Experimental study of performance and security constraints on wireless key distribution using random phase of multipath radio signal
暂无分享,去创建一个
[1] Prasant Mohapatra,et al. Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller , 2013, IEEE Transactions on Mobile Computing.
[2] Xiaodai Dong,et al. Verification of Secret Key Generation from UWB Channel Observations , 2009, 2009 IEEE International Conference on Communications.
[3] Guillermo Morales-Luna,et al. Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna , 2011, ArXiv.
[4] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.
[5] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[6] Dieter Hogrefe,et al. Intelligent mechanisms for key generation from multipath wireless channels , 2011, 2011 Wireless Telecommunications Symposium (WTS).
[7] David Tse,et al. Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .
[8] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[9] Wayne E. Stark,et al. Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..
[10] Marco Gruteser,et al. Improving robustness of key extraction from wireless channels with differential techniques , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[11] Ueli Maurer,et al. Protocols for Secret Key Agreement by Public Discussion Based on Common Information , 1992, CRYPTO.
[12] Claude Castelluccia,et al. An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.
[13] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[14] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[15] A. I. Sulimov,et al. Experimental verification of possibility of secret encryption keys distribution with a phase method in a multipath environment , 2013, 2013 International Siberian Conference on Control and Communications (SIBCON).
[16] Ivan Martinovic,et al. Secret keys from entangled sensor motes: implementation and analysis , 2010, WiSec '10.