-
2
-
-
84887043492
-
-
Redbow Labs. http://vimeo.com/37679492.
-
Redbow Labs
-
-
-
6
-
-
80051755314
-
Keys through ARQ: Theory and practice
-
Y. Abdallah, L. A. Latif, M. Yousse, A. Sultan, and H. E. Gamal. Keys through ARQ: Theory and Practice. IEEE Transactions on Information Forensics and Security, 6(3):737-751, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
, pp. 737-751
-
-
Abdallah, Y.1
Latif, L.A.2
Yousse, M.3
Sultan, A.4
Gamal, H.E.5
-
13
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
J. Hershey, A. Hassan, and R. Yarlagadda. Unconventional Cryptographic Keying Variable Management. IEEE Transactions on Communications, 43(1):3-6, 1995.
-
(1995)
IEEE Transactions on Communications
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.1
Hassan, A.2
Yarlagadda, R.3
-
15
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S. N. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy. On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments. In Proceedings of the ACM MOBICOM Conference, 2009.
-
(2009)
Proceedings of the ACM MOBICOM Conference
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.4
Patwari, N.5
Krishnamurthy, S.6
-
21
-
-
0027599802
-
Secret-key agreement by public discussion from common information
-
U. Maurer. Secret-Key Agreement by Public Discussion from Common Information. IEEE Transactions on Information Theory, 39:733-742, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.1
-
24
-
-
0037396951
-
Secret key agreement over unauthenticated public channels Part III: Privacy amplification
-
U. Maurer and S. Wolf. Secret Key Agreement over Unauthenticated Public Channels Part III: Privacy Amplification. IEEE Transactions on Information Theory, 49(4):839-851, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.1
Wolf, S.2
-
27
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
30
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner. The Wire-tap Channel. Bell System Technical Journal, 54(8):1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
32
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. Mandayam. Information-Theoretically Secret Key Generation for FadingWireless Channels. IEEE Transactions on Information Forensics and Security, 5:240-254, 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.6
|