Secure key generation and distribution protocol for wearable devices
暂无分享,去创建一个
[1] Yantian Hou,et al. Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel , 2013, WiSec '13.
[2] Sanjay Jha,et al. Secret Key Generation by Virtual Link Estimation , 2015, BODYNETS.
[3] Farinaz Koushanfar,et al. Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.
[4] Sanjay Jha,et al. Mobility Independent Secret Key Generation for Wearable Health-care Devices , 2015, BODYNETS.
[5] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[6] Sanjay Jha,et al. Poster: Were You in the Cafe Yesterday?: Location Proof Generation & Verification for Mobile Users , 2015, SenSys.
[7] Sanjay Jha,et al. DLINK: Dual link based radio frequency fingerprinting for wearable devices , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).
[8] Sanjay Jha,et al. iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel , 2015, AsiaCCS.
[9] René Mayrhofer,et al. Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.
[10] David Kotz,et al. Recognizing whether sensors are on the same body , 2011, Pervasive Mob. Comput..
[11] Ming Li,et al. ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks , 2013, WiSec '13.
[12] Sanjay Jha,et al. SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks , 2014, RFIDSec.
[13] Erkki Oja,et al. Independent Component Analysis , 2001 .