Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation
暂无分享,去创建一个
Junqing Zhang | Bin Xiao | Aiqun Hu | Guyue Li | Bin Xiao | Junqing Zhang | A. Hu | Guyue Li
[1] Eduard A. Jorswieck,et al. Secret key generation from reciprocal spatially correlated MIMO channels , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[2] A. Kraskov,et al. Estimating mutual information. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[3] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels III: Privacy amplification , 2003, IEEE Trans. Inf. Theory.
[4] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[5] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[6] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[7] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[8] Stephan Ludwig,et al. Secret key generation from static channels with untrusted relays , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[9] Xudong Wang,et al. Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.
[10] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[11] Panlong Yang,et al. SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference , 2013, IEEE Transactions on Information Forensics and Security.
[12] Chen Sun,et al. The Optimal Preprocessing Approach for Secret Key Generation from OFDM Channel Measurements , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[13] Xue Liu,et al. Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[14] Chen Da-jian. On the Security of Fast Secret Key Generation Protocol with Virtual Channel Approach , 2015 .
[15] Alex Reznik,et al. Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.
[16] Stephen W. Neville,et al. Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation , 2012, IEEE Transactions on Information Forensics and Security.