-
1
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
Jan.
-
J. Hershey, A. Hassan, and R. Yarlagadda, "Unconventional Cryptographic Keying Variable Management," IEEE Trans. Commun., vol. 43, no. 1, Jan 1995, pp. 3-6.
-
(1995)
IEEE Trans. Commun.
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.1
Hassan, A.2
Yarlagadda, R.3
-
2
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana et al., "On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments," Proc. 15th ACM Annual Int'l. Conf. Mobile Computing and Networking '09, 2009, pp. 321-32.
-
(2009)
Proc. 15th ACM Annual int'L. Conf. Mobile Computing and Networking '09
, pp. 321-332
-
-
Jana, S.1
-
3
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
Jan.
-
N. Patwari et al., "High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements," IEEE Trans. Mobile Computing, vol. 9, no. 1, Jan. 2010, pp. 17-30.
-
(2010)
IEEE Trans. Mobile Computing
, vol.9
, Issue.1
, pp. 17-30
-
-
Patwari, N.1
-
4
-
-
84881015585
-
Adaptive wireless channel probing for shared key generation based on pid controller
-
Sept.
-
Y. Wei, K. Zeng, and P. Mohapatra, "Adaptive Wireless Channel Probing for Shared Key Generation Based on Pid Controller," IEEE Trans. Mobile Computing, vol. 12, no. 9, Sept. 2013, pp. 1842-52.
-
(2013)
IEEE Trans. Mobile Computing
, vol.12
, Issue.9
, pp. 1842-1852
-
-
Wei, Y.1
Zeng, K.2
Mohapatra, P.3
-
5
-
-
84908542982
-
Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices
-
Dec.
-
S. Ali, V. Sivaraman, and D. Ostry, "Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices," IEEE Trans. Mobile Comp., vol. 13, no. 12, Dec. 2014, pp. 2763-76.
-
(2014)
IEEE Trans. Mobile Comp.
, vol.13
, Issue.12
, pp. 2763-2776
-
-
Ali, S.1
Sivaraman, V.2
Ostry, D.3
-
6
-
-
77953297543
-
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
-
K. Zeng et al., "Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks," Proc. IEEE INFOCOM '10, 2010, pp. 1837-45.
-
(2010)
Proc. IEEE INFOCOM '10
, pp. 1837-1845
-
-
Zeng, K.1
-
7
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret Key Agreement by Public Discussion from Common Information," IEEE Trans. Info. Theory, vol. 39, no. 3, May 1993, pp. 733-42.
-
(1993)
IEEE Trans. Info. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
8
-
-
79957837002
-
On passive inference attacks against physical-layer key extraction
-
M. Edman, A. Kiayias, and B. Yener, "On Passive Inference Attacks against Physical-Layer Key Extraction," Proc. 4th Euro. Wksp. System Security, 2011, pp. 8:1-8:6.
-
(2011)
Proc. 4th Euro. Wksp. System Security
, pp. 1-6
-
-
Edman, M.1
Kiayias, A.2
Yener, B.3
-
10
-
-
84867755583
-
Limitations of generating a secret key using wireless fading under active adversary
-
Oct.
-
M. Zafer, D. Agrawal, and M. Srivatsa, "Limitations of Generating a Secret Key Using Wireless Fading under Active Adversary," IEEE/ACM Trans. Networking, vol. 20, no. 5, Oct. 2012, pp. 1440-51.
-
(2012)
IEEE/ACM Trans. Networking
, vol.20
, Issue.5
, pp. 1440-1451
-
-
Zafer, M.1
Agrawal, D.2
Srivatsa, M.3
-
11
-
-
84865611232
-
A practical man-in-The-middle attack on signal-based key generation protocols
-
S. Foresti, M. Yung, and F. Martinelli, Eds., Springer
-
S. Eberz et al., "A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols," Proc. ESORICS, LNCS, S. Foresti, M. Yung, and F. Martinelli, Eds., vol. 7459. Springer, 2012, pp. 235-52.
-
(2012)
Proc. ESORICS, LNCS
, vol.7459
, pp. 235-252
-
-
Eberz, S.1
-
12
-
-
84908510422
-
Group secret key generation via received signal strength: Protocols, achievable rates, and implementation
-
Dec.
-
H. Liu et al., "Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation," IEEE Trans. Mobile Computing, vol. 13, no. 12, Dec. 2014, pp. 2820-35.
-
(2014)
IEEE Trans. Mobile Computing
, vol.13
, Issue.12
, pp. 2820-2835
-
-
Liu, H.1
-
13
-
-
84984908109
-
Practical secret key agreement for full-duplex near field communications
-
R. Jin et al., "Practical Secret Key Agreement for Full-Duplex Near Field Communications," Proc. 9th ACM Symp. Info., Comp. and Commun. Security, 2014, pp. 217-28.
-
(2014)
Proc. 9th ACM Symp. Info., Comp. and Commun. Security
, pp. 217-228
-
-
Jin, R.1
-
14
-
-
84867977516
-
Secrecy via sources and channels
-
Nov.
-
V. M. Prabhakaran, K. Eswaran, and K. Ramchandran, "Secrecy via Sources and Channels," IEEE Trans. Info. Theory, vol. 58, no. 11, Nov. 2012, pp. 6747-65.
-
(2012)
IEEE Trans. Info. Theory
, vol.58
, Issue.11
, pp. 6747-6765
-
-
Prabhakaran, V.M.1
Eswaran, K.2
Ramchandran, K.3
-
15
-
-
76849098534
-
Pska: Usable and secure key agreement scheme for body area networks
-
Jan.
-
K. K. Venkatasubramanian et al., "Pska: Usable and Secure Key Agreement Scheme for Body Area Networks," IEEE Trans. Info. Tech. Biomed., vol. 14, no. 1, Jan. 2010, pp. 60-68.
-
(2010)
IEEE Trans. Info. Tech. Biomed.
, vol.14
, Issue.1
, pp. 60-68
-
-
Venkatasubramanian, K.K.1
|