-
2
-
-
0035001320
-
Exploring robustness in group key agreement
-
Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, 1. Stanton, and G. Tsudik. "Exploring robustness in group key agreement." In IEEE ICDCS, pages 399-408, 2001.
-
(2001)
IEEE ICDCS
, pp. 399-408
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Schultz, J.4
Stanton, J.5
Tsudik, G.6
-
3
-
-
85027496257
-
Secret-key reconciliation by public discussion
-
Springer
-
G. Brassard and L. Sal vail. "Secret-key reconciliation by public discussion." In Advances in Cryptology-Eurocrypt, pages 410-423. Springer, 1 994.
-
(1994)
Advances in Cryptology-Eurocrypt
, pp. 410-423
-
-
Brassard, G.1
Salvail, L.2
-
4
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song. "Random key predistribution schemes for sensor networks". In Symposium on Security and Privacy, pages 197-2 1 3, 2003.
-
(2003)
Symposium on Security and Privacy
, vol.1
, Issue.3
, pp. 197-2
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
5
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Springer
-
Y. Dodis, L. Reyzin, and A. Smith. "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data". In Advances in Cryptology-Eurocrypt, pages 523-540. Springer, 2004.
-
(2004)
Advances in Cryptology-Eurocrypt
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
6
-
-
79551483702
-
Tool release: Gathering 802.111 n traces with channel state information
-
D. Halperin, W. Hu, A. Sheth, and D. Wetherall.'Tool release: gathering 802. 11ntraces with channel state information." ACM SIGCOMM Computer Communication Review, 41 (1) : 53-53, 20 1 l.
-
(2011)
ACM SIGCOMM Computer Communication Review
, vol.41
, Issue.1
, pp. 53-53
-
-
Halperin, D.1
Hu, W.2
Sheth, A.3
Wetherall, D.4
-
7
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
A. Hassan, W. Stark, 1. Hershey, and S. Chennakeshu. "Cryptographic key agreement for mobile radio." Digital Signal Processing, 6(4):207-212, 1996.
-
(1996)
Digital Signal Processing
, vol.6
, Issue.4
, pp. 207-212
-
-
Hassan, A.1
Stark, W.2
Hershey, J.3
Chennakeshu, S.4
-
8
-
-
84907893332
-
Proximate: Proximity-based secure pairing using ambient wireless signals
-
T. Heartbeats. "Proximate: Proximity-based secure pairing using ambient wireless signals." IEEE Wireless Communications, page 8, 20ll.
-
(2011)
IEEE Wireless Communications
, pp. 8
-
-
Heartbeats, T.1
-
9
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
J. Hershey, A. Hassan, and R. Yarlagadda. "Unconventional cryptographic keying variable management." IEEE Tran. on Communications, 43(1) : 31, 1995.
-
(1995)
IEEE Tran. on Communications
, vol.43
, Issue.1
, pp. 31
-
-
Hershey, J.1
Hassan, A.2
Yarlagadda, R.3
-
10
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
R. Impagliazzo, L. Levin, and M. Luby. "Pseudo-random generation from one-way functions." In ACM STOC, pages 12-24, 1989.
-
(1989)
ACM STOC
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.2
Luby, M.3
-
11
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy. "On the effectiveness of secret key extraction from wireless signal strength in real environments." In ACM MobiCom, pages 321-332, 2009.
-
(2009)
ACM MobiCom
, pp. 321-332
-
-
Jana, S.1
Premnath, S.2
Clark, M.3
Kasera, S.4
Patwari, N.5
Krishnamurthy, S.6
-
12
-
-
33645989774
-
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
-
P. Lee, J. Lui, and D. Yau. "Distributed collaborative key agreement and authentication protocols for dynamic peer groups." IEEElACM Tran. on Networking, 14(2) :263-276, 2006.
-
(2006)
IEEElACM Tran. on Networking
, vol.14
, Issue.2
, pp. 263-276
-
-
Lee, P.1
Lui, J.2
Yau, D.3
-
13
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
M. Li, W. Lou, and K. Ren. "Data security and privacy in wireless body area networks." IEEE Wireless Communications, 17(1) : 5 1-58, 20 10.
-
(2010)
IEEE Wireless Communications
, vol.17
, Issue.1
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
14
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, and R. Li. "Establishing pairwise keys in distributed sensor networks." ACM Trans. on Information and System Security, 8(1) : 41-77, 2005.
-
(2005)
ACM Trans. on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li., R.3
-
15
-
-
84866269425
-
Exploiting channel diversity in secret key generation from multipath fading randomness
-
Y. Liu, S. Draper, and A. Sayeed. "Exploiting channel diversity in secret key generation from multipath fading randomness." IEEE Trans. on Information Forensics and Security, PP(99): I, 2012.
-
(2012)
IEEE Trans. on Information Forensics and Security
, vol.1
, pp. 99
-
-
Liu, Y.1
Draper, S.2
Sayeed, A.3
-
16
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. "Radiotelepathy: extracting a secret key from an unauthenticated wireless channel." In ACM MobiCom, pages 128-139, 2008.
-
(2008)
ACM MobiCom
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
17
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels-part iii: Privacy amplification
-
Apr.
-
U. Maurer and S. Wolf. "Secret-key agreement over unauthenticated public channels-part iii: Privacy amplification." IEEE Tran. on Information Theory, 49(4): 839-851, Apr. 2003.
-
(2003)
IEEE Tran. on Information Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.1
Wolf, S.2
-
18
-
-
77955667690
-
Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis
-
J. Wallace and R. Sharma. "Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis." IEEE Tran. on Information Forensics and Security, 5(3) :381-392, 2010.
-
(2010)
IEEE Tran. on Information Forensics and Security
, vol.5
, Issue.3
, pp. 381-392
-
-
Wallace, J.1
Sharma, R.2
-
20
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe. "Using the physical layer for wireless authentication in time-variant channels." IEEE Tran. on Wireless Communications, 7(7) :2571-2579, 2008.
-
(2008)
IEEE Tran. on Wireless Communications
, vol.7
, Issue.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
21
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
june
-
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. Mandayam. "Information-theoretically secret key generation for fading wireless channels." IEEE Tran. on Information Forensics and Security, 5(2): 240-254, june 20 10.
-
(2010)
IEEE Tran. on Information Forensics and Security
, vol.5
, Issue.2
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.6
-
22
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. Haas. "Securing ad hoc networks." IEEE Network, 13(6): 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
23
-
-
3543056512
-
An interleaved hop-byhop authentication scheme for filtering of injected false data in sensor networks
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning. "An interleaved hop-byhop authentication scheme for filtering of injected false data in sensor networks." In IEEE Symposium on Security and Privacy, pages 259-27 1, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
24
-
-
84943553152
-
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia. "Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach." In IEEE ICNP, pages 326-335, 2003.
-
(2003)
IEEE ICNP
, pp. 326-335
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
27
-
-
0029405656
-
Generalized privacy amplilication
-
Nov.
-
CH Bennett, G. Brassard, C. Crrpeau, and UM Maurer. "Generalized privacy amplilication," IEEE Tran. on Information Theory, vo1.41, pp. 1 9 1 5-1 923, Nov. 1995.
-
(1995)
IEEE Tran. on Information Theory
, vol.41
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crrpeau, C.3
Maurer, U.M.4
-
28
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
Aono, T. and Higuchi, K. and Ohira, T. and Komiyama, B. and Sasaoka, H. "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Tran. on Antennas and Propagation, vol. 53, pages 3776-3784, 2005.
-
(2005)
IEEE Tran. on Antennas and Propagation
, vol.53
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
29
-
-
84883122633
-
Fast and practical secret key extraction by exploiting channel response
-
H. Liu, Y. Wang, J. Yang, and Y. Chen. "Fast and Practical Secret Key Extraction by Exploiting Channel Response." In IEEE INFOCOM, pages 31 48-3 156, 20 13.
-
(2013)
IEEE Infocom
, pp. 3148-3156
-
-
Liu, H.1
Wang, Y.2
Yang, J.3
Chen, Y.4
-
31
-
-
38049106551
-
Finding SHA-I characteristics : General results and applications
-
Springer
-
D. Christophe, and R. Christian. "Finding SHA-I characteristics : General results and applications." In Advances in Cryptology-ASIA CRYPT, pages 1-20. Springer, 2006.
-
(2006)
Advances in Cryptology-ASIA CRYPT
, pp. 1-20
-
-
Christophe, D.1
Christian, R.2
|