-
1
-
-
84912127678
-
Vehicular ad hoc networks (VANETs): Current state, challenges, potentials and way forward
-
E. C. Eze, S. Zhang, and E. Liu, "Vehicular ad hoc networks (VANETs): Current state, challenges, potentials and way forward", in Automation and Computing (ICAC), 2014 20th International Conference on, 2014, pp. 176-181.
-
(2014)
Automation and Computing (ICAC), 2014 20th International Conference On
, pp. 176-181
-
-
Eze, E.C.1
Zhang, S.2
Liu, E.3
-
2
-
-
84893556917
-
Vanet: Security attacks and its possible solutions
-
A. Rawat, S. Sharma, and R. Sushil, "Vanet: Security attacks and its possible solutions", Journal of Information and Operations Management, vol. 3, pp. 301-304, 2012.
-
(2012)
Journal of Information and Operations Management
, vol.3
, pp. 301-304
-
-
Rawat, A.1
Sharma, S.2
Sushil, R.3
-
4
-
-
46749151065
-
A mechanism to enforce privacy in vehicleto-infrastructure communication
-
P. Cencioni and R. Di Pietro, "A mechanism to enforce privacy in vehicleto-infrastructure communication", Computer communications, vol. 31, pp. 2790-2802, 2008.
-
(2008)
Computer Communications
, vol.31
, pp. 2790-2802
-
-
Cencioni, P.1
Di Pietro, R.2
-
5
-
-
46749099829
-
Providing VANET security through active position detection
-
G. Yan, S. Olariu, and M. C. Weigle, "Providing VANET security through active position detection", Computer Communications, vol. 31, pp. 2883-2897, 2008.
-
(2008)
Computer Communications
, vol.31
, pp. 2883-2897
-
-
Yan, G.1
Olariu, S.2
Weigle, M.C.3
-
6
-
-
33746097415
-
Privacy issues in vehicular ad hoc networks
-
F. Dötzer, "Privacy issues in vehicular ad hoc networks", in Privacy enhancing technologies, 2006, pp. 197-209.
-
(2006)
Privacy Enhancing Technologies
, pp. 197-209
-
-
Dötzer, F.1
-
7
-
-
47949086407
-
An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks
-
J. Sun, C. Zhang, and Y. Fang, "An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks", in Military Communications Conference, 2007. MILCOM 2007. IEEE, 2007, pp. 1-7.
-
(2007)
Military Communications Conference, 2007. MILCOM 2007. IEEE
, pp. 1-7
-
-
Sun, J.1
Zhang, C.2
Fang, Y.3
-
8
-
-
0026626314
-
Experimental quantum cryptography
-
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental quantum cryptography", Journal of cryptology, vol. 5, pp. 3-28, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
10
-
-
84907192932
-
Efficient high-rate secret key extraction in wireless sensor networks using collaboration
-
S. N. Premnath, J. Croft, N. Patwari, and S. K. Kasera, "Efficient High-Rate Secret Key Extraction in Wireless Sensor Networks Using Collaboration", ACM Transactions on Sensor Networks (TOSN), vol. 11, p. 2, 2014.
-
(2014)
ACM Transactions on Sensor Networks (TOSN)
, vol.11
, pp. 2
-
-
Premnath, S.N.1
Croft, J.2
Patwari, N.3
Kasera, S.K.4
-
11
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks", in Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 401-410.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
12
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: extracting a secret key from an unauthenticated wireless channel", in Proceedings of the 14th ACM international conference on Mobile computing and networking, 2008, pp. 128-139.
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
13
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments", in Proceedings of the 15th annual international conference on Mobile computing and networking, 2009, pp. 321-332.
-
(2009)
Proceedings of the 15th Annual International Conference on Mobile Computing and Networking
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
14
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels", Antennas and Propagation, IEEE Transactions on, vol. 53, pp. 3776-3784, 2005.
-
(2005)
Antennas and Propagation, IEEE Transactions On
, vol.53
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
16
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
R. Impagliazzo, L. A. Levin, and M. Luby, "Pseudo-random generation from one-way functions", in Proceedings of the twenty-first annual ACM symposium on Theory of computing, 1989, pp. 12-24.
-
(1989)
Proceedings of the Twenty-first Annual ACM Symposium on Theory of Computing
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
18
-
-
84890391191
-
Secure information transmission for mobile radio
-
H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio", in Information Theory, 1998. Proceedings. 1998 IEEE International Symposium on, 1998, p. 381.
-
(1998)
Information Theory, 1998. Proceedings. 1998 IEEE International Symposium On
, pp. 381
-
-
Koorapaty, H.1
Hassan, A.2
Chennakeshu, S.3
-
20
-
-
51449114762
-
Secure wireless communications: Secret keys through multipath
-
A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath", in Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on, 2008, pp. 3013-3016.
-
(2008)
Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference On
, pp. 3013-3016
-
-
Sayeed, A.1
Perrig, A.2
-
22
-
-
45249104850
-
Wireless information-theoretic security
-
M. Bloch, J. Barros, M. R. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security", Information Theory, IEEE Transactions on, vol. 54, pp. 2515-2534, 2008.
-
(2008)
Information Theory, IEEE Transactions On
, vol.54
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.3
McLaughlin, S.W.4
-
23
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam, "Information-theoretically secret key generation for fading wireless channels", Information Forensics and Security, IEEE Transactions on, vol. 5, pp. 240-254, 2010.
-
(2010)
Information Forensics and Security, IEEE Transactions On
, vol.5
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.B.6
-
24
-
-
77955038275
-
Reliability-based sliced error correction in secret key agreement from fading channel
-
T. Shimizu, H. Iwai, and H. Sasaoka, "Reliability-based sliced error correction in secret key agreement from fading channel", in Wireless Communications and Networking Conference (WCNC), 2010 IEEE, 2010, pp. 1-6.
-
(2010)
Wireless Communications and Networking Conference (WCNC), 2010 IEEE
, pp. 1-6
-
-
Shimizu, T.1
Iwai, H.2
Sasaoka, H.3
-
25
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
N. Patwari, J. Croft, S. Jana, and S. K. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements", Mobile Computing, IEEE Transactions on, vol. 9, pp. 17-30, 2010.
-
(2010)
Mobile Computing, IEEE Transactions On
, vol.9
, pp. 17-30
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, S.K.4
-
26
-
-
0024056708
-
Image coding using vector quantization: A review
-
N. M. Nasrabadi and R. A. King, "Image coding using vector quantization: A review", Communications, IEEE Transactions on, vol. 36, pp. 957-971, 1988.
-
(1988)
Communications, IEEE Transactions On
, vol.36
, pp. 957-971
-
-
Nasrabadi, N.M.1
King, R.A.2
-
27
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures", in Proceedings of the 14th ACM international conference on Mobile computing and networking, 2008, pp. 116-127.
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
29
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data", in Advances in cryptology-Eurocrypt 2004, 2004, pp. 523-540.
-
(2004)
Advances in Cryptology-eurocrypt 2004
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
30
-
-
47749083946
-
IEEE 802.11 p: Towards an international standard for wireless access in vehicular environments
-
D. Jiang and L. Delgrossi, "IEEE 802.11 p: Towards an international standard for wireless access in vehicular environments", in Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE, 2008, pp. 2036-2040.
-
(2008)
Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE
, pp. 2036-2040
-
-
Jiang, D.1
Delgrossi, L.2
|