-
2
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, " Comm. ACM, vol. 21, pp. 120-126, 1978
-
(1978)
Comm. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
4
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. Hellman, "New Directions in Cryptography, " IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
5
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
Feb.
-
N.R. Potlapally, S. Ravi, A. Raghunath, and N.K. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols, " IEEE Trans. Mobile Computing, vol. 5, no. 2, pp. 128-143, Feb. 2006.
-
(2006)
IEEE Trans. Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunath, A.3
Jha, N.K.4
-
6
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch, J. Barros, M.R.D. Rodrigues, and S.W. McLaughlin, "Wireless Information-Theoretic Security, " IEEE Trans. Information Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
-
(2008)
IEEE Trans. Information Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
7
-
-
79960562183
-
Secrecy capacity for satellite networks under rain fading
-
Sept.
-
D.K. Petraki, M.P. Anastasopoulus, and S. Papavassiliou, "Secrecy Capacity for Satellite Networks under Rain Fading, " IEEE Trans. Dependable and Secure Computing, vol. 8, no. 5, pp. 777-782, Sept. 2011.
-
(2011)
IEEE Trans. Dependable and Secure Computing
, vol.8
, Issue.5
, pp. 777-782
-
-
Petraki, D.K.1
Anastasopoulus, M.P.2
Papavassiliou, S.3
-
8
-
-
79960399745
-
Robust beamforming for security in mimo wiretap channels with imperfect csi
-
Jan.
-
A. Mukherjee and A.L. Swindlehurst, "Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI, " IEEE Trans. Signal Processing, vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Processing
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
9
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P.K. Gopala, L. Lai, and H. El Gamal, "On the Secrecy Capacity of Fading Channels, " IEEE Trans. Information Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Information Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
10
-
-
79956205910
-
Maximal ratio diversity combining enhanced security
-
Mar.
-
F. He, H. Man, and W. Wang, "Maximal Ratio Diversity Combining Enhanced Security, " IEEE Comm. Letters, vol. 15, no. 5, pp. 509-511, Mar. 2011.
-
(2011)
IEEE Comm. Letters
, vol.15
, Issue.5
, pp. 509-511
-
-
He, F.1
Man, H.2
Wang, W.3
-
11
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A.P. Petropulu, and H.V. Poor, "Improving Wireless Physical Layer Security via Cooperating Relays, " IEEE Trans. Signal Processing, vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Processing
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
12
-
-
70349925048
-
Secured communication over frequency-selective fading channels: A practical vandermonde precoding
-
M. Kobayashi, M. Debbah, and S. Shamai, "Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding, " Eurasip J. Wireless Comm. and Networking, 2009.
-
(2009)
Eurasip J. Wireless Comm. and Networking
-
-
Kobayashi, M.1
Debbah, M.2
Shamai, S.3
-
13
-
-
71149098880
-
Securing ofdm over wireless time-varying channels using sub-carrier over-loading with joint signal constellations
-
G.R. Tsouri and D. Wulich, "Securing OFDM over Wireless Time-Varying Channels Using Sub-Carrier Over-Loading with Joint Signal Constellations, " Eurasip J. Wireless Comm. and Networking, 2009.
-
(2009)
Eurasip J. Wireless Comm. and Networking
-
-
Tsouri, G.R.1
Wulich, D.2
-
14
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
Jan.
-
J.E. Hershey, A.A. Hassan, and R. Yarlagadda, "Unconventional Cryptographic Keying Variable Management, " IEEE Trans. Comm., vol. 43, no. 1, pp. 3-6, Jan. 1995.
-
(1995)
IEEE Trans. Comm.
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.E.1
Hassan, A.A.2
Yarlagadda, R.3
-
15
-
-
0033881606
-
Secure information transmission for mobile radio
-
Feb.
-
H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure Information Transmission for Mobile Radio, " IEEE Comm. Letters, vol. 4, no. 2, pp. 52-55, Feb. 2000.
-
(2000)
IEEE Comm. Letters
, vol.4
, Issue.2
, pp. 52-55
-
-
Koorapaty, H.1
Hassan, A.2
Chennakeshu, S.3
-
16
-
-
45249119255
-
Secure communication over fading channels
-
June
-
Y. Liang, H.V. Poor, and S. Shamai (Shitz), "Secure Communication over Fading Channels, " IEEE Trans. Information Theory, vol. 54, no. 6, pp. 2470-2492, June 2008.
-
(2008)
IEEE Trans. Information Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
17
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
Sept.
-
R. Wilson, D. Tse, and R.A. Scholtz, "Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels, " IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 364-375, Sept. 2007.
-
(2007)
IEEE Trans. Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
18
-
-
84860686731
-
Secret key establishment using temporally and spatially correlated wireless channel coefficients
-
Feb.
-
C. Chen and M.A. Jensen, "Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients, " IEEE Trans. Mobile Computing, vol. 10, no. 2, pp. 205-215, Feb. 2011.
-
(2011)
IEEE Trans. Mobile Computing
, vol.10
, Issue.2
, pp. 205-215
-
-
Chen, C.1
Jensen, M.A.2
-
19
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
June
-
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N.B. Mandayam, "Information-Theoretically Secret Key Generation for Fading Wireless Channels, " IEEE Trans. Information Forensics and Security, vol. 5, no. 3, pp. 240-254, June 2010.
-
(2010)
IEEE Trans. Information Forensics and Security
, vol.5
, Issue.3
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.B.6
-
21
-
-
77955667690
-
Automatic secret keys from reciprocal mimo wireless channels: Measurements and analysis
-
Sept.
-
J.W. Wallace and R.K. Sharma, "Automatic Secret Keys from Reciprocal MIMO Wireless Channels: Measurements and Analysis, " IEEE Trans. Information Forensics and Security, vol. 5, no. 3, pp. 381-392, Sept. 2010.
-
(2010)
IEEE Trans. Information Forensics and Security
, vol.5
, Issue.3
, pp. 381-392
-
-
Wallace, J.W.1
Sharma, R.K.2
-
22
-
-
60149097098
-
Radio-telepathy: Extracting secret key from an unauthenticated wireless channel
-
Sept.
-
S. Mathur, W. Trappe, N. Mandayan, C. Ye, and A. Reznik, "Radio-Telepathy: Extracting Secret Key from an Unauthenticated Wireless Channel, " Proc. 14th ACM Int'l Conf. Mobile Computing and Networking, Sept. 2008.
-
(2008)
Proc. 14th ACM Int'l Conf. Mobile Computing and Networking
-
-
Mathur, S.1
Trappe, W.2
Mandayan, N.3
Ye, C.4
Reznik, A.5
-
23
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
Sept.
-
S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, and S.V. Krishnamurthy, "On the Effectiveness of Secret Key Extraction from Wireless Signal Strength In Real Environments, " Proc. 15th ACM Ann. Int'l Conf. Mobile Computing and Networking, Sept. 2009.
-
(2009)
Proc. 15th ACM Ann. Int'l Conf. Mobile Computing and Networking
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
24
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
Jan.
-
N. Patwari, J. Croft, S. Jana, and S. Kumar Kasera, "High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements, " IEEE Trans. Mobile Computing, vol. 9, no. 1, pp. 17-30, Jan. 2010.
-
(2010)
IEEE Trans. Mobile Computing
, vol.9
, Issue.1
, pp. 17-30
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kumar Kasera, S.4
-
25
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
July
-
L. Xiao, L. Greenstein, N.B. Mandayam, and W. Trappe, "Using the Physical Layer for Wireless Authentication in Time-Variant Channels, " IEEE Trans. Wireless Comm., vol. 7, no. 7, pp. 2571-2579, July 2008.
-
(2008)
IEEE Trans. Wireless Comm.
, vol.7
, Issue.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.B.3
Trappe, W.4
-
26
-
-
73049092718
-
Channel-based spoofing detection in frequency-selective ray-leigh channels
-
Dec.
-
L. Xiao, L. Greenstein, N.B. Mandayam, and W. Trappe, "Channel-Based Spoofing Detection in Frequency-Selective Ray-leigh Channels, " IEEE Trans. Wireless Comm., vol. 8, no. 12, pp. 5948-5956, Dec. 2009.
-
(2009)
IEEE Trans. Wireless Comm.
, vol.8
, Issue.12
, pp. 5948-5956
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.B.3
Trappe, W.4
-
27
-
-
69749083720
-
Channel-based detection of sybil attacks in wireless networks
-
Sept.
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Channel-Based Detection of Sybil Attacks in Wireless Networks, " IEEE Trans. Information Forensics and Security, vol. 4, no. 3, pp. 492-503, Sept. 2009.
-
(2009)
IEEE Trans. Information Forensics and Security
, vol.4
, Issue.3
, pp. 492-503
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
28
-
-
79961063540
-
Proximate: Proximity-based secure pairing using ambient wireless signals
-
S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Mandayam, "Proximate: Proximity-Based Secure Pairing Using Ambient Wireless Signals, " Proc. Ninth Int'l Conf. Mobile Systems, Applications, and Services, pp. 211-224, 2011.
-
(2011)
Proc. Ninth Int'l Conf. Mobile Systems, Applications, and Services
, pp. 211-224
-
-
Mathur, S.1
Miller, R.2
Varshavsky, A.3
Trappe, W.4
Mandayam, N.5
-
29
-
-
33845642280
-
Novel sum-of-sinusoids simulation models for rayleigh and rician fading channels
-
Dec.
-
C. Xiao, Y.R. Zheng, and N.C. Beaulieu, "Novel Sum-of-Sinusoids Simulation Models for Rayleigh and Rician Fading Channels, " IEEE Trans. Wireless Comm., vol. 5, no. 12, pp. 3667-3679, Dec. 2006.
-
(2006)
IEEE Trans. Wireless Comm.
, vol.5
, Issue.12
, pp. 3667-3679
-
-
Xiao, C.1
Zheng, Y.R.2
Beaulieu, N.C.3
-
30
-
-
0003822632
-
-
Technical Report SP 800-22 Rev. 1a, Nat'l Inst. of Standards and Technology, Aug.
-
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo, "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, " Technical Report SP 800-22 Rev. 1a, Nat'l Inst. of Standards and Technology, Aug. 2008.
-
(2008)
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, A.10
Dray, J.11
Vo, S.12
-
31
-
-
84890522850
-
Communication theory of secrecy systems
-
C.E. Shannon, "Communication Theory of Secrecy Systems, " Bell Systems Technical J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Systems Technical J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
32
-
-
84923996598
-
-
A. Goldsmith, Wireless Communications. Univ., 2005
-
A. Goldsmith, Wireless Communications. Univ., 2005.
-
-
-
|