메뉴 건너뛰기




Volumn , Issue , 2008, Pages 64-78

Jamming-resistant key establishment using uncoordinated frequency hopping

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); ELECTRONIC WARFARE; FREQUENCY HOPPING; JAMMING; MILITARY OPERATIONS; MULTIMEDIA SERVICES; RADIO COMMUNICATION; SECURITY SYSTEMS; SPREAD SPECTRUM COMMUNICATION;

EID: 50249175122     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2008.9     Document Type: Conference Paper
Times cited : (227)

References (25)
  • 1
    • 50249150271 scopus 로고    scopus 로고
    • Specification of the bluetooth system version 1.2, November 2003
    • Specification of the bluetooth system (version 1.2), November 2003.
  • 3
    • 68249131357 scopus 로고    scopus 로고
    • X9.63-2001: Key agreement and key transport using elliptical curve cryptography
    • ANSI, Technical report, American National Standards Institute
    • ANSI. X9.63-2001: Key agreement and key transport using elliptical curve cryptography. Technical report, American National Standards Institute, 2001.
    • (2001)
  • 6
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • EUROCRYPT 2004
    • D. Boneh and X. Boyen. Short signatures without random oracles. In EUROCRYPT 2004, Springer LNCS 3027.
    • Springer LNCS , vol.3027
    • Boneh, D.1    Boyen, X.2
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. SIAM Journal on Computing, 32(3):586-615, 2003.
    • (2003) SIAM Journal on Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 13
    • 18844450713 scopus 로고    scopus 로고
    • On link layer denial of service in data wireless lans: Research articles
    • G. Lin and G. Noubir. On link layer denial of service in data wireless lans: Research articles. Wireless Communications & Mobile Computing, 5(3), 2005.
    • (2005) Wireless Communications & Mobile Computing , vol.5 , Issue.3
    • Lin, G.1    Noubir, G.2
  • 18
    • 0031122982 scopus 로고    scopus 로고
    • Effective erasure codes for reliable computer communication protocols
    • L. Rizzo. Effective erasure codes for reliable computer communication protocols. ACM SIGCOMM Comput. Commun. Rev., 27(2), 1997.
    • (1997) ACM SIGCOMM Comput. Commun. Rev , vol.27 , Issue.2
    • Rizzo, L.1
  • 23
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct
    • A. D.Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, Oct. 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.