Group-Based Cooperation on Symmetric Key Generation for Wireless Body Area Networks
暂无分享,去创建一个
[1] Ming Li,et al. BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2012, IEEE Journal on Selected Areas in Communications.
[2] Wenliang Du,et al. Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.
[3] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[4] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[5] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[6] Wenjia Li,et al. BAN-trust: An attack-resilient malicious node detection scheme for body area networks , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).
[7] Hao Li. Secure OFDM System Design for Wireless Communications , 2013 .
[8] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[9] T. Ohira,et al. Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels : RSSI interleaving scheme , 2005, The European Conference on Wireless Technology, 2005..
[10] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[11] Sanjay Jha,et al. Mobility Independent Secret Key Generation for Wearable Health-care Devices , 2015, BODYNETS.
[12] V. Janaki,et al. Secure and Efficient Data Communication Protocol for Wireless Body Area Networks , 2017 .
[13] Xiaohui Liang,et al. Wanda: Securely introducing mobile devices , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[14] Chonggang Wang,et al. Handover schemes in heterogeneous LTE networks: challenges and opportunities , 2016, IEEE Wireless Communications.
[15] Ruijiao Li,et al. Cognitive assisted living ambient system: a survey , 2015, Digit. Commun. Networks.
[16] Andrea Zanella,et al. The challenges of M2M massive access in wireless cellular networks , 2015, Digit. Commun. Networks.
[17] Chenming Zhou,et al. Channel reciprocity and time-reversed propagation for ultra-wideband communications , 2007, 2007 IEEE Antennas and Propagation Society International Symposium.
[18] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[19] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[20] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[21] Athanasios V. Vasilakos,et al. Channel Information based Cryptography and Authentication in Wireless Body Area Networks , 2013, BODYNETS.
[22] Raymond Knopp,et al. A practical method for wireless channel reciprocity exploitation through relative calibration , 2005, Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005..
[23] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[24] Honggang Wang,et al. Secure and efficient key generation and agreement methods for wireless body area networks , 2017, 2017 IEEE International Conference on Communications (ICC).
[25] Honggang Wang,et al. A key agreement method for wireless body area networks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[26] Sanjay Jha,et al. SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks , 2014, RFIDSec.