Tradeoffs between jamming resilience and communication efficiency in key establishment
暂无分享,去创建一个
[1] Radha Poovendran,et al. A coding-theoretic approach for efficient message verification over insecure channels , 2009, WiSec '09.
[2] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[3] H. Vincent Poor,et al. An energy-efficient approach to power control and receiver design in wireless data networks , 2005, IEEE Transactions on Communications.
[4] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[5] Adrian Perrig,et al. Distillation Codes and Applications to DoS Resistant Multicast Authentication , 2004, NDSS.
[6] Kai-Bor Yu,et al. Adaptive beamforming for wideband jamming cancellation , 1997, Proceedings of the 1997 IEEE National Radar Conference.
[7] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[8] Lan Nguyen,et al. Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.
[9] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[10] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[11] Birgit Pfitzmann,et al. Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.
[12] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[13] László Czap,et al. Securing coding based distributed storage in wireless sensor networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[14] Michael Luby,et al. A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.
[15] Rakesh Kumar,et al. Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[16] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[17] Josh Benaloh,et al. One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.
[18] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1999, TNET.
[19] Ron M. Roth,et al. Introduction to Coding Theory , 2019, Discrete Mathematics.
[20] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..