메뉴 건너뛰기




Volumn 1, Issue , 2002, Pages 442-446

A proposal of architectural, elements for implementing secure software download service in software defined radio

Author keywords

Cryptography; Reconfigurable logic; Security; Software defined radio; Software download

Indexed keywords

ARCHITECTURAL ELEMENT; CRYPTOGRAPHIC HASHING; CRYPTOGRAPHIC TECHNIQUES; PUBLIC-KEY ENCRYPTION; RECONFIGURABLE LOGIC; SECRET-KEY ENCRYPTION; SECURE SOFTWARE; SECURITY; SOFTWARE DEFINED RADIO; SOFTWARE DOWNLOAD; SOFTWARE-DEFINED RADIOS; TAMPER RESISTANT;

EID: 20444503240     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PIMRC.2002.1046740     Document Type: Conference Paper
Times cited : (5)

References (20)
  • 1
    • 84933384775 scopus 로고
    • The Software Radio Architecture
    • May
    • J. Mitola, "The Software Radio Architecture", IEEE Communications Magazine. vol. 33, pp. 26-38, May 1995.
    • (1995) IEEE Communications Magazine , vol.33 , pp. 26-38
    • Mitola, J.1
  • 2
    • 0032646623 scopus 로고    scopus 로고
    • Mode Switching and Software Download for Software Defined Radio: The SDR Forum Approach
    • August
    • M. Cummings and S. Heath. "Mode Switching and Software Download for Software Defined Radio: The SDR Forum Approach", IEEE Communications Magazine, vol. 37, pp. 104-106, August 1999.
    • (1999) IEEE Communications Magazine , vol.37 , pp. 104-106
    • Cummings, M.1    Heath, S.2
  • 3
    • 0035249933 scopus 로고    scopus 로고
    • Evolution Toward Reconfigurable User Equipment
    • Feb.
    • N.J. Drew and M.M. Dillinger, "Evolution Toward Reconfigurable User Equipment", IEEE Communications Magazine, vol. 39. pp. 158-164, Feb. 2001.
    • (2001) IEEE Communications Magazine , vol.39 , pp. 158-164
    • Drew, N.J.1    Dillinger, M.M.2
  • 5
    • 0035416499 scopus 로고    scopus 로고
    • Research and Developments of Software-Defined Radio Technologies in Japan
    • August
    • N. Nakajima. R. Kohno and S. Kubota, "Research and Developments of Software-Defined Radio Technologies in Japan", IEEE Communications Magazine, vol. 39, pp. 146-155, August 2001.
    • (2001) IEEE Communications Magazine , vol.39 , pp. 146-155
    • Nakajima, N.1    Kohno, R.2    Kubota, S.3
  • 9
    • 0009771171 scopus 로고    scopus 로고
    • Software Defined Radio Prototype for PHS and Wireless LAN Systems (I) - System Design and Over-the-air-Download
    • SR01-12(2001-10), Sept.
    • H. Shiba at. al., "Software Defined Radio Prototype for PHS and Wireless LAN Systems (I) - System Design and Over-the-air-Download", Tecnical Report of IEICE, SR01-12(2001-10),pp. 33-38, Sept. 2001.
    • (2001) Tecnical Report of IEICE , pp. 33-38
    • Shiba, H.1
  • 10
    • 0034507799 scopus 로고    scopus 로고
    • Flexible Security Systems and a New Structure for Electronic Commerce on Software Radio
    • Proceedings, Sept.
    • M. Sugita, K. Uehara and S. Kubota, "Flexible Security Systems and a New Structure for Electronic Commerce on Software Radio", 52nd IEEE Vehicular Technology Conference. Proceedings. vol. 6, pp. 3033-3040, Sept. 2000.
    • (2000) 52nd IEEE Vehicular Technology Conference , vol.6 , pp. 3033-3040
    • Sugita, M.1    Uehara, K.2    Kubota, S.3
  • 12
    • 84880901653 scopus 로고    scopus 로고
    • The Order of Encryption and Authentication for Protecting Communications (or: How Secure is SSL)
    • Advance in Cryptology - CRYPTO 2001
    • H. Krawczyck, "The Order of Encryption and Authentication for Protecting Communications (or: How Secure is SSL)", Advance in Cryptology - CRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, pp. 310-331, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 310-331
    • Krawczyck, H.1
  • 13
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the Key Scheduling Algorithm of RC4
    • Selected Areas in Cryptogaphy - SAC2001
    • S. Fluhrer, I. Mantin and A. Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4", Selected Areas in Cryptogaphy - SAC2001, Lecture Notes in Computer Science, vol. 2259, pp. 1-24, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2259 , pp. 1-24
    • Fluhrer, S.1    Mantin, I.2    Shamir, A.3
  • 15
    • 84974707207 scopus 로고    scopus 로고
    • Real Time Cryptanalysis of A5/1 on a PC
    • Fast Software Encryption - FSEZ000
    • A. Biryukov, A. Shamir and D. Wagner, "Real Time Cryptanalysis of A5/1 on a PC", Fast Software Encryption - FSEZ000. Lecture Notes in Computer Science, vol. 1978. pp. 1-18, 2001.
    • (2001) Lecture Notes in Computer Science , vol.1978 , pp. 1-18
    • Biryukov, A.1    Shamir, A.2    Wagner, D.3
  • 16
    • 0009792703 scopus 로고    scopus 로고
    • On Wireless Communications Privacy and Security Evaluation of Encryption Techniques
    • Proceedings, March
    • M.J. Mihaljević and R. Kohno. "On Wireless Communications Privacy and Security Evaluation of Encryption Techniques", IEEE Wireless Comm. and Net. Conf. - WCNC2002, Proceedings, 865-868, March 2002.
    • (2002) IEEE Wireless Comm. and Net. Conf. - WCNC2002 , pp. 865-868
    • Mihaljević, M.J.1    Kohno, R.2
  • 18
    • 0004269186 scopus 로고
    • John Wley and Sans Inc., 2nd Edition
    • B. Schneier, Applied Cyptography. John Wley and Sans Inc., 2nd Edition, 1995.
    • (1995) Applied Cyptography
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.