Secret Key Extraction from Wireless Signal Strength in Real Environments
暂无分享,去创建一个
Sneha Kumar Kasera | Srikanth V. Krishnamurthy | Suman Jana | Neal Patwari | Jessica Croft | Sriram Nandha Premnath | Mike Clark | Prarthana Lakshmane Gowda
[1] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[2] Stephen W. Neville,et al. Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).
[3] Ueli Maurer,et al. Unconditionally Secure Key Agreement and the Intrinsic Conditional Information , 1999, IEEE Trans. Inf. Theory.
[4] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[5] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[6] Gregory D. Durgin,et al. Space-Time Wireless Channels , 2002 .
[7] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[8] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[9] Alex Reznik,et al. On the Secrecy Capabilities of ITU Channels , 2007, 2007 IEEE 66th Vehicular Technology Conference.
[10] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[11] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[12] John McEachen,et al. Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[13] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[14] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.
[15] Michael A. Jensen,et al. Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits , 2009, 2009 3rd European Conference on Antennas and Propagation.
[16] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[17] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[18] Ueli Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[19] Wayne E. Stark,et al. Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..
[20] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[21] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[22] Alex Reznik,et al. Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.
[23] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[24] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[25] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[26] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2008, IEEE Transactions on Mobile Computing.
[27] Neal Patwari,et al. Radio Tomographic Imaging with Wireless Networks , 2010, IEEE Transactions on Mobile Computing.