, and M. L flow. Key generation based on acceleration data of shaking processes. In Proceedings of the 9th international conference on Ubiquitous computing, UbiComp'07, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
Proceedings of the 9th International Conference on Ubiquitous Computing, UbiComp'07
-
-
Bichler, D.1
Stromberg, G.2
Huemer, M.3
Flow, M.L.4
-
2
-
-
85027496257
-
Secret-key reconciliation by public discussion
-
T. Helleseth, editor, volume 765 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg
-
G. Brassard and L. Salvail. Secret-key reconciliation by public discussion. In T. Helleseth, editor, Advances in Cryptology, a̧ ł EUROCRYPT, a̧ŕ93, volume 765 of Lecture Notes in Computer Science, pages 410-423. Springer Berlin / Heidelberg, 1994.
-
(1994)
Advances in Cryptology, A̧ ł EUROCRYPT, a̧ŕ93
, pp. 410-423
-
-
Brassard, G.1
Salvail, L.2
-
3
-
-
84868359825
-
Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas
-
San Diego, California, USA, 6th February - 9th February 2011. The Internet Society
-
L. Cai, K. Zeng, H. Chen, and P. Mohapatra. Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011. The Internet Society, 2011.
-
(2011)
Proceedings of the Network and Distributed System Security Symposium, NDSS 2011
-
-
Cai, L.1
Zeng, K.2
Chen, H.3
Mohapatra, P.4
-
4
-
-
84939435969
-
Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
oct.
-
S. Cherukuri, K. Venkatasubramanian, and S. Gupta. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In Parallel Processing Workshops, 2003. Proceedings. 2003 International Conference on, pages 432 - 439, oct. 2003.
-
(2003)
Parallel Processing Workshops, 2003. Proceedings. 2003 International Conference on
, pp. 432-439
-
-
Cherukuri, S.1
Venkatasubramanian, K.2
Gupta, S.3
-
6
-
-
79959634698
-
An experimental study on the impact of human body shadowing in of-body communications channels at 2.45 ghz
-
april
-
S. Cotton, A. McKernan, A. Ali, and W. Scanlon. An experimental study on the impact of human body shadowing in of-body communications channels at 2.45 ghz. In Antennas and Propagation (EUCAP), Proceedings of the 5th European Conference on, pages 3133 - 3137, april 2011.
-
(2011)
Antennas and Propagation (EUCAP), Proceedings of the 5th European Conference on
, pp. 3133-3137
-
-
Cotton, S.1
McKernan, A.2
Ali, A.3
Scanlon, W.4
-
7
-
-
84856160802
-
Received signal characteristics of outdoor body-to-body communications channels at 2.45 ghz
-
2011 Loughborough, nov.
-
S. Cotton, A. McKernan, and W. Scanlon. Received signal characteristics of outdoor body-to-body communications channels at 2.45 ghz. In Antennas and Propagation Conference (LAPC), 2011 Loughborough, pages 1 - 4, nov. 2011.
-
(2011)
Antennas and Propagation Conference (LAPC)
, pp. 1-4
-
-
Cotton, S.1
McKernan, A.2
Scanlon, W.3
-
8
-
-
79952950550
-
The effect of body shape and gender on wireless body area network on-body channels
-
oct.
-
F. Di Franco, C. Tachtatzis, B. Graham, M. Bykowski, D. Tracey, N. Timmons, and J. Morrison. The effect of body shape and gender on wireless body area network on-body channels. In Antennas and Propagation (MECAP), 2010 IEEE Middle East Conference on, pages 1 - 3, oct. 2010.
-
(2010)
Antennas and Propagation (MECAP), 2010 IEEE Middle East Conference on
, pp. 1-3
-
-
Di Franco, F.1
Tachtatzis, C.2
Graham, B.3
Bykowski, M.4
Tracey, D.5
Timmons, N.6
Morrison, J.7
-
9
-
-
84856865292
-
On-body to on-body channel characterization
-
IEEE, oct. 2011
-
F. Di Franco, C. Tachtatzis, B. Graham, D. Tracey, N. Timmons, and J. Morrison. On-body to on-body channel characterization. In Sensors, 2011 IEEE, pages 908 - 911, oct. 2011.
-
(2011)
Sensors
, pp. 908-911
-
-
Di Franco, F.1
Tachtatzis, C.2
Graham, B.3
Tracey, D.4
Timmons, N.5
Morrison, J.6
-
10
-
-
84865611232
-
A practical man-in-The-middle attack on signal-based key generation protocols
-
volume 7459 of Lecture Notes in Computer Science, Springer Berlin Heidelberg
-
S. Eberz, M. Strohmeier, M. Wilhelm, and I. Martinovic. A practical man-in-the-middle attack on signal-based key generation protocols. In Computer Security - ESORICS 2012, volume 7459 of Lecture Notes in Computer Science, pages 235-252. Springer Berlin Heidelberg, 2012.
-
(2012)
Computer Security - ESORICS 2012
, pp. 235-252
-
-
Eberz, S.1
Strohmeier, M.2
Wilhelm, M.3
Martinovic, I.4
-
11
-
-
79960856885
-
Biometric-based two-level secure access control for implantable medical devices during emergencies
-
april
-
X. Hei and X. Du. Biometric-based two-level secure access control for implantable medical devices during emergencies. In INFOCOM, 2011 Proceedings IEEE, pages 346 -350, april 2011.
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 346-350
-
-
Hei, X.1
Du, X.2
-
12
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
New York, NY, USA. ACM
-
R. Impagliazzo, L. A. Levin, and M. Luby. Pseudo-random generation from one-way functions. In Proceedings of the twenty-first annual ACM symposium on Theory of computing, STOC '89, pages 12-24, New York, NY, USA, 1989. ACM.
-
(1989)
Proceedings of the Twenty-first Annual ACM Symposium on Theory of Computing, STOC '89
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
13
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
New York, NY, USA, ACM
-
S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the 15th annual international conference on Mobile computing and networking, MobiCom '09, pages 321-332, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MobiCom '09
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
14
-
-
77955002645
-
Ensemble: Cooperative proximity-based authentication
-
New York, NY, USA. ACM
-
A. Kalamandeen, A. Scannell, E. de Lara, A. Sheth, and A. LaMarca. Ensemble: cooperative proximity-based authentication. In Proceedings of the 8th international conference on Mobile systems, applications, and services, MobiSys '10, pages 331-344, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, MobiSys '10
, pp. 331-344
-
-
Kalamandeen, A.1
Scannell, A.2
De Lara, E.3
Sheth, A.4
Lamarca, A.5
-
15
-
-
84856094320
-
Phy-based cooperative key generation in wireless networks
-
sept.
-
L. Lai, Y. Liang, and W. Du. Phy-based cooperative key generation in wireless networks. In Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on, pages 662 -669, sept. 2011.
-
(2011)
Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on
, pp. 662-669
-
-
Lai, L.1
Liang, Y.2
Du, W.3
-
16
-
-
79951723271
-
A survey on wireless body area networks
-
1-18, Jan.
-
B. Latré, B. Braem, I. Moerman, C. Blondia, and P. Demeester. A survey on wireless body area networks. Wirel. Netw., 17(1):1-18, Jan. 2011.
-
(2011)
Wirel. Netw.
, vol.17
, Issue.1
-
-
Latré, B.1
Braem, B.2
Moerman, I.3
Blondia, C.4
Demeester, P.5
-
17
-
-
79961063540
-
Proximate: Proximity-based secure pairing using ambient wireless signals
-
New York, NY, USA. ACM
-
S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Mandayam. Proximate: proximity-based secure pairing using ambient wireless signals. In Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pages 211-224, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11
, pp. 211-224
-
-
Mathur, S.1
Miller, R.2
Varshavsky, A.3
Trappe, W.4
Mandayam, N.5
-
18
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
ACM
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 128-139. ACM, 2008.
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
19
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
New York, NY, USA. ACM
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking, MobiCom '08,pages 128-139, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom '08
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
21
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
june
-
R. Mayrohofer and H. Gellersen. Shake well before use: Intuitive and secure pairing of mobile devices. Mobile Computing, IEEE Transactions on, 8(6), june 2009.
-
(2009)
Mobile Computing IEEE Transactions on
, vol.8
, Issue.6
-
-
Mayrohofer, R.1
Gellersen, H.2
-
22
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
-
IEEE, april
-
C. Poon, Y.-T. Zhang, and S.-D. Bao. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. Communications Magazine, IEEE, 44(4):73-81, april 2006.
-
(2006)
Communications Magazine
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.1
Zhang, Y.-T.2
Bao, S.-D.3
-
23
-
-
2542441781
-
Channel model for wireless communication around human body
-
april
-
J. Ryckaert, P. De Doncker, R. Meys, A. de Le Hoye, and S. Donnay. Channel model for wireless communication around human body. Electronics Letters, 40(9):543-544, april 2004.
-
(2004)
Electronics Letters
, vol.40
, Issue.9
, pp. 543-544
-
-
Ryckaert, J.1
De Doncker, P.2
Meys, R.3
De Le Hoye, A.4
Donnay, S.5
-
24
-
-
0025415365
-
The maximum concurrent ow problem
-
Apr.
-
F. Shahrokhi and D. W. Matula. The maximum concurrent ow problem. J. ACM, 37(2):318-334, Apr. 1990.
-
(1990)
J. ACM
, vol.37
, Issue.2
, pp. 318-334
-
-
Shahrokhi, F.1
Matula, D.W.2
-
25
-
-
84860670073
-
Bana: Body area network authentication exploiting channel characteristics
-
New York, NY, USA. ACM
-
L. Shi, M. Li, S. Yu, and J. Yuan. Bana: body area network authentication exploiting channel characteristics. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, pages 27-38, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12
, pp. 27-38
-
-
Shi, L.1
Li, M.2
Yu, S.3
Yuan, J.4
-
26
-
-
84879534588
-
-
Shimmer. http://www.shimmerresearch.com/p/sensor-and-modules.
-
-
-
-
28
-
-
38349004892
-
Amigo: Proximity-based authentication of mobile devices
-
Berlin, Heidelberg, .Springer-Verlag
-
A. Varshavsky, A. Scannell, A. LaMarca, and E. De Lara. Amigo: proximity-based authentication of mobile devices. In Proceedings of the 9th international conference on Ubiquitous computing, UbiComp '07, pages 253-270, Berlin, Heidelberg, 2007.Springer-Verlag.
-
(2007)
Proceedings of the 9th International Conference on Ubiquitous Computing, UbiComp '07
, pp. 253-270
-
-
Varshavsky, A.1
Scannell, A.2
Lamarca, A.3
De Lara, E.4
-
29
-
-
76849098534
-
Pska: Usable and secure key agreement scheme for body area networks
-
jan.
-
K. Venkatasubramanian, A. Banerjee, and S. Gupta. Pska: Usable and secure key agreement scheme for body area networks. Information Technology in Biomedicine, IEEE Transactions on, 14(1):60-68, jan. 2010.
-
(2010)
Information Technology in Biomedicine IEEE Transactions on
, vol.14
, Issue.1
, pp. 60-68
-
-
Venkatasubramanian, K.1
Banerjee, A.2
Gupta, S.3
-
30
-
-
77954990804
-
Physiological value-based effcient usable security solutions for body sensor networks
-
July
-
K. K. Venkatasubramanian and S. K. S. Gupta. Physiological value-based efficient usable security solutions for body sensor networks. ACM Trans. Sen. Netw., 6(4):31:1-31:36, July 2010.
-
(2010)
ACM Trans. Sen. Netw.
, vol.6
, Issue.4
, pp. 311-3136
-
-
Venkatasubramanian, K.K.1
Gupta, S.K.S.2
-
31
-
-
77953313388
-
Secure wireless communication with dynamic secrets
-
march
-
S. Xiao, W. Gong, and D. Towsley. Secure wireless communication with dynamic secrets. In INFOCOM, 2010 Proceedings IEEE, pages 1-9, march 2010.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Xiao, S.1
Gong, W.2
Towsley, D.3
-
32
-
-
79960873920
-
Imdguard: Securing implantable medical devices with the external wearable guardian
-
april
-
F. Xu, Z. Qin, C. Tan, B. Wang, and Q. Li. Imdguard: Securing implantable medical devices with the external wearable guardian. In INFOCOM, 2011 Proceedings IEEE, pages 1862 -1870, april 2011.
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.3
Wang, B.4
Li, Q.5
|