暂无分享,去创建一个
Simone Raponi | Gabriele Oligeri | Marwa Qaraqe | Muhammad Usman | Muhammad Usman | M. Qaraqe | Simone Raponi | G. Oligeri
[1] Claude Castelluccia,et al. Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.
[2] Bowen Alpern,et al. Key Exchange Using 'Keyless Cryptography' , 1983, Inf. Process. Lett..
[3] Giuseppe Piro,et al. EXCHANge: Securing IoT via channel anonymity , 2019, Comput. Commun..
[4] Moti Yung. A Secure and Useful 'Keyless Cryptosystem' , 1985, Inf. Process. Lett..
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] Ivan Martinovic,et al. Secret keys from entangled sensor motes: implementation and analysis , 2010, WiSec '10.
[7] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[8] Roberto Di Pietro,et al. ESC: An efficient, scalable, and crypto-less solution to secure wireless networks , 2015, Comput. Networks.
[9] Roberto Di Pietro,et al. COKE Crypto-Less Over-the-Air Key Establishment , 2013, IEEE Transactions on Information Forensics and Security.
[10] Jian Shen,et al. An over-the-air key establishment protocol using keyless cryptography , 2018, Future Gener. Comput. Syst..
[11] Roberto Di Pietro,et al. Strength of Crowd (SOC)—Defeating a Reactive Jammer in IoT with Decoy Messages , 2018, Sensors.
[12] Ivan Martinovic,et al. A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.
[13] Theodore S. Rappaport,et al. Wireless Communications: Principles and Practice (2nd Edition) by , 2012 .
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.