-
1
-
-
84860665083
-
Secure wireless communications: Secret keys through multipath
-
A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in IEEE ICASSP, 2008.
-
(2008)
IEEE ICASSP
-
-
Sayeed, A.1
Perrig, A.2
-
2
-
-
79957865221
-
Unconditionally secure communications over fading channels
-
M. Tope and J. McEachen, "Unconditionally secure communications over fading channels," in IEEE MILCOM, 2001.
-
(2001)
IEEE MILCOM
-
-
Tope, M.1
McEachen, J.2
-
3
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. Azimi-Sadjadi and et al., "Robust key generation from signal envelopes in wireless networks," in ACM CCS, 2007.
-
(2007)
ACM CCS
-
-
Azimi-Sadjadi, B.1
-
4
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: extracting a secret key from an unauthenticated wireless channel," in ACM MobiCom, 2008.
-
(2008)
ACM MobiCom
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
5
-
-
70649113058
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
N. Patwari, J. Croft, S. Jana, and S. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," IEEE Transactions on Mobile Computing, 2009.
-
(2009)
IEEE Transactions on Mobile Computing
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, S.4
-
6
-
-
77953297543
-
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
-
K. Zeng and et al., "Exploiting multiple-antenna diversity for shared secret key generation in wireless networks," in IEEE INFOCOM, 2010.
-
(2010)
IEEE INFOCOM
-
-
Zeng, K.1
-
7
-
-
77952329424
-
Secret keys from entangled sensor motes: Implementation and analysis
-
M. Wilhelm, I. Martinovic, and J. Schmitt, "Secret keys from entangled sensor motes: implementation and analysis," in ACM Wisec, 2010.
-
(2010)
ACM Wisec
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.3
-
8
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana and et al., "On the effectiveness of secret key extraction from wireless signal strength in real environments," in ACM MobiCom, 2009.
-
(2009)
ACM MobiCom
-
-
Jana, S.1
-
10
-
-
84881150085
-
Tool release: Gathering 802.11n traces with channel state information
-
D. Halperin and et al., "Tool release: Gathering 802.11n traces with channel state information," ACM SIGCOMM CCR, 2011.
-
(2011)
ACM SIGCOMM CCR
-
-
Halperin, D.1
-
11
-
-
79960885380
-
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
-
Q. Wang, H. Su, K. Ren, and K. Kim, "Fast and scalable secret key generation exploiting channel phase randomness in wireless networks," in IEEE INFOCOM, 2011.
-
(2011)
IEEE INFOCOM
-
-
Wang, Q.1
Su, H.2
Ren, K.3
Kim, K.4
-
13
-
-
84883128611
-
Vulnerabilities of wireless key exchange based on channel reciprocity
-
N. Döttling and et al., "Vulnerabilities of wireless key exchange based on channel reciprocity," Information Security Applications, 2011.
-
(2011)
Information Security Applications
-
-
Döttling, N.1
-
15
-
-
79957837002
-
On passive inference attacks against physical-layer key extraction?
-
M. Edman, A. Kiayias, and B. Yener, "On passive inference attacks against physical-layer key extraction?" in EUROSEC, 2011.
-
(2011)
EUROSEC
-
-
Edman, M.1
Kiayias, A.2
Yener, B.3
-
16
-
-
84883069922
-
Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness
-
T.-H. Chou, S. Draper, and A. Sayeed, "Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness," in IEEE ISIT, 2010.
-
(2010)
IEEE ISIT
-
-
Chou, T.-H.1
Draper, S.2
Sayeed, A.3
-
17
-
-
84861623350
-
Collaborative secret key extraction leveraging received signal strength in mobile wireless networks
-
H. Liu, J. Yang, Y. Wang, and Y. Chen, "Collaborative secret key extraction leveraging received signal strength in mobile wireless networks," in IEEE INFOCOM, 2012.
-
(2012)
IEEE INFOCOM
-
-
Liu, H.1
Yang, J.2
Wang, Y.3
Chen, Y.4
-
18
-
-
84883100784
-
Extracting secrecy from jointly gaussian random variables
-
C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly gaussian random variables," in IEEE ISIT, 2006.
-
(2006)
IEEE ISIT
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
-
19
-
-
84883128684
-
Final report on RF channel characterization
-
Joint Technical Committee (JTC) on Wireless Access
-
Joint Technical Committee (JTC) on Wireless Access, "Final Report on RF Channel Characterization," JTC(AIR)/93.09.23-238R2, 1993.
-
(1993)
JTC(AIR)/93.09.23-238R2
-
-
-
20
-
-
3843081053
-
A statistical test suite for random and pseudorandom number generators for cryptographic applications
-
A. Rukhin and et al., "A statistical test suite for random and pseudorandom number generators for cryptographic applications," National Institute of Standards and Technology, 2001.
-
(2001)
National Institute of Standards and Technology
-
-
Rukhin, A.1
|