-
2
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer. Generalized Privacy Amplification. IEEE Transaction on Information Theory, 41 (6): 1915-1923, 1995.
-
(1995)
IEEE Transaction on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.M.4
-
5
-
-
70450242725
-
On the effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments
-
S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy. On the effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments. In Proc. ACM MobiCom, 2009.
-
(2009)
Proc. ACM MobiCom
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
6
-
-
85032386844
-
SeAK: Secure authentication and key generation protocol based on dual antennas for wireless body area networks
-
C. Javali, G. Revadigar, L. Libman, and S. Jha. SeAK: Secure Authentication and Key Generation Protocol based on Dual Antennas for Wireless Body Area Networks. In Proc. RFIDsec, 2014.
-
(2014)
Proc. RFIDsec
-
-
Javali, C.1
Revadigar, G.2
Libman, L.3
Jha, S.4
-
7
-
-
84865493080
-
Cooperative key generation in wireless networks
-
L. Lai, Y. Liang, and W. Du. Cooperative Key Generation in Wireless Networks. IEEE Journal on Selected Areas in Communications, 30 (8): 1578-1588, 2012.
-
(2012)
IEEE Journal on Selected Areas in Communications
, vol.30
, Issue.8
, pp. 1578-1588
-
-
Lai, L.1
Liang, Y.2
Du, W.3
-
8
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. In Proc. ACM MobiCom, 2008.
-
(2008)
Proc. ACM MobiCom
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
10
-
-
85119546954
-
IARC: Secret key generation for resource constrained devices by inducing artificial randomness in the channel
-
G. Revadigar, C. Javali, H. Asghar, K. Rasmussen, and S. Jha. iARC: Secret Key Generation for Resource Constrained Devices by Inducing artificial Randomness in the Channel. In Proc. ASIACCS, 2014.
-
(2014)
Proc. ASIACCS
-
-
Revadigar, G.1
Javali, C.2
Asghar, H.3
Rasmussen, K.4
Jha, S.5
-
11
-
-
85052167029
-
Mobility independent secret key generation for wearable health-care devices
-
G. Revadigar, C. Javali, H. Asghar, K. Rasmussen, and S. Jha. Mobility Independent Secret Key Generation for Wearable Health-care Devices. In Proc. BodyNets, 2015.
-
(2015)
Proc. BodyNets
-
-
Revadigar, G.1
Javali, C.2
Asghar, H.3
Rasmussen, K.4
Jha, S.5
-
12
-
-
84971312091
-
-
Technical Report UNSW-CSE-TR-201506 UNSW Australia
-
G. Revadigar, C. Javali, H. Asghar, K. Rasmussen, and S. Jha. Secret Key Generation for Body-worn Devices by Inducing artificial Randomness in the Channel. Technical Report UNSW-CSE-TR-201506, UNSW Australia, 2015.
-
(2015)
Secret Key Generation for Body-worn Devices by Inducing Artificial Randomness in the Channel
-
-
Revadigar, G.1
Javali, C.2
Asghar, H.3
Rasmussen, K.4
Jha, S.5
-
13
-
-
84973882688
-
DLINK: Dual link based radio frequency fingerprinting for wearable devices
-
G. Revadigar, C. Javali, W. Hu, and S. Jha. DLINK: Dual Link Based Radio Frequency Fingerprinting for Wearable Devices. In Proc. IEEE LCN, 2015.
-
(2015)
Proc. IEEE LCN
-
-
Revadigar, G.1
Javali, C.2
Hu, W.3
Jha, S.4
-
14
-
-
80051749392
-
Physical-layer secret key agreement in two-way wireless relaying systems
-
T. Shimizu, H. Iwai, and H. Sasaoka. Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems. IEEE Trans. Information Forensics and Security, 6 (3): 650-660, 2011.
-
(2011)
IEEE Trans. Information Forensics and Security
, vol.6
, Issue.3
, pp. 650-660
-
-
Shimizu, T.1
Iwai, H.2
Sasaoka, H.3
|