SDR Implementation of a D2D Security Cryptographic Mechanism
暂无分享,去创建一个
[1] Yu Cheng,et al. Secure key establishment for Device-to-Device communications , 2014, 2014 IEEE Global Communications Conference.
[2] Friedrich Jondral,et al. Software-Defined Radio—Basics and Evolution to Cognitive Radio , 2005, EURASIP J. Wirel. Commun. Netw..
[3] Masoumeh Safkhani,et al. IoT Device Security: Challenging “A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function” , 2018, Sensors.
[4] Yacine Challal,et al. Security in device-to-device communications: a survey , 2018, IET Networks.
[5] Alexandra Stanciu,et al. SYSTEM ON CHIP DEVELOPMENT PLATFORM FOR SOFTWARE DEFINED RADIO , 2018 .
[6] Marcian N. Cirstea,et al. Analysis and Evaluation of PUF-Based SoC Designs for Security Applications , 2016, IEEE Transactions on Industrial Electronics.
[7] Martin Schramm,et al. A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(sm) Based on Montgomery Arithmetic , 2018, Secur. Commun. Networks.
[8] Zheng Yan,et al. A Survey on Security in D2D Communications , 2017, Mob. Networks Appl..
[9] Jörg Ott,et al. Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.
[10] Enrique Festijo,et al. Joint operation of routing control and group key management for 5G ad hoc D2D networks , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).
[11] Suresh C. Mehrotra,et al. A Review on Elliptic Curve Cryptography for Embedded Systems , 2011, ArXiv.
[12] J-E·埃克伯格,et al. Device to device communication security , 2013 .
[13] Kyungtae Kang,et al. Secure Device-to-Device Authentication in Mobile Multi-hop Networks , 2014, WASA.
[14] Aiqing Zhang,et al. SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks , 2016, IEEE Transactions on Vehicular Technology.
[15] Ajithkumar,et al. A survey on security of mobile handheld devices through elliptic curve cryptography , 2016 .
[16] Debdeep Mukhopadhyay,et al. Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database , 2019, IEEE Transactions on Dependable and Secure Computing.