This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 Key Agreement Algorithms for Vehicular Communicatio
暂无分享,去创建一个
Marco Gruteser | Fei Hu | Bin Zan | M. Gruteser | Fei Hu | Bin Zan
[1] Neal Koblitz,et al. An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm , 1998, CRYPTO.
[2] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[3] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[4] Marco Gruteser,et al. Improving robustness of key extraction from wireless channels with differential techniques , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[5] Manpreet Singh,et al. Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[6] Jeong Hyun Yi,et al. Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks , 2005, NETWORKING.
[7] Owen Rees,et al. Efficient and timely mutual authentication , 1987, OPSR.
[8] Seong-Moo Yoo,et al. Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[9] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[12] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[13] Jeffrey I. Schiller,et al. An Authentication Service for Open Network Systems. In , 1998 .
[14] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[15] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[16] H. Sasaoka,et al. A Scheme of Private key Agreement Based on Delay Profiles in UWB Systems , 2006, 2006 IEEE Sarnoff Symposium.
[17] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[18] Aldar C.-F. Chan,et al. Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[19] Nitin H. Vaidya,et al. Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[20] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[21] Marco Gruteser,et al. Random channel hopping schemes for key agreement in wireless networks , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.