Practical provably secure key sharing for near field communication devices
暂无分享,去创建一个
[1] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[2] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[3] Henning Siitonen Kortvedt. Securing Near Field Communication , 2009 .
[4] Moustafa Youssef,et al. Practical Provably Secure Communication for Half-Duplex Radios , 2011, 2011 IEEE International Conference on Communications (ICC).
[5] Claude Castelluccia,et al. Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags , 2006, CARDIS.
[6] Gerhard P. Hancke,et al. Eavesdropping Attacks on High-Frequency RFID Tokens , 2008 .
[7] Moustafa Youssef,et al. Randomization for Security in Half-Duplex Two-Way Gaussian Channels , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[8] Ernst Haselsteiner. Security in Near Field Communication ( NFC ) Strengths and Weaknesses , 2006 .
[9] Collin Mulliner,et al. Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones , 2009, 2009 International Conference on Availability, Reliability and Security.
[10] Moustafa Youssef,et al. Keys Through ARQ: Theory and Practice , 2011, IEEE Transactions on Information Forensics and Security.
[11] Moustafa Youssef,et al. On the delay limited secrecy capacity of fading channels , 2009, 2009 IEEE International Symposium on Information Theory.
[12] Moustafa Youssef,et al. ARQ security in Wi-Fi and RFID networks , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).