Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
暂无分享,去创建一个
Srdjan Capkun | Christina Pöpper | Mario Cagalj | Mario Strasser | Srdjan Capkun | C. Pöpper | M. Cagalj | M. Strasser
[1] Adrian Perrig,et al. Distillation Codes and Applications to DoS Resistant Multicast Authentication , 2004, NDSS.
[2] Elaine B. Barker,et al. SP 800-57. Recommendation for Key Management, Part 1: General (revised) , 2007 .
[3] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..
[4] David L Adamy,et al. Ew 101: A First Course in Electronic Warfare , 2001 .
[5] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[6] Srdjan Capkun,et al. Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .
[7] Guevara Noubir,et al. On link layer denial of service in data wireless LANs: Research Articles , 2005 .
[8] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[9] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[10] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[11] Luigi Rizzo,et al. Effective erasure codes for reliable computer communication protocols , 1997, CCRV.
[12] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[13] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[14] Christian Gehrmann,et al. Manual authentication for wireless devices , 2004 .
[15] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[16] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[17] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[18] Elaine B. Barker,et al. Recommendation for key management: , 2019 .
[19] Ghassan O. Karame,et al. Integrity Regions: Authentication through Presence in Wireless Networks , 2006, IEEE Transactions on Mobile Computing.
[20] Michael Luby,et al. LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[21] Wenyuan Xu,et al. Channel surfing: defending wireless sensor networks from jamming and interference , 2006, SenSys '06.
[22] Michael Sirivianos,et al. Loud and Clear: Human-Verifiable Authentication Based on Audio , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[23] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[24] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.