Towards wireless security without computational assumptions — An oblivious transfer protocol based on an unauthenticated wireless channel | IEEE Conference Publication | IEEE Xplore