ComPass: Proximity Aware Common Passphrase Agreement Protocol for Wi-Fi devices Using Physical Layer Security
暂无分享,去创建一个
Gerhard Wunder | Khan Reaz | G. Wunder | Khan Reaz | K. Reaz
[1] Xiang-Yang Li,et al. Instant and Robust Authentication and Key Agreement among Mobile Devices , 2016, CCS.
[2] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[3] Mingyan Liu,et al. PhaseU: Real-time LOS identification with WiFi , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[4] Gerhard Wunder,et al. A Novel Key Generating Architecture for Wireless Low-Resource Devices , 2014, 2014 International Workshop on Secure Internet of Things.
[5] Kui Ren,et al. Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.
[6]
Shan Chang,et al.
[7] David Wetherall,et al. Tool release: gathering 802.11n traces with channel state information , 2011, CCRV.
[8] Robert T. Chien,et al. Cyclic decoding procedures for Bose- Chaudhuri-Hocquenghem codes , 1964, IEEE Trans. Inf. Theory.
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Tony Q. S. Quek,et al. Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology , 2019, IEEE Transactions on Information Forensics and Security.
[11] Bhaskar Biswas,et al. Efficient Root Finding of Polynomials over Fields of Characteristic 2. , 2009 .
[12] Christof Paar,et al. Security Analysis of Quantization Schemes for Channel-based Key Extraction , 2015, EAI Endorsed Trans. Security Safety.
[13] Matthias Hollick,et al. Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets , 2019, WiNTECH.
[14] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[15] Jonathan Kilgallin,et al. Factoring RSA Keys in the IoT Era , 2019, 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
[16] Swarun Kumar,et al. Decimeter-Level Localization with a Single WiFi Access Point , 2016, NSDI.
[17] Dwijendra K. Ray-Chaudhuri,et al. Binary mixture flow with free energy lattice Boltzmann methods , 2022, arXiv.org.
[18] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[19] Gerhard Wunder,et al. On time-variant distortions in multicarrier transmission with application to frequency offsets and phase noise , 2005, IEEE Transactions on Communications.
[20] Daniel Lowe Wheeler. zxcvbn: Low-Budget Password Strength Estimation , 2016, USENIX Security Symposium.
[21] Sachin Katti,et al. SpotFi: Decimeter Level Localization Using WiFi , 2015, SIGCOMM.
[22] Frank Piessens,et al. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.
[23] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[24] Tero Kivinen,et al. More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE) , 2003, RFC.
[25] Mo Li,et al. Precise Power Delay Profiling with Commodity Wi-Fi , 2015, IEEE Transactions on Mobile Computing.
[26] Dan Harkins,et al. Opportunistic Wireless Encryption , 2017, RFC.