ARQ security in Wi-Fi and RFID networks
暂无分享,去创建一个
[1] Erik Tews,et al. Practical attacks against WEP and WPA , 2009, WiSec '09.
[2] H. Vincent Poor,et al. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[3] Robert H. Deng,et al. Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[4] Basel Alomair,et al. Securing low-cost RFID systems: An unconditionally secure approach , 2011, J. Comput. Secur..
[5] Mohamed Abdel Latif,et al. ARQ secrecy over correlated fading channels , 2010, 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo).
[6] Kjell Jørgen Hole,et al. Weaknesses in the temporal key hash of WPA , 2004, MOCO.
[7] Hesham El Gamal,et al. ARQ-Based Secret Key Sharing , 2009, 2009 IEEE International Conference on Communications.
[8] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[9] William A. Arbaugh,et al. Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .
[10] Masakatu Morii,et al. A Practical Message Falsification Attack on WPA , 2009 .
[11] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[12] Andreas Klein,et al. Attacks on the RC4 stream cipher , 2008, Des. Codes Cryptogr..
[13] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[14] Mark Handley,et al. The final nail in WEP's coffin , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[15] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[16] Juan E. Tapiador,et al. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.
[17] Gildas Avoine,et al. The Swiss-Knife RFID Distance Bounding Protocol , 2008, ICISC.
[18] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[19] D.R. Novotny,et al. HF RFID electromagnetic emissions and performance , 2008, 2008 IEEE International Symposium on Electromagnetic Compatibility.
[20] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[21] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[22] Erik Tews,et al. Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.
[23] Juan E. Tapiador,et al. Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks , 2009, ArXiv.
[24] Aamir Hasan,et al. Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.
[25] Moustafa Youssef,et al. ARQ secrecy: From theory to practice , 2009, 2009 IEEE Information Theory Workshop.
[26] Adi Shamir,et al. Un-Trusted-HB: Security Vulnerabilities of Trusted-HB , 2009, IACR Cryptol. ePrint Arch..
[27] Basel Alomair,et al. On the Authentication of RFID Systems with Bitwise Operations , 2008, 2008 New Technologies, Mobility and Security.