Secret keys from entangled sensor motes: implementation and analysis
暂无分享,去创建一个
[1] J. Filliben. The Probability Plot Correlation Coefficient Test for Normality , 1975 .
[2] Prashant Krishnamurthy,et al. Modeling of indoor positioning systems based on location fingerprinting , 2004, IEEE INFOCOM 2004.
[3] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[4] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[5] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[6] Ueli Maurer,et al. Unbreakable Keys from Random Noise , 2007 .
[7] Peter Grassberger,et al. Entropy estimation of symbol sequences. , 1996, Chaos.
[8] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[9] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[10] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[11] Jens B. Schmitt,et al. On key agreement in wireless sensor networks based on radio transmission properties , 2009, 2009 5th IEEE Workshop on Secure Network Protocols.
[12] Chuan Heng Foh,et al. A practical path loss model for indoor WiFi positioning enhancement , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.
[13] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[14] M. R. Titchener,et al. How well do practical information measures estimate the Shannon entropy , 2006 .
[15] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .