BUILDING INFORMATION-THEORETIC CONFIDENTIALITY AND TRAFFIC PRIVACY INTO WIRELESS NETWORKS
暂无分享,去创建一个
[1] Dogan Kesdogan,et al. Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System , 1998, Information Hiding.
[2] Marco Gruteser,et al. USENIX Association , 1992 .
[3] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[4] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[5] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[6] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[7] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[8] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels II: the simulatability condition , 2003, IEEE Trans. Inf. Theory.
[9] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.
[10] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[11] George Danezis,et al. The Traffic Analysis of Continuous-Time Mixes , 2004, Privacy Enhancing Technologies.
[12] Charles V. Wright,et al. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[13] V.F. Kleist,et al. The code book: the science of secrecy from ancient egypt to quantum cryptography [Book Review] , 2002, IEEE Annals of the History of Computing.
[14] K. J. Ray Liu,et al. Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes , 2007, IEEE Transactions on Information Forensics and Security.
[15] Erik Tews,et al. Practical attacks against WEP and WPA , 2009, WiSec '09.
[16] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[17] Desmond Loh Chin Choong,et al. Identifying unique devices through wireless fingerprinting , 2008, WiSec '08.
[18] René Mayrhofer,et al. Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.
[19] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[20] Wenyuan Xu,et al. Temporal Privacy in Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[21] Suhas Mathur,et al. COALITIONAL GAMES IN COOPERATIVE NETWORKS , 2007 .
[22] Havish Koorapaty,et al. Secure information transmission for mobile radio , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[23] Charles H. Bennett,et al. WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing , 2011 .
[24] Brian W. Kernighan,et al. WISE design of indoor wireless systems: practical computation and optimization , 1995 .
[25] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[26] David Tse,et al. Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .
[27] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[28] C. G. Peterson,et al. Fast, efficient error reconciliation for quantum cryptography , 2002, quant-ph/0203096.
[29] Robert G. Gallager,et al. Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.
[30] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[31] Eyal de Lara,et al. Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.
[32] Cheng-Shang Chang,et al. Rate distortion functions and effective bandwidth of queueing processes , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.
[33] Wayne E. Stark,et al. Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..
[34] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[35] Ivan Seskar,et al. Towards large-scale mobile network emulation through spatial switching on a wireless grid , 2005, E-WIND '05.
[36] David D. Jensen,et al. Privacy Vulnerabilities in Encrypted HTTP Streams , 2005, Privacy Enhancing Technologies.
[37] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[38] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[39] Bart Preneel,et al. Taxonomy of Mixes and Dummy Traffic , 2004, International Information Security Workshops.
[40] Byung-Jae Kwak,et al. LDPC codes for physical layer security , 2009, GLOBECOM 2009.
[41] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[42] Ueli Maurer,et al. A universal statistical test for random bit generators , 1990, Journal of Cryptology.
[43] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[44] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[45] Mario Huemer,et al. Key Generation Based on Acceleration Data of Shaking Processes , 2007, UbiComp.
[46] Sanjeev R. Kulkarni,et al. A Nearest-Neighbor Approach to Estimating Divergence between Continuous Random Vectors , 2006, 2006 IEEE International Symposium on Information Theory.
[47] Ueli Maurer,et al. Linking information reconciliation and privacy amplification , 1997, Journal of Cryptology.
[48] Marco Gruteser,et al. ParkNet: drive-by sensing of road-side parking statistics , 2010, MobiSys '10.
[49] Adrian Perrig,et al. Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes , 2007, SenSys '07.
[50] Rui Menezes,et al. Mutual information: a measure of dependency for nonlinear time series , 2004 .
[51] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[52] Jean Cardinal,et al. Construction of a shared secret key using continuous variables , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[53] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[54] Alex Reznik,et al. Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.
[55] Mark Handley,et al. The final nail in WEP's coffin , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[56] Jean Cardinal,et al. Reconciliation of a quantum-distributed Gaussian key , 2001, IEEE Transactions on Information Theory.
[57] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[58] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[59] C. D. Litton,et al. A First Course in Bulk Queues , 1983 .
[60] Lang Tong,et al. Single-user channel estimation and equalization , 2000, IEEE Signal Process. Mag..
[61] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[62] 마리안 루돌프,et al. Method and system for deriving an encryption key using joint randomness not shared by others , 2006 .
[63] Sergio Verdú,et al. Bits through queues , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[64] M. L. Chaudhry,et al. A first course in bulk queues , 1983 .
[65] Srinivasan Seshan,et al. 802.11 user fingerprinting , 2007, MobiCom '07.
[66] Narayan B. Mandayam,et al. Coalitional Games in Gaussian Interference Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[67] Charles V. Wright,et al. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? , 2007, USENIX Security Symposium.
[68] Robert B. Ash,et al. Information Theory , 2020, The SAGE International Encyclopedia of Mass Media and Society.
[69] G. S. Vernam,et al. Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.
[70] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[71] W. C. Jakes,et al. Microwave Mobile Communications , 1974 .
[72] Gilles Van Assche,et al. Quantum cryptography and secret-key distillation , 2006 .
[73] Tadayoshi Kohno,et al. Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing , 2007, USENIX Security Symposium.
[74] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[75] Eyal de Lara,et al. Proximity-based authentication of mobile devices , 2009, Int. J. Secur. Networks.
[76] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.