-
1
-
-
38149059722
-
Key generation based on acceleration data of shaking processes
-
D. Bichler, G. Stromberg, M. Huemer, and M. Löw, "Key generation based on acceleration data of shaking processes," in Proc. 9th Int. Conf. Ubiquit. Comput. (UbiComp'07), 2007, pp. 304-317.
-
(2007)
Proc. 9th Int. Conf. Ubiquit. Comput. (UbiComp'07)
, pp. 304-317
-
-
Bichler, D.1
Stromberg, G.2
Huemer, M.3
Löw, M.4
-
3
-
-
84868359825
-
Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas
-
Feb. 6-9
-
L. Cai, K. Zeng, H. Chen, and P. Mohapatra, "Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas," in Proc. Netw. Distrib. Syst. Security Symp. (NDSS'11), Feb. 6-9, 2011.
-
Proc. Netw. Distrib. Syst. Security Symp. (NDSS'11)
, pp. 2011
-
-
Cai, L.1
Zeng, K.2
Chen, H.3
Mohapatra, P.4
-
5
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
Jun.
-
R. Mayrohofer and H. Gellersen, "Shake well before use: Intuitive and secure pairing of mobile devices," IEEE Trans. Mobile Comput., vol. 8, no. 6, pp. 792-806, Jun. 2009.
-
(2009)
IEEE Trans. Mobile Comput.
, vol.8
, Issue.6
, pp. 792-806
-
-
Mayrohofer, R.1
Gellersen, H.2
-
6
-
-
79961063540
-
Proximate: Proximity-based secure pairing using ambient wireless signals
-
S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Mandayam, "Proximate: Proximity-based secure pairing using ambient wireless signals," in Proc. 9th Int. Conf. Mobile Syst. Appl. Serv. (MobiSys'11), 2011, pp. 211-224.
-
(2011)
Proc. 9th Int. Conf. Mobile Syst. Appl. Serv. (MobiSys'11)
, pp. 211-224
-
-
Mathur, S.1
Miller, R.2
Varshavsky, A.3
Trappe, W.4
Mandayam, N.5
-
7
-
-
38349004892
-
Amigo: Proximity-based authentication of mobile devices
-
A. Varshavsky, A. Scannell, A. LaMarca, and E. De Lara, "Amigo: proximity-based authentication of mobile devices," in Proc. 9th Int. Conf. Ubiquitous Comput. (UbiComp'07), 2007, pp. 253-270.
-
(2007)
Proc. 9th Int. Conf. Ubiquitous Comput. (UbiComp'07)
, pp. 253-270
-
-
Varshavsky, A.1
Scannell, A.2
Lamarca, A.3
De Lara, E.4
-
8
-
-
77955002645
-
Ensemble: Cooperative proximity-based authentication
-
A. Kalamandeen, A. Scannell, E. de Lara, A. Sheth, and A. LaMarca, "Ensemble: Cooperative proximity-based authentication," in Proc. 8th Int. Conf. Mobile Syst. Appl. Serv. (MobiSys'10), 2010, pp. 331-344.
-
(2010)
Proc. 8th Int. Conf. Mobile Syst. Appl. Serv. (MobiSys'10)
, pp. 331-344
-
-
Kalamandeen, A.1
Scannell, A.2
De Lara, E.3
Sheth, A.4
Lamarca, A.5
-
9
-
-
84860670073
-
BANA: Body area network authentication exploiting channel characteristics
-
L. Shi,M. Li, S. Yu, and J. Yuan, "BANA: Body area network authentication exploiting channel characteristics," in Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw. (WISEC'12), 2012, pp. 27-38.
-
(2012)
Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw. (WISEC'12)
, pp. 27-38
-
-
Shi, L.1
Li, M.2
Yu, S.3
Yuan, J.4
-
10
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
-
Apr.
-
C. Poon, Y.-T. Zhang, and S.-D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Commun. Mag., vol. 44, no. 4, pp. 73-81, Apr. 2006.
-
(2006)
IEEE Commun. Mag.
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.1
Zhang, Y.-T.2
Bao, S.-D.3
-
11
-
-
79960856885
-
Biometric-based two-level secure access control for implantable medical devices during emergencies
-
Apr.
-
X. Hei and X. Du, "Biometric-based two-level secure access control for implantable medical devices during emergencies," in Proc. IEEE INFOCOM, Apr. 2011, pp. 346-350.
-
(2011)
Proc. IEEE INFOCOM
, pp. 346-350
-
-
Hei, X.1
Du, X.2
-
13
-
-
84879516937
-
Ask-ban: Authenticated secret key extraction utilizing channel characteristics for body area networks
-
L. Shi, J. Yuan, S. Yu, and M. Li, "Ask-ban: Authenticated secret key extraction utilizing channel characteristics for body area networks," in Proc. 6th ACM Conf. Security Privacy Wireless Mobile Netw. (WiSec'13), 2013, pp. 155-166.
-
(2013)
Proc. 6th ACM Conf. Security Privacy Wireless Mobile Netw. (WiSec'13)
, pp. 155-166
-
-
Shi, L.1
Yuan, J.2
Yu, S.3
Li, M.4
-
14
-
-
79960873920
-
Imdguard: Securing implantable medical devices with the external wearable guardian
-
Apr.
-
F. Xu, Z. Qin, C. Tan, B. Wang, and Q. Li, "Imdguard: Securing implantable medical devices with the external wearable guardian," in Proc. IEEE INFOCOM, Apr. 2011, pp. 1862-1870.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.3
Wang, B.4
Li, Q.5
-
15
-
-
76849098534
-
PSKA: Usable and secure key agreement scheme for body area networks
-
Jan.
-
K. Venkatasubramanian, A. Banerjee, and S. Gupta, "PSKA: Usable and secure key agreement scheme for body area networks," IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 1, pp. 60-68, Jan. 2010.
-
(2010)
IEEE Trans. Inf. Technol. Biomed.
, vol.14
, Issue.1
, pp. 60-68
-
-
Venkatasubramanian, K.1
Banerjee, A.2
Gupta, S.3
-
16
-
-
77954990804
-
Physiological valuebased efficient usable security solutions for body sensor networks
-
Jul.
-
K. K. Venkatasubramanian and S. K. S. Gupta, "Physiological valuebased efficient usable security solutions for body sensor networks," ACM Trans. Sens. Netw., vol. 6, no. 4, pp. 1-36, Jul. 2010.
-
(2010)
ACM Trans. Sens. Netw.
, vol.6
, Issue.4
, pp. 1-36
-
-
Venkatasubramanian, K.K.1
Gupta, S.K.S.2
-
17
-
-
84939435969
-
Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
Oct.
-
S. Cherukuri, K. Venkatasubramanian, and S. Gupta, "Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," in Proc. Int. Conf. Parallel Process. Workshops, Oct. 2003, pp. 432-439.
-
(2003)
Proc. Int. Conf. Parallel Process. Workshops
, pp. 432-439
-
-
Cherukuri, S.1
Venkatasubramanian, K.2
Gupta, S.3
-
18
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. 14th ACM Int. Conf. Mobile Comput. Netw., 2008, pp. 128-139.
-
(2008)
Proc. 14th ACM Int. Conf. Mobile Comput. Netw.
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
19
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana et al., "On the effectiveness of secret key extraction from wireless signal strength in real environments," in Proc. 15th Annu. Int. Conf. Mobile Comput. Netw. (MobiCom'09), 2009, pp. 321-332.
-
(2009)
Proc. 15th Annu. Int. Conf. Mobile Comput. Netw. (MobiCom'09)
, pp. 321-332
-
-
Jana, S.1
-
20
-
-
84856094320
-
Phy-based cooperative key generation in wireless networks
-
Sep.
-
L. Lai, Y. Liang, and W. Du, "Phy-based cooperative key generation in wireless networks," in Proc. 49th Annu. Allerton Conf. Commun. Control Comput. (Allerton'11), Sep. 2011, pp. 662-669.
-
(2011)
Proc. 49th Annu. Allerton Conf. Commun. Control Comput. (Allerton'11)
, pp. 662-669
-
-
Lai, L.1
Liang, Y.2
Du, W.3
-
21
-
-
84856160802
-
Received signal characteristics of outdoor body-to-body communications channels at 2.45 GHz
-
Nov.
-
S. Cotton, A. McKernan, and W. Scanlon, "Received signal characteristics of outdoor body-to-body communications channels at 2.45 GHz," in Proc. Loughborough Antennas Propag. Conf. (LAPC'11), Nov. 2011, pp. 1-4.
-
(2011)
Proc. Loughborough Antennas Propag. Conf. (LAPC'11)
, pp. 1-4
-
-
Cotton, S.1
McKernan, A.2
Scanlon, W.3
-
22
-
-
79959634698
-
An experimental study on the impact of human body shadowing in off-body communications channels at 2.45 GHz
-
Apr.
-
S. Cotton, A. McKernan, A. Ali, and W. Scanlon, "An experimental study on the impact of human body shadowing in off-body communications channels at 2.45 GHz," in Proc. 5th Eur. Conf. Antennas Propag. (EUCAP'11), Apr. 2011, pp. 3133-3137.
-
(2011)
Proc. 5th Eur. Conf. Antennas Propag. (EUCAP'11)
, pp. 3133-3137
-
-
Cotton, S.1
McKernan, A.2
Ali, A.3
Scanlon, W.4
-
23
-
-
79951723271
-
A survey on wireless body area networks
-
Jan.
-
B. Latré, B. Braem, I.Moerman, C. Blondia, and P. Demeester, "A survey on wireless body area networks," Wirel. Netw., vol. 17, no. 1, Jan. 2011, pp. 1-18.
-
(2011)
Wirel. Netw.
, vol.17
, Issue.1
, pp. 1-18
-
-
Latré, B.1
Braem, B.2
Moerman, I.3
Blondia, C.4
Demeester, P.5
-
24
-
-
84856865292
-
On-body to on-body channel characterization
-
Oct.
-
F. Di Franco et al., "On-body to on-body channel characterization," in Proc. IEEE Sensors, Oct. 2011, pp. 908-911.
-
(2011)
Proc. IEEE Sensors
, pp. 908-911
-
-
Di Franco, F.1
-
25
-
-
79952950550
-
The effect of body shape and gender on wireless body area network on-body channels
-
Oct.
-
F. Di Franco et al., "The effect of body shape and gender on wireless body area network on-body channels," in Proc. IEEE Middle East Conf. Antennas Propag. (MECAP'10), Oct. 2010, pp. 1-3.
-
(2010)
Proc. IEEE Middle East Conf. Antennas Propag. (MECAP'10)
, pp. 1-3
-
-
Di Franco, F.1
-
26
-
-
2542441781
-
Channel model for wireless communication around human body
-
Apr.
-
J. Ryckaert, P. De Doncker, R. Meys, A. de Le Hoye, and S. Donnay, "Channel model for wireless communication around human body," Electron. Lett., vol. 40, no. 9, Apr. 2004, pp. 543-544.
-
(2004)
Electron. Lett.
, vol.40
, Issue.9
, pp. 543-544
-
-
Ryckaert, J.1
De Doncker, P.2
Meys, R.3
-
27
-
-
85027496257
-
Secret-key reconciliation by public discussion
-
T. Helleseth, Ed. New York, NY, USA: Springer
-
G. Brassard and L. Salvail, "Secret-key reconciliation by public discussion," in Advances in Cryptology: EUROCRYPT'93, T. Helleseth, Ed. New York, NY, USA: Springer, 1994, vol. 765.
-
(1994)
Advances in Cryptology: EUROCRYPT'93
, vol.765
-
-
Brassard, G.1
Salvail, L.2
-
28
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
R. Impagliazzo, L. A. Levin, and M. Luby, "Pseudo-random generation from one-way functions," in Proc. 21st Annu. ACM Symp. Theory Comput. (STOC'89), 1989, pp. 12-24.
-
(1989)
Proc. 21st Annu. ACM Symp. Theory Comput. (STOC'89)
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
29
-
-
0025415365
-
The maximum concurrent flow problem
-
Apr.
-
F. Shahrokhi and D. W. Matula, "The maximum concurrent flow problem," J. ACM, vol. 37, no. 2, pp. 318-334, Apr. 1990.
-
(1990)
J. ACM
, vol.37
, Issue.2
, pp. 318-334
-
-
Shahrokhi, F.1
Matula, D.W.2
-
30
-
-
80051886930
-
Short paper: Reactive jamming in wireless networks: How realistic is the threat?
-
[Online]. Available
-
M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders, "Short paper: Reactive jamming in wireless networks: How realistic is the threat?" in Proc. 4th ACMConf.Wireless Netw. Security (WiSec'11), 2011, pp. 47-52 [Online]. Available: http://doi.acm.org/10.1145/1998412.1998422
-
(2011)
Proc. 4th ACMConf.Wireless Netw. Security (WiSec'11)
, pp. 47-52
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
Lenders, V.4
-
31
-
-
84865611232
-
A practical man-In-The-middle attack on signal-based key generation protocols
-
New York, NY, USA: Springer
-
S. Eberz, M. Strohmeier, M. Wilhelm, and I. Martinovic, "A practical man-in-the-middle attack on signal-based key generation protocols," in Computer Security: ESORICS'12. New York, NY, USA: Springer, 2012, vol. 7459.
-
Computer Security: ESORICS'12
, vol.7459
, pp. 2012
-
-
Eberz, S.1
Strohmeier, M.2
Wilhelm, M.3
Martinovic, I.4
-
32
-
-
84887106886
-
Securearray: Improving wifi security with fine-grained physical-layer information
-
[Online]. Available
-
J. Xiong and K. Jamieson, "Securearray: Improving wifi security with fine-grained physical-layer information," in Proc. 19th Annu. Int. Conf. Mobile Comput. Netw. (MobiCom'13), 2013, pp. 441-452 [Online]. Available: http://doi.acm.org/10.1145/2500423.2500444
-
(2013)
Proc. 19th Annu. Int. Conf. Mobile Comput. Netw. (MobiCom'13)
, pp. 441-452
-
-
Xiong, J.1
Jamieson, K.2
-
33
-
-
77953313388
-
Secure wireless communication with dynamic secrets
-
Mar.
-
S. Xiao,W. Gong, and D. Towsley, "Secure wireless communication with dynamic secrets," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Xiaow. Gong, S.1
Towsley, D.2
-
34
-
-
84868542000
-
-
M.S. thesis, Info. Technol., Masaryk Univ., Brno, Czech Republic
-
M. Amiri, "Measurements of energy consumption and execution time of different operations on tmote sky sensor motes," M.S. thesis, Info. Technol., Masaryk Univ., Brno, Czech Republic, 2010.
-
(2010)
Measurements of Energy Consumption and Execution Time of Different Operations on Tmote Sky Sensor Motes
-
-
Amiri, M.1
-
35
-
-
84923264453
-
-
Texas Instruments Incorporated [Online]. Available
-
Texas Instruments Incorporated. "Chipcon AS SmartRF CC2420 preliminary datasheet (rev. C)," 2013 [Online]. Available: http://www.ti.com/lit/ds/symlink/cc2420.pdf
-
(2013)
Chipcon AS SmartRF CC2420 Preliminary Datasheet (Rev. C)
-
-
-
36
-
-
40249107802
-
-
Crossbow Technol. Inc [Online]. Available
-
Crossbow Technol. Inc. "Telos B data sheet" [Online]. Available: http://www.willow.co.uk/TelosB-Datasheet.pdf
-
Telos B Datasheet
-
-
|