An over-the-air key establishment protocol using keyless cryptography
暂无分享,去创建一个
Jian Shen | Tao Wang | Wei Wu | Yang Xiang | Yuexin Zhang | Wei Wu | Jian Shen | Tao Wang | Yang Xiang | Yuexin Zhang
[1] Ross Brewer,et al. Advanced persistent threats: minimising the damage , 2014, Netw. Secur..
[2] Philip Levis,et al. Achieving single channel, full duplex wireless communication , 2010, MobiCom.
[3] Athanasios V. Vasilakos,et al. Survey on channel reciprocity based key establishment techniques for wireless systems , 2015, Wirel. Networks.
[4] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Sachin Katti,et al. Full duplex radios , 2013, SIGCOMM.
[7] Ifip Tc,et al. Communications and Multimedia Security, 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings , 2010, Communications and Multimedia Security.
[8] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[9] Moti Yung. A Secure and Useful 'Keyless Cryptosystem' , 1985, Inf. Process. Lett..
[10] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[11] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[12] Claude Castelluccia,et al. Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.
[13] Mani Mina,et al. Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[16] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[17] Roberto Di Pietro,et al. COKE Crypto-Less Over-the-Air Key Establishment , 2013, IEEE Transactions on Information Forensics and Security.
[18] Antoine Van de Capelle,et al. Performance analysis of unslotted CSMA/CA in wireless networks , 2010, Telecommun. Syst..
[19] Mohamed Mostafa Abd Allah. Strengths and Weaknesses of Near Field Communication (NFC) Technology , 2011 .
[20] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[21] Bowen Alpern,et al. Key Exchange Using 'Keyless Cryptography' , 1983, Inf. Process. Lett..
[22] Philip Levis,et al. Practical, real-time, full duplex wireless , 2011, MobiCom.
[23] Rong Jin,et al. Practical Secret Key Agreement for Full-Duplex Near Field Communications , 2014, IEEE Transactions on Mobile Computing.
[24] Roberto Di Pietro,et al. ESC: An efficient, scalable, and crypto-less solution to secure wireless networks , 2015, Comput. Networks.
[25] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[26] Ping Chen,et al. A Study on Advanced Persistent Threats , 2014, Communications and Multimedia Security.
[27] Peng Ning,et al. Is link signature dependable for wireless security? , 2013, 2013 Proceedings IEEE INFOCOM.
[28] Srdjan Capkun,et al. Physical-Layer Identification of Wireless Devices , 2011 .
[29] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.