Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
暂无分享,去创建一个
Hai Su | Kwangjo Kim | Kui Ren | Qian Wang | Kwangjo Kim | K. Ren | Qian Wang | Hai Su
[1] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[2] H. Vincent Poor,et al. Time-Slotted Round-Trip Carrier Synchronization for Distributed Beamforming , 2008, IEEE Transactions on Signal Processing.
[3] Robert Boorstyn,et al. Single tone parameter estimation from discrete-time observations , 1974, IEEE Trans. Inf. Theory.
[4] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[5] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[6] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[7] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[8] A. Field. Communications , 1963, The Journal of Asian Studies.
[9] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[10] Fredrik Athley,et al. Threshold region performance of maximum likelihood direction of arrival estimators , 2005, IEEE Transactions on Signal Processing.
[11] Kristine L. Bell,et al. Threshold Region Performance of Maximum Likelihood Direction of Arrival Estimators , 2007 .
[12] Leonid Reyzin,et al. Key Agreement from Close Secrets over Unsecured Channels , 2009, IACR Cryptol. ePrint Arch..
[13] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.