暂无分享,去创建一个
[1] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[2] Thomas Vidick,et al. Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.
[3] Yi Hong,et al. Unshared Secret Key Cryptography , 2014, IEEE Transactions on Wireless Communications.
[4] Yevgeniy Dodis,et al. Privacy Amplification and Non-malleable Extractors via Character Sums , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[5] Eric Miles,et al. Amplifying Privacy in Privacy Amplification , 2014, IACR Cryptol. ePrint Arch..
[6] Yi Mu,et al. Anonymous and Updatable Identity-Based Hash Proof System , 2019, IEEE Systems Journal.
[7] Sherali Zeadally,et al. Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions , 2019, IEEE Internet of Things Journal.
[8] Moni Naor,et al. Public-Key Cryptosystems Resilient to Key Leakage , 2012, SIAM J. Comput..
[9] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[10] Yevgeniy Dodis,et al. Cryptography against Continuous Memory Attacks , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[11] Eyal Kushilevitz,et al. Exposure-Resilient Functions and All-or-Nothing Transforms , 2000, EUROCRYPT.
[12] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[13] Xiaodong Lin,et al. Toward Edge-Assisted Internet of Things: From Security and Efficiency Perspectives , 2019, IEEE Network.
[14] Sen-Shan Huang,et al. An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage , 2019, IEEE Systems Journal.
[15] Ning Wang,et al. Physical Layer Key Generation in 5G Wireless Networks , 2019, IEEE Wireless Communications.