Message Authentication and Source Privacy in Wi-Fi
暂无分享,去创建一个
[1] Jonathan Katz,et al. Attacking cryptographic schemes based on "perturbation polynomials" , 2009, CCS.
[2] Rajendra K. Sharma,et al. Identity-Based Cryptography Techniques and Applications (A Review) , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.
[3] Vivek Kapoor,et al. Elliptic curve cryptography , 2008, UBIQ.
[4] Jongan Park,et al. The improved data encryption standard (DES) algorithm , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.
[5] Kannan Balasubramanian. Variants of RSA and their cryptanalysis , 2014, 2014 International Conference on Communication and Network Technologies.
[6] Guiling Wang,et al. Lightweight and Compromise-Resilient Message Authentication in Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[7] Rached Tourki,et al. An FPGA implementation of the AES with fault detection countermeasure , 2013, 2013 International Conference on Control, Decision and Information Technologies (CoDIT).
[8] Muhammad Salman,et al. Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system , 2013, 2013 International Conference on QiR.
[9] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[10] Rainer A. Rueppel,et al. Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Janusz Gozdecki,et al. Wireless link prediction and triggering using modified Ornstein–Uhlenbeck jump diffusion process , 2014, Wirel. Networks.
[13] Jie Wu,et al. Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[14] Lein Harn,et al. Design of generalised ElGamal type digital signature schemes based on discrete logarithm , 1994 .
[15] Zheng Yang,et al. Sensorless Sensing with WiFi , 2015 .