GROUP KEY APPLICATIONS IN BLUETOOTH PICONET
暂无分享,去创建一个
[1] James Kardach. !"#$%&&%' Architecture Overview , 2000 .
[2] Daniele Miorandi,et al. Performance Characterization of a Bluetooth Piconet with Multi–Slot Packets , 2003 .
[3] Yu Xin,et al. Application of Group Key Agreement Based on Authenticated Diffie-Hellman for Bluetooth Piconet , 2009, 2009 WASE International Conference on Information Engineering.
[4] Eduardo Casilari-Pérez,et al. Modeling of the transmission delay in bluetooth piconets under serial port profile , 2010, IEEE Transactions on Consumer Electronics.
[5] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[6] Ford Long Wong,et al. Protocols and technologies for security in pervasive computing and communications , 2008 .
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Gerlando Falauto,et al. Bluetooth Wireless Networks Security Features , 2001 .
[9] Jukka Kaavi. Group Key Distribution in Ad-Hoc Networks Using MIKEY , 2005 .
[10] R.K. Cunningham,et al. Securing Communication of Dynamic Groups in Dynamic Network-Centric Environments , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[11] Mark Manulis,et al. Security-Focused Survey on Group Key Exchange Protocols , 2006, IACR Cryptol. ePrint Arch..
[12] Jelena V. Misic,et al. Talk and let talk: performance of Bluetooth piconets with synchronous traffic , 2005, Ad Hoc Networks.
[13] Joonsang Baek,et al. Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.
[14] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[15] Emmanuel Bresson,et al. A security solution for IEEE 802.11's ad hoc mode: password-authentication and group DiffieHellman key exchange , 2007, Int. J. Wirel. Mob. Comput..
[16] Xiong Huagang,et al. Performance estimation and evaluation of Bluetooth frequency hopping selection kernel , 2009, 2009 Joint Conferences on Pervasive Computing (JCPC).
[17] William Stallings,et al. Cryptography and network security , 1998 .
[18] Yuh-Shyan Chen,et al. A time-slot leasing-based QoS routing protocol over Bluetooth WPANs , 2007, Int. J. Ad Hoc Ubiquitous Comput..
[19] Mario Gerla,et al. Bluetooth: an enabler for personal area networking , 2001, IEEE Netw..
[20] Dirk Fox,et al. Bluetooth Security , 2002, Datenschutz und Datensicherheit.
[21] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[22] Zihua Guo,et al. Piconet security in IEEE 802:15.3 WPAN , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[23] Leïla Azouz Saïdane,et al. Priority based intra piconet scheduling scheme for QoS guaranties in Bluetooth networks , 2009, 2009 IEEE Symposium on Computers and Communications.
[24] Joakim Persson,et al. Bluetooth Security , 2004 .
[25] Ludovic Rousseau,et al. A Trusted Device to Secure a Bluetooth Piconet , 2001 .
[26] Karen A. Scarfone,et al. Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1) , 2012 .
[27] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[28] Chung-Hsin Liu,et al. The study for the optimal routing of Bluetooth Piconet , 2009, ICIS '09.
[29] H. Aslaksen. National university of singapore. , 1995, Environmental science & technology.
[30] Jolyon Clulow,et al. Repairing the Bluetooth Pairing Protocol , 2005, Security Protocols Workshop.
[31] Uta Wille,et al. Communication complexity of group key distribution , 1998, CCS '98.
[32] Weili Wu,et al. Lower bounds and new constructions on secure group communication schemes , 2008, Theor. Comput. Sci..
[33] Cheng-Chi Lee,et al. A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography , 2005, Telecommun. Syst..
[34] D. Gollman,et al. Key Management Protocols for Wireless Sensor Networks Diplomarbeit , 2006 .
[35] Yuh-Min Tseng,et al. Two-round contributory group key exchange protocol for wireless network environments , 2011, EURASIP J. Wirel. Commun. Netw..
[36] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.
[37] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[38] Chak-Kuen Wong,et al. A conference key distribution system , 1982, IEEE Trans. Inf. Theory.
[39] Abdul Rahman Ramli,et al. Authentication Model Based Bluetooth-enabled Mobile Phone , 2005 .
[40] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[41] Karen A. Scarfone,et al. Guide to Bluetooth Security , 2008 .
[42] Xiulin Hu,et al. A Survey of Group Key Management , 2008, 2008 International Conference on Computer Science and Software Engineering.
[43] Maarit Hietalahti. Key Establishment in Ad-hoc Networks , 2001 .
[44] Chatschik Bisdikian,et al. An overview of the Bluetooth wireless technology , 2001, IEEE Commun. Mag..
[45] Yuh-Shyan Chen,et al. A CENTRALIZED TIME-SLOT LEASING-BASED QOS ROUTING PROTOCOL OVER BLUETOOTH WPANS , 2005 .
[46] Chung-Hsin Liu,et al. The Study of the Bluetooth Circular Path , 2008, 2008 International Conference on MultiMedia and Information Technology.
[47] Gunhee Lee,et al. An Enhanced Approach to Providing Secure Point-to-Multipoint Communication in Bluetooth Piconets , 2007, 2007 Second International Conference on Communications and Networking in China.