-
1
-
-
84863772559
-
Operator controlled deviceto-device communications in LTE-advanced networks
-
June
-
L. Lei, Z. Zhong, C. Lin, and X. Shen, "Operator controlled deviceto-device communications in LTE-advanced networks," IEEE Wireless Communications, vol. 19, no. 3, pp. 96-104, June 2012.
-
(2012)
IEEE Wireless Communications
, vol.19
, Issue.3
, pp. 96-104
-
-
Lei, L.1
Zhong, Z.2
Lin, C.3
Shen, X.4
-
2
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
Alexandria, Virginia, USA
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in CCS'07, Alexandria, Virginia, USA, 2007.
-
(2007)
CCS'07
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
3
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
San Francisco, California, USA
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: extracting a secret key from an unauthenticated wireless channel," in MobiCom'08, San Francisco, California, USA, 2008, pp. 128-139.
-
(2008)
MobiCom'08
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
4
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
Beijing, China
-
S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments," in MobiCom'09, Beijing, China, 2009.
-
(2009)
MobiCom'09
-
-
Jana, S.1
Premnath, S.2
Clark, M.3
Kasera, S.4
Patwari, N.5
Krishnamurthy, S.6
-
5
-
-
77953297543
-
Exploiting multipleantenna diversity for shared secret key generation in wireless networks
-
San Diego, California, USA
-
K. Zeng, D. Wu, A. Chan, and P. Mohapatra, "Exploiting multipleantenna diversity for shared secret key generation in wireless networks," in Proceedings of the 29th conference on Information communications, ser. INFOCOM'10, San Diego, California, USA, 2010.
-
(2010)
Proceedings of the 29th Conference on Information Communications, Ser. INFOCOM'10
-
-
Zeng, K.1
Wu, D.2
Chan, A.3
Mohapatra, P.4
-
6
-
-
84865493080
-
Cooperative key generation in wireless networks
-
L. Lai, Y. Liang, and W. Du, "Cooperative key generation in wireless networks," IEEE Journal on Selected Areas in Communications, vol. 30, no. 8, pp. 1578-1588, 2012.
-
(2012)
IEEE Journal on Selected Areas in Communications
, vol.30
, Issue.8
, pp. 1578-1588
-
-
Lai, L.1
Liang, Y.2
Du, W.3
-
7
-
-
79960857245
-
Physical layer wireless security made fast and channel independent
-
Shanghai, China, Apr.
-
S. Gollakota and D. Katabi, "Physical layer wireless security made fast and channel independent," in INFOCOM'11, Shanghai, China, Apr. 2011.
-
(2011)
INFOCOM'11
-
-
Gollakota, S.1
Katabi, D.2
-
8
-
-
84856094320
-
Phy-based cooperative key generation in wireless networks
-
Allerton House, UIUC, Illinois, USA
-
L. Lai, Y. Liang, and W. Du, "Phy-based cooperative key generation in wireless networks," in Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on, Allerton House, UIUC, Illinois, USA, 2011.
-
(2011)
Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on
-
-
Lai, L.1
Liang, Y.2
Du, W.3
-
9
-
-
0027629488
-
Common randomness in information theory and cryptography. I. Secret sharing
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography. i. secret sharing," IEEE Transactions on Information Theory, vol. 39, no. 4, pp. 1121-1132, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
12
-
-
84904433389
-
-
Arizona State University, Technical Report, July 2013
-
J. Sun, X. Chen, Y. Zhang, and J. Zhang, "SYNERGY: A gametheoretical approach for cooperative key generation in wireless networks," Arizona State University, Technical Report, July 2013, http: //cnsg.asu.edu/files/sun- INFOCOM14.pdf.
-
SYNERGY: A Gametheoretical Approach for Cooperative Key Generation in Wireless Networks
-
-
Sun, J.1
Chen, X.2
Zhang, Y.3
Zhang, J.4
-
13
-
-
84861623350
-
Collaborative secret key extraction leveraging received signal strength in mobile wireless networks
-
Orlando, FL, Mar.
-
H. Liu, J. Yang, Y. Wang, and Y. Chen, "Collaborative secret key extraction leveraging received signal strength in mobile wireless networks," in IEEE INFOCOM'12, Orlando, FL, Mar. 2012.
-
(2012)
IEEE INFOCOM'12
-
-
Liu, H.1
Yang, J.2
Wang, Y.3
Chen, Y.4
-
14
-
-
84879516937
-
ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for body area networks
-
Budapest, Hungary, Apr.
-
S. Lu, J. Yuan, S. Yu, and M. Li, "ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks," in ACM WiSec'13, Budapest, Hungary, Apr. 2013.
-
(2013)
ACM WiSec'13
-
-
Lu, S.1
Yuan, J.2
Yu, S.3
Li, M.4
-
15
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
Sep.
-
R. Wilson, D. Tse, and R. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. on Information Forensics and Security, vol. 2, no. 3, pp. 364-375, Sep. 2007.
-
(2007)
IEEE Trans. on Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.3
-
16
-
-
51449114762
-
Secure wireless communications: Secret keys through multipath
-
A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in ICASSP'08, 2008.
-
(2008)
ICASSP'08
-
-
Sayeed, A.1
Perrig, A.2
-
17
-
-
84881509221
-
Key generation in two-way relay wireless channels
-
Baltimore, MD, USA
-
H. Zhou, L. Huie, and L. Lai, "Key generation in two-way relay wireless channels," in CISS'13, Baltimore, MD, USA, 2013.
-
(2013)
CISS'13
-
-
Zhou, H.1
Huie, L.2
Lai, L.3
-
18
-
-
84883029780
-
Social trust and social reciprocity based cooperative d2d communications
-
Bangalore, India
-
X. Chen, B. Proulx, X. Gong, and J. Zhang, "Social trust and social reciprocity based cooperative d2d communications," in MobiHoc'13, Bangalore, India, 2013.
-
(2013)
MobiHoc'13
-
-
Chen, X.1
Proulx, B.2
Gong, X.3
Zhang, J.4
|