Secret Key Generation Via Localization and Mobility
暂无分享,去创建一个
[1] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[2] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[3] Jie Wu,et al. A Survey on Secure Localization in Wireless Sensor Networks , 2007 .
[4] Imre Csiszár,et al. Secrecy Capacities for Multiterminal Channel Models , 2005, IEEE Transactions on Information Theory.
[5] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[6] G.B. Giannakis,et al. Localization via ultra-wideband radios: a look at positioning aspects for future sensor networks , 2005, IEEE Signal Processing Magazine.
[7] Suman Banerjee,et al. MobiCom poster: secure spaces: location-based secure wireless group communication , 2003, MOCO.
[8] Masayuki Murata,et al. Indoor Localization System using RSSI Measurement of Wireless Sensor Network based on ZigBee Standard , 2006, Wireless and Optical Communications.
[9] Rafail Ostrovsky,et al. Position-Based Cryptography , 2014, SIAM J. Comput..
[10] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[11] Moe Z. Win,et al. Fundamental Limits of Wideband Localization— Part II: Cooperative Networks , 2010, IEEE Transactions on Information Theory.
[12] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[13] Wade Trappe,et al. ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.
[14] Matthieu R. Bloch,et al. Secrecy from Resolvability , 2011, ArXiv.
[15] F. Seco,et al. Ultrasonic Localization Methods for Accurate Positioning , 2005 .
[16] Lawrence R. Rabiner,et al. A tutorial on Hidden Markov Models , 1986 .
[17] Sergio Verdú,et al. A general formula for channel capacity , 1994, IEEE Trans. Inf. Theory.
[18] Tor Helleseth,et al. Workshop on the theory and application of cryptographic techniques on Advances in cryptology , 1994 .
[19] Alexandre J. Pierrot,et al. Practical Limitations of Secret-Key Generation in Narrowband Wireless Environments , 2013, ArXiv.
[20] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[21] Werner Schindler,et al. Random Number Generators for Cryptographic Applications , 2009, Cryptographic Engineering.
[22] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[23] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[24] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[25] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[26] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[27] Radha Poovendran,et al. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks , 2006, Advances in Information Security.
[28] Ueli Maurer,et al. Secret key agreement by public discussion , 1993 .
[29] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[30] Imre Csiszár,et al. Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.
[31] Matthieu R. Bloch,et al. Strong Secrecy From Channel Resolvability , 2011, IEEE Transactions on Information Theory.
[32] Sneha Kumar Kasera,et al. Mobility Assisted Secret Key Generation Using Wireless Link Signatures , 2010, 2010 Proceedings IEEE INFOCOM.
[33] Adewale Abe. Outdoor Localization System Using RSSI Measurement of Wireless Sensor Network , 2013 .
[34] Can Emre Koksal,et al. Secret key generation from mobility , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[35] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result , 2003, IEEE Trans. Inf. Theory.
[36] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[37] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[38] Moe Z. Win,et al. Fundamental Limits of Wideband Localization— Part I: A General Framework , 2010, IEEE Transactions on Information Theory.
[39] Rafail Ostrovsky,et al. Position-Based Quantum Cryptography: Impossibility and Constructions , 2011, IACR Cryptol. ePrint Arch..
[40] Tomonari Furukawa,et al. Infrared Localisation for Indoor UAVs , 2005 .
[41] Moe Z. Win,et al. Position Error Bound for UWB Localization in Dense Cluttered Environments , 2006, 2006 IEEE International Conference on Communications.
[42] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[43] Borivoje Furht. Encyclopedia of Wireless and Mobile Communications , 2008 .
[44] Ueli Maurer,et al. Unconditionally Secure Key Agreement and the Intrinsic Conditional Information , 1999, IEEE Trans. Inf. Theory.
[45] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.