Robust uncorrelated bit extraction methodologies for wireless sensors
暂无分享,去创建一个
[1] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[2] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[3] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[4] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[7] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[8] William Et.Al Hines,et al. Probability and Statistics in Engineering , 2003 .
[9] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[10] John McEachen,et al. Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[11] H. Hashemi,et al. The indoor radio propagation channel , 1993, Proc. IEEE.
[12] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[13] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] Kaveh Pahlavan,et al. Localization Algorithms and Strategies for Wireless Sensor Networks: Monitoring and Surveillance Techniques for Target Tracking , 2009 .
[16] C. W. Farrow,et al. A continuously variable digital delay element , 1988, 1988., IEEE International Symposium on Circuits and Systems.
[17] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[18] Donggang Liu,et al. Group-based key predistribution for wireless sensor networks , 2008, TOSN.
[19] Shmuel Winograd,et al. Complexity Of Computations , 1978, ACM Annual Conference.