Information security for sensors by overwhelming random sequences and permutations
暂无分享,去创建一个
Paul G. Spirakis | Shlomi Dolev | Giuseppe Persiano | Marina Kopeetsky | Niv Gilboa | G. Persiano | S. Dolev | P. Spirakis | M. Kopeetsky | N. Gilboa
[1] Ueli Maurer,et al. Tight security proofs for the bounded-storage model , 2002, STOC '02.
[2] Moni Naor,et al. On Everlasting Security in the Hybrid Bounded Storage Model , 2006, ICALP.
[3] Ueli Maurer,et al. Unconditional Security Against Memory-Bounded Adversaries , 1997, CRYPTO.
[4] Adi Shamir,et al. RFID Authentication Efficient Proactive Information Security within Computational Security , 2009, Theory of Computing Systems.
[5] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[6] Yonatan Aumann,et al. Everlasting security in the bounded storage model , 2002, IEEE Trans. Inf. Theory.
[7] Michael O. Rabin,et al. Hyper-Encryption and Everlasting Security , 2002, STACS.
[8] David Zuckerman. Randomness-optimal oblivious sampling , 1997, Random Struct. Algorithms.
[9] 조위덕. Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.
[10] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[11] Chi-Jen Lu. Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors , 2003, Journal of Cryptology.
[12] Ueli Maurer,et al. On Generating the Initial Key in the Bounded-Storage Model , 2004, EUROCRYPT.
[13] Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher , 2004, Journal of Cryptology.
[14] Salil P. Vadhan,et al. Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model , 2003, Journal of Cryptology.