-
1
-
-
0017018484
-
New directions in cryptography
-
Nov
-
W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
2
-
-
79960864004
-
Adaptive wireless channel probing for shared key generation
-
Apr
-
Y. Wei, K. Zeng, and P. Mohapatra, "Adaptive Wireless Channel Probing for Shared Key Generation," Proc. IEEE INFOCOM, Apr. 2011.
-
(2011)
Proc IEEE INFOCOM
-
-
Wei, Y.1
Zeng, K.2
Mohapatra, P.3
-
3
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, and S.V. Krishnamurthy, "On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments," Proc. ACM MobiCom, pp. 321-332, 2009.
-
(2009)
Proc ACM MobiCom
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
4
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radio-Telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel," Proc. ACM MobiCom, pp. 128-139, 2008.
-
(2008)
Proc ACM MobiCom
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
5
-
-
77953297543
-
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
-
Mar
-
K. Zeng, D. Wu, C.A., and P. Mohapatra, "Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks," Proc. IEEE INFOCOM, pp. 1-9, Mar. 2010.
-
(2010)
Proc IEEE INFOCOM
, pp. 1-9
-
-
Zeng, K.1
Wu, C.A.D.2
Mohapatra, P.3
-
6
-
-
72249083097
-
High-Rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
Jan.
-
N. Patwari, J. Croft, S. Jana, and S. Kasera, "High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements," IEEE Trans. Mobile Computing, vol. 9, no. 1, pp. 17-30, Jan. 2010.
-
(2010)
IEEE Trans. Mobile Computing
, vol.9
, Issue.1
, pp. 17-30
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, S.4
-
8
-
-
84860686731
-
Secret key establishment using temporally and spatially correlated wireless channel coefficients
-
Feb.
-
C. Chen and M. Jensen, "Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients," IEEE Trans. Mobile Computing, vol. 10, no. 2, pp. 205-215, Feb. 2011.
-
(2011)
IEEE Trans. Mobile Computing
, vol.10
, Issue.2
, pp. 205-215
-
-
Chen, C.1
Jensen, M.2
-
9
-
-
0004188848
-
Elements of information theory
-
J. Thomas, Elements of Information Theory. John Wiley and Sons, 1991.
-
(1991)
John Wiley and Sons
-
-
Thomas, J.1
-
10
-
-
0016880887
-
On the complexity of finite sequences
-
Jan
-
A. Lempel and J. Ziv, "On the Complexity of Finite Sequences," IEEE Trans. Information Theory, vol. 22, no. 1, pp. 75-81, Jan. 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.22
, Issue.1
, pp. 75-81
-
-
Lempel, A.1
Ziv, J.2
-
11
-
-
84857275599
-
Quantifying neural correlations using lempel-ziv complexity
-
J.-L. Blanc, N. Schmidt, L. Bonnier, L. Pezard, and A. Lesne, "Quantifying Neural Correlations Using Lempel-Ziv Complexity," Proc. NEUROCOMP Conf., 2008.
-
(2008)
Proc. NEUROCOMP Conf
-
-
Blanc, J.-L.1
Schmidt, N.2
Bonnier, L.3
Pezard, L.4
Lesne, A.5
-
12
-
-
33947126657
-
Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels: RSSI Interleaving Scheme
-
Oct
-
T. Aono, K. Higuchi, M. Taromaru, T. Ohira, and H. Sasaoka, "Wireless Secret Key Generation Exploiting the Reactance-Domain Scalar Response of Multipath Fading Channels: RSSI Interleaving Scheme," Proc. European Conf. Wireless Technology, pp. 173-176, Oct. 2005.
-
(2005)
Proc. European Conf. Wireless Technology
, pp. 173-176
-
-
Aono, T.1
Higuchi, K.2
Taromaru, M.3
Ohira, T.4
Sasaoka, H.5
-
13
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust Key Generation from Signal Envelopes in Wireless Networks," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 401-410, 2007.
-
(2007)
Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07)
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
14
-
-
50249098715
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
Sept
-
R. Wilson, D. Tse, and R. Scholtz, "Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels," Proc. IEEE Int'l Conf. Ultra-Wideband, pp. 270-275, Sept. 2007.
-
(2007)
Proc IEEE Int'l Conf. Ultra-Wideband
, pp. 270-275
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.3
-
15
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U.M. Maurer, "Secret Key Agreement by Public Discussion from Common Information," IEEE Trans. Information Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
17
-
-
0001777508
-
Linking information reconciliation and privacy amplification
-
C. Cachin and U.M. Maurer, "Linking Information Reconciliation and Privacy Amplification," J. Cryptology, vol. 10, pp. 97-110, 1997. (Pubitemid 127754567)
-
(1997)
Journal of Cryptology
, vol.10
, Issue.2
, pp. 97-110
-
-
Cachin, C.1
-
18
-
-
0033881606
-
Secure information transmission for mobile radio
-
DOI 10.1109/4234.824754
-
H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure Information Transmission for Mobile Radio," IEEE Comm. Letters, vol. 4, no. 2, pp. 52-55, Feb. 2000. (Pubitemid 30564390)
-
(2000)
IEEE Communications Letters
, vol.4
, Issue.2
, pp. 52-55
-
-
Koorapaty, H.1
Hassan, A.A.2
Chennakeshu, S.3
-
19
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C.H. Bennett, G. Brassard, C. Crkpeau, and U.M. Maurer, "Generalized Privacy Amplification," IEEE Trans. Information Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crkpeau, C.3
Maurer, U.M.4
-
23
-
-
77955667690
-
Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis
-
Sept.
-
J. Wallace and R. Sharma, "Automatic Secret Keys from Reciprocal MIMO Wireless Channels: Measurement and Analysis," IEEE Trans. Wireless Comm., vol. 5, no. 3, pp. 381-392, Sept. 2010.
-
(2010)
IEEE Trans. Wireless Comm
, vol.5
, Issue.3
, pp. 381-392
-
-
Wallace, J.1
Sharma, R.2
-
24
-
-
84904651793
-
-
"Wireshark," http://en.wikipedia. org/wiki/Wireshark, 2013.
-
(2013)
Wireshark
-
-
-
25
-
-
0003418321
-
DARPA internet program protocol specification
-
Sept
-
J. Postel, "DARPA Internet Program Protocol Specification," IETF RFC 792, Sept. 1981.
-
(1981)
IETF RFC
, vol.792
-
-
Postel, J.1
-
26
-
-
0000989527
-
Entropy and information in neural spike trains
-
S.P. Strong, R. Koberle, d.R. van Steveninck, and W. Bialek, "Entropy and Information in Neural Spike Trains," Phys. Rev. Letters, vol. 80, 1998.
-
(1998)
Phys. Rev. Letters
, vol.80
-
-
Strong, S.P.1
Koberle, R.2
Steveninck Van, D.R.3
Bialek, W.4
-
27
-
-
12144290812
-
Estimating the Entropy Rate of Spike Trains via Lempel-Ziv Complexity
-
DOI 10.1162/089976604322860677
-
J.M. Amigo, J. Szczepanski, E. Wajnryb, and M.V. Sanchez-Vives, "Estimating the Entropy Rate of Spike Trains via Lempel-Ziv Complexity," Neural Computation, vol. 16, pp. 717-736, 2004. (Pubitemid 38318130)
-
(2004)
Neural Computation
, vol.16
, Issue.4
, pp. 717-736
-
-
Amigo, J.M.1
Szczepanski, J.2
Wajnryb, E.3
Sanchez-Vives, M.V.4
-
29
-
-
0000756319
-
Optimum settings for automatic controllers
-
J.B. Ziegler and N.B. Nichols, "Optimum Settings for Automatic Controllers," ASME Trans., vol. 64, pp. 759-768, 1942.
-
(1942)
ASME Trans
, vol.64
, pp. 759-768
-
-
Ziegler, J.B.1
Nichols, N.B.2
|