A New Low-BMR Quantization Method for Wireless Channel Characteristics-based Secret Key Generation
暂无分享,去创建一个
[1] Jie Yang,et al. Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[2] Wade Trappe,et al. ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.
[3] Marco Gruteser,et al. Improving robustness of key extraction from wireless channels with differential techniques , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[4] Claude Castelluccia,et al. An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.
[5] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..
[6] Gregory D. Durgin,et al. Space-Time Wireless Channels , 2002 .
[7] Christof Paar,et al. Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation , 2014 .
[8] Q Wang,et al. A privacy amplification protocol against active attacks in information theoretically secret key agreement , 2015 .
[9] Zhijie Jerry Shi,et al. RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements , 2016, IEEE Communications Magazine.
[10] A. Ambekar,et al. Improving channel reciprocity for effective key management systems , 2012, 2012 International Symposium on Signals, Systems, and Electronics (ISSSE).
[11] Athanasios V. Vasilakos,et al. Survey on channel reciprocity based key establishment techniques for wireless systems , 2015, Wirel. Networks.
[12] Yang Wang,et al. Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.
[13] Christof Paar,et al. Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).
[14] Yi Luo,et al. Analysis of the information theoretically secret key agreement by public discussion , 2015, Secur. Commun. Networks.
[15] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[16] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[17] Kui Ren,et al. Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.
[18] Xiaodai Dong,et al. Verification of Secret Key Generation from UWB Channel Observations , 2009, 2009 IEEE International Conference on Communications.
[19] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[20] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[21] John McEachen,et al. Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[22] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[23] Jingjing Huang,et al. Dynamic secret key generation exploiting Ultra-wideband wireless channel characteristics , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[24] Syed Taha Ali,et al. Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.