RF Fingerprints for Secure Authentication in Single-Hop WSN
暂无分享,去创建一个
[1] Arthur I. Karshmer,et al. Living assistance systems: an ambient intelligence approach , 2006, ICSE.
[2] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[3] Johann van der Merwe,et al. A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.
[4] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[5] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[6] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[7] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[8] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[9] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[10] Panagiotis Papadimitratos,et al. Secure neighbor discovery in wireless networks: formal investigation of possibility , 2008, ASIACCS '08.
[11] Kevin Fu,et al. Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..
[12] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[13] O. H. Tekbas,et al. An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions , 2004, Canadian Journal of Electrical and Computer Engineering.
[14] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result , 2003, IEEE Trans. Inf. Theory.
[15] Michel Barbeau,et al. Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.
[16] Yvo Desmedt,et al. A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.
[17] Martin Nemzow,et al. Rethinking Public Key Infrastructures and Digital Certificates and Privacy , 2001 .
[18] R.T. Johnk,et al. Electromagnetic signatures of WLAN cards and network security , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[19] Serge Vaudenay,et al. Authenticated Multi-Party Key Agreement , 1996, ASIACRYPT.
[20] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1983, PODS '83.
[21] Levente Buttyán,et al. RANBAR: RANSAC-based resilient aggregation in sensor networks , 2006, SASN '06.
[22] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[23] Upkar Varshney,et al. Pervasive Healthcare and Wireless Health Monitoring , 2007, Mob. Networks Appl..
[24] Guang Gong,et al. Pre-Authentication and Authentication Models in Ad Hoc Networks , 2007 .
[25] Faith Ellen,et al. Hundreds of impossibility results for distributed computing , 2003, Distributed Computing.