1. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel;Mathur,2008
2. Securing systems on the internet of things via physical properties of devices and communications;Huth,2015
3. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data;Dodis;SIAM J. Comput.,2008
4. Transforming men into mice (polynomial algorithm for genomic distance problem);Hannenhalli,1995
5. G. Cormode, M.S. Paterson, S.C. Sahinalp, U. Vishkin, Communication complexity of document exchange, 1999.