-
1
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust Key Generation from Signal Envelopes in Wireless Networks," Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 401-410, 2007.
-
(2007)
Proc. ACM Conf. Computer and Comm. Security (CCS)
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
2
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
Nov.
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless Secret Key Generation Exploiting Reactance-Domain Scalar Response of Multipath Fading Channels," IEEE Trans. Antennas and Propagation, vol. 53, no. 11, pp. 3776-3784, Nov. 2005.
-
(2005)
IEEE Trans. Antennas and Propagation
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
3
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy, "On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments," Proc. ACM Mobi-Com, pp. 321-332, 2009.
-
(2009)
Proc. ACM Mobi-Com
, pp. 321-332
-
-
Jana, S.1
Premnath, S.2
Clark, M.3
Kasera, S.4
Patwari, N.5
Krishnamurthy, S.6
-
4
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radio-Telepathy: Extracting A Secret Key from an Unauthenticated Wireless Channel," Proc. ACM MobiCom, pp. 128-139, 2008.
-
(2008)
Proc. ACM MobiCom
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
6
-
-
79960885380
-
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
-
Q. Wang, H. Su, K. Ren, and K. Kim, "Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks," Proc. IEEE INFOCOM, 2011.
-
(2011)
Proc. IEEE INFOCOM
-
-
Wang, Q.1
Su, H.2
Ren, K.3
Kim, K.4
-
7
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
Jan.
-
N. Patwari, J. Croft, S. Jana, and S. Kasera, "High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements," IEEE Trans. Mobile Computing, vol. 9, no. 1, pp. 17-30, Jan. 2010.
-
(2010)
IEEE Trans. Mobile Computing
, vol.9
, Issue.1
, pp. 17-30
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, S.4
-
8
-
-
77954527646
-
Robust uncorrelated bit extraction methodologies for wireless sensors
-
J. Croft, N. Patwari, and S. Kasera, "Robust Uncorrelated Bit Extraction Methodologies for Wireless Sensors," Proc. ACM/IEEE Ninth Int'l Conf. Information Processing in Sensor Networks (ICNP), pp. 70-81, 2010.
-
(2010)
Proc. ACM/IEEE Ninth Int'l Conf. Information Processing in Sensor Networks (ICNP)
, pp. 70-81
-
-
Croft, J.1
Patwari, N.2
Kasera, S.3
-
9
-
-
77953297543
-
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
-
K. Zeng, D. Wu, A. Chan, and P. Mohapatra, "Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks," Proc. IEEE INFOCOM, pp. 1-9, 2010.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Zeng, K.1
Wu, D.2
Chan, A.3
Mohapatra, P.4
-
10
-
-
77952329424
-
Secret keys from entangled sensor motes: Implementation and analysis
-
M. Wilhelm, I. Martinovic, and J. Schmitt, "Secret Keys from Entangled Sensor Motes: Implementation and Analysis," Proc. ACM Third Conf. Wireless Network Security (Wisec), pp. 139-144, 2010.
-
(2010)
Proc. ACM Third Conf. Wireless Network Security (Wisec)
, pp. 139-144
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.3
-
11
-
-
84908525765
-
Self-certified group key generation for ad hoc clusters in wireless sensor networks
-
O. Arazi and H. Qi, "Self-Certified Group Key Generation for Ad Hoc Clusters in Wireless Sensor Networks," Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Arazi, O.1
Qi, H.2
-
12
-
-
3142512728
-
Tree-based group key agreement
-
Y. Kim, A. Perrig, and G. Tsudik, "Tree-Based Group Key Agreement," ACM Trans. Information and System Security, vol. 7, pp. 60-96, 2004.
-
(2004)
ACM Trans. Information and System Security
, vol.7
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
13
-
-
78649346776
-
Secret key generation for a pairwise independent network model
-
Dec.
-
S. Nitinawarat, C. Ye, A. Barg, P. Narayan, and A. Reznik, "Secret Key Generation for a Pairwise Independent Network Model," IEEE Trans. Information Theory, vol. 56, no. 12, pp. 6482-6489, Dec. 2010.
-
(2010)
IEEE Trans. Information Theory
, vol.56
, Issue.12
, pp. 6482-6489
-
-
Nitinawarat, S.1
Ye, C.2
Barg, A.3
Narayan, P.4
Reznik, A.5
-
14
-
-
78649383176
-
Perfect omniscience, perfect secrecy, and steiner tree packing
-
Dec.
-
S. Nitinawarat and P. Narayan, "Perfect Omniscience, Perfect Secrecy, and Steiner Tree Packing," IEEE Trans. Information Theory, vol. 56, no. 12, pp. 6490-6500, Dec. 2010.
-
(2010)
IEEE Trans. Information Theory
, vol.56
, Issue.12
, pp. 6490-6500
-
-
Nitinawarat, S.1
Narayan, P.2
-
17
-
-
70449479022
-
Secure physical layer key generation schemes: Performance and information theoretic limits
-
J. Wallace, "Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits," Proc. IEEE Int'l Conf. Comm. (ICC), pp. 1-5, 2009.
-
(2009)
Proc. IEEE Int'l Conf. Comm. (ICC)
, pp. 1-5
-
-
Wallace, J.1
-
18
-
-
70349883977
-
Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits
-
J. Wallace, C. Chen, and M. Jensen, "Key Generation Exploiting MIMO Channel Evolution: Algorithms and Theoretical Limits," Proc. Third European Conf. Antennas and Propagation (EuCAP), pp. 1499-1503, 2009.
-
(2009)
Proc. Third European Conf. Antennas and Propagation (EuCAP)
, pp. 1499-1503
-
-
Wallace, J.1
Chen, C.2
Jensen, M.3
-
19
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
Mar.
-
U. Maurer and S. Wolf, "Unconditionally Secure Key Agreement and the Intrinsic Conditional Information," IEEE Trans. Information Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Information Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.1
Wolf, S.2
-
20
-
-
70449469434
-
Minimum energy per bit for secret key acquisition over multipath wireless channels
-
S. Draper, A. Sayeed, and T. Chou, "Minimum Energy per Bit for Secret Key Acquisition over Multipath Wireless Channels," Proc. IEEE Int'l Symp. Information Theory (ISIT), pp. 2296-2300, 2009.
-
(2009)
Proc. IEEE Int'l Symp. Information Theory (ISIT)
, pp. 2296-2300
-
-
Draper, S.1
Sayeed, A.2
Chou, T.3
-
21
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
Jan.
-
J. Hershey, A. Hassan, and R. Yarlagadda, "Unconventional Cryptographic Keying Variable Management," IEEE Trans. Comm., vol. 43, no. 1, pp. 3-6, Jan. 1995.
-
(1995)
IEEE Trans. Comm.
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.1
Hassan, A.2
Yarlagadda, R.3
-
22
-
-
47649111825
-
On the secrecy capabilities of ITU channels
-
C. Ye, A. Reznik, G. Sternberg, and Y. Shah, "On the Secrecy Capabilities of ITU Channels," Proc. IEEE 66th Vehicular Technology Conf. (VTC '07 Fall), 2007.
-
(2007)
Proc. IEEE 66th Vehicular Technology Conf. (VTC '07 Fall)
-
-
Ye, C.1
Reznik, A.2
Sternberg, G.3
Shah, Y.4
-
23
-
-
49649086664
-
Secret key extraction in ultra wideband channels for unsynchronized radios
-
M. Madiseh, M. McGuire, S. Neville, and A. Shirazi, "Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios," Proc. Comm. Networks and Services Research Conf. (CNSR), pp. 88-95, 2008.
-
(2008)
Proc. Comm. Networks and Services Research Conf. (CNSR)
, pp. 88-95
-
-
Madiseh, M.1
McGuire, M.2
Neville, S.3
Shirazi, A.4
-
24
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
Sept.
-
R. Wilson, D. Tse, and R. Scholtz, "Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels," IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 364-375, Sept. 2007.
-
(2007)
IEEE Trans. Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.3
-
26
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
Z. Li, W. Xu, R. Miller, and W. Trappe, "Securing Wireless Systems via Lower Layer Enforcements," Proc. ACM Workshop Wireless Security, pp. 33-42, 2006.
-
(2006)
Proc. ACM Workshop Wireless Security
, pp. 33-42
-
-
Li, Z.1
Xu, W.2
Miller, R.3
Trappe, W.4
-
27
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
Mar.
-
I. Csiszar and P. Narayan, "Common Randomness and Secret Key Generation with a Helper," IEEE Trans. Information Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
-
(2000)
IEEE Trans. Information Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
28
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszar and R. Ahlswede, "Secrecy Capacities for Multiple Terminals," IEEE Trans. Information Theory, vol. 50, no. 12, pp. 3046-3061, Dec. 2004.
-
(2004)
IEEE Trans. Information Theory
, vol.50
, Issue.12
, pp. 3046-3061
-
-
Csiszar, I.1
Ahlswede, R.2
-
30
-
-
84883056247
-
Extracting secret key from wireless link dynamics in vehicular environments
-
X. Zhu, F. Xu, E. Novak, C.C. Tan, Q. Li, and G. Chen, "Extracting Secret Key from Wireless Link Dynamics in Vehicular Environments," Proc. IEEE INFOCOM, 2013.
-
(2013)
Proc. IEEE INFOCOM
-
-
Zhu, X.1
Xu, F.2
Novak, E.3
Tan, C.C.4
Li, Q.5
Chen, G.6
-
31
-
-
84908525761
-
-
Now, Publishers, Inc.
-
Y. Liang, H.V. Poor, and S. Shamai (Shitz), Information Theoretic Security, Foundations and Trends in Communications and Information Theory, vol. 5, Now, Publishers, Inc., 2008.
-
(2008)
Information Theoretic Security, Foundations and Trends in Communications and Information Theory
, vol.5
-
-
Liang, Y.1
Poor, H.V.2
Shamai Shitz, S.3
-
33
-
-
0027629488
-
Common randomness in information theory and cryptography, part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszar, "Common Randomness in Information Theory and Cryptography, Part I: Secret Sharing," IEEE Trans. Information Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Information Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
34
-
-
0037396695
-
Secret key agreement over a non-authenticated channel Part III
-
Apr.
-
U. Maurer and S. Wolf, "Secret Key Agreement over a Non-Authenticated Channel Part III," IEEE Trans. Information Theory, vol. 49, no. 4, pp. 822-851, Apr. 2003.
-
(2003)
IEEE Trans. Information Theory
, vol.49
, Issue.4
, pp. 822-851
-
-
Maurer, U.1
Wolf, S.2
-
35
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszar and P. Narayan, "Secrecy Capacities for Multiple Terminals," IEEE Trans. Information Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Information Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszar, I.1
Narayan, P.2
-
36
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret Key Agreement by Public Discussion from Common Information," IEEE Trans. Information Theory, vol. 39, no. 3, pp. 733-742, May. 1993.
-
(1993)
IEEE Trans. Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
38
-
-
39049156464
-
Extracting secrecy from jointly gaussian random variables
-
C. Ye, A. Reznik, and Y. Shah, "Extracting Secrecy from Jointly Gaussian Random Variables," Proc. IEEE Int'l Symp. Information Theory (ISIT), pp. 2593-2597, 2006.
-
(2006)
Proc. IEEE Int'l Symp. Information Theory (ISIT)
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
-
41
-
-
84861623350
-
Collaborative secret key extraction leveraging received signal strength in mobile wireless networks
-
H. Liu, J. Yang, Y. Wang, and Y. Chen, "Collaborative Secret Key Extraction Leveraging Received Signal Strength in Mobile Wireless Networks," Proc. IEEE INFOCOM, pp. 927-935, 2012.
-
(2012)
Proc. IEEE INFOCOM
, pp. 927-935
-
-
Liu, H.1
Yang, J.2
Wang, Y.3
Chen, Y.4
|