Key search and adaptation based on association rules for backward secrecy
暂无分享,去创建一个
[1] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[2] Claude Castelluccia,et al. Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags , 2006, CARDIS.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Marek Klonowski,et al. Forward-Secure Key Evolution in Wireless Sensor Networks , 2007, CANS.
[5] Silvio Micali,et al. Secret-Key Agreement without Public-Key Cryptography , 1993, CRYPTO.
[6] Douglas R. Stinson,et al. Key Refreshing in Wireless Sensor Networks , 2008, ICITS.
[7] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[8] Yang Xiao,et al. Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID Tags , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[9] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[10] Zhao Fang,et al. Research and Realization on the Model of Neonates Surveillance System Based on RFID , 2009, 2009 International Conference on Information Technology and Computer Science.
[11] Marek Klonowski,et al. Mixing in Random Digraphs with Application to the Forward-Secure Key Evolution in Wireless Sensor Networks , 2014, TOSN.
[12] Tanmoy Kanti Das,et al. Diverging Keys in Wireless Sensor Networks , 2006, ISC.
[13] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.