메뉴 건너뛰기




Volumn 2006, Issue , 2005, Pages 241-245

A key establishment IP-core for ubiquitous computing

Author keywords

[No Author keywords available]

Indexed keywords

PERVASIVE COMPUTING; SYMMETRIC KEY EXCHANGE; UBIQUITOUS COMPUTING; WIRELESS COMMUNICATION CHANNELS;

EID: 33749060160     PISSN: 15294188     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DEXA.2005.18     Document Type: Conference Paper
Times cited : (11)

References (12)
  • 3
    • 0036340335 scopus 로고    scopus 로고
    • Secure exchange of information by synchronization of neural networks
    • I. Kanter, W. Kinzel, and E. Kanter. Secure exchange of information by synchronization of neural networks. Europhysics Letters, 57(1):141-147, 2002.
    • (2002) Europhysics Letters , vol.57 , Issue.1 , pp. 141-147
    • Kanter, I.1    Kinzel, W.2    Kanter, E.3
  • 5
    • 84891304223 scopus 로고    scopus 로고
    • Analysis of neural cryptography
    • Proc. of AsiaCrypt 2002, Queenstown, New Zealand, December 1-5. Springer Verlag
    • A. Klimov, A. Mityagin, and A. Shamir. Analysis of neural cryptography. In Proc. of AsiaCrypt 2002, volume 2501 of LNCS. pages 288-298, Queenstown, New Zealand, December 1-5 2002. Springer Verlag.
    • (2002) LNCS , vol.2501 , pp. 288-298
    • Klimov, A.1    Mityagin, A.2    Shamir, A.3
  • 6
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion
    • U. Maurer. Secret key agreement by public discussion. IEEE Transactions on Information Theory. 39(3):733-742, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 8
    • 41349083924 scopus 로고    scopus 로고
    • Secure key-exchange protocol with an absence of injective functions
    • (066102)
    • R. Mislovaty, Y. Perchenok, I. Kanter, and W. Kinzel. Secure key-exchange protocol with an absence of injective functions. Phys. Rev. E. 66(066102), 2002.
    • (2002) Phys. Rev. E. , vol.66
    • Mislovaty, R.1    Perchenok, Y.2    Kanter, I.3    Kinzel, W.4
  • 9
    • 33749056477 scopus 로고    scopus 로고
    • Past and future of cryptographic engineering
    • Stanford University. USA. August 22
    • C. Paar. Past and future of cryptographic engineering. Tutorial at HOT CHIPS 2003. Stanford University. USA. August 22 2003.
    • (2003) Tutorial at HOT CHIPS 2003
    • Paar, C.1
  • 10
    • 37649031336 scopus 로고    scopus 로고
    • Mutual learning in a tree parity machine and its application to cryptography
    • (066135)
    • M. Rosen-Zvi, E. Klein, I. Kanter, and W. Kinzel. Mutual learning in a tree parity machine and its application to cryptography. Phys. Rev. E., 66(066135), 2002.
    • (2002) Phys. Rev. E. , vol.66
    • Rosen-Zvi, M.1    Klein, E.2    Kanter, I.3    Kinzel, W.4
  • 11
    • 33749076557 scopus 로고    scopus 로고
    • Security in pervasive computing
    • Proc. of the 1st International Conference on Security in Pervasive Computing (SPC 2003). Springer Verlag.
    • F. Stajano. Security in pervasive computing. In Proc. of the 1st International Conference on Security in Pervasive Computing (SPC 2003), volume 2802 of LNCS. page 1. Springer Verlag. 2003.
    • (2003) LNCS , vol.2802 , pp. 1
    • Stajano, F.1
  • 12
    • 17644426326 scopus 로고    scopus 로고
    • Tree parity machine rekeying architectures
    • Apr.
    • M. Volkmer and S. Wallner. Tree parity machine rekeying architectures. IEEE Transactions on Computers, 54(4):421-427, Apr. 2005.
    • (2005) IEEE Transactions on Computers , vol.54 , Issue.4 , pp. 421-427
    • Volkmer, M.1    Wallner, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.