Authenticated key establishment for low-resource devices exploiting correlated random channels CT Zenger, M Pietersz, J Zimmer, JF Posielek, T Lenze, C Paar Computer Networks 109, 105-123, 2016 | 54 | 2016 |
Security analysis of quantization schemes for channel-based key extraction C Zenger, J Zimmer, C Paar EAI Endorsed Transactions on Security and Safety 2 (6), 267-272, 2015 | 48 | 2015 |
Exploiting the physical environment for securing the internet of things CT Zenger, J Zimmer, M Pietersz, JF Posielek, C Paar Proceedings of the 2015 New Security Paradigms Workshop, 44-58, 2015 | 39 | 2015 |
The passive eavesdropper affects my channel: Secret-key rates under real-world conditions C Zenger, H Vogt, J Zimmer, A Sezgin, C Paar 2016 IEEE Globecom Workshops (GC Wkshps), 1-6, 2016 | 37 | 2016 |
On-line entropy estimation for secure information reconciliation C Zenger, J Zimmer, JF Posielek, C Paar proceedings of the 12th EAI International Conference on Mobile and …, 2015 | 10 | 2015 |
Constructive and destructive aspects of adaptive wormholes for the 5g tactile internet CT Zenger, J Zimmer, M Pietersz, B Driessen, C Paar Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 9 | 2016 |
The Passive Eavesdropper Affects my Channel: Secret-Key Rates under Real-World Conditions (Extended Version) C Zenger, H Vogt, J Zimmer, A Sezgin, C Paar arXiv preprint arXiv:1701.03904, 2017 | | 2017 |