Publication | IEEE Transactions on Information Forensics and Security 11:8
On the Security of Key Extraction from Measuring Physical Quantities
Matthew Edman, Aggelos Kiayias, Qiang Tang, Bülent Yener
Matthew Edman writes about the information-theoretic limits of a novel cryptographic method in wireless networks and presents a practical protocol for generating provably secure wireless encryption keys. He coauthored the paper with authors from Cornell University, Rensselaer Polytechnic Institute, and the University of Connecticut.