메뉴 건너뛰기




Volumn , Issue , 2009, Pages 13-24

Dialog codes for secure wireless communications

Author keywords

Dialog codes; Security; Wireless sensor network

Indexed keywords

CHANNEL MODEL; DECODING PROCESS; DIALOG CODES; EXPERIMENTAL VALIDATIONS; IEEE 802.15.4; O(1) COMPLEXITY; OPTIMAL CODING; PERFECT SECRECY; RECEIVER MODELS; RESOURCE-CONSTRAINED; SECURE CODES; SECURE CODING; SECURE WIRELESS COMMUNICATION; SECURITY; SECURITY BOOTSTRAPPING; SHARED SECRETS; TIME VARYING CHANNEL; WIRELESS NETWORK COMMUNICATION;

EID: 70549101452     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (23)
  • 1
    • 84869665602 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/key size.
  • 2
    • 84869671702 scopus 로고    scopus 로고
    • http://www.tinyos.net.
  • 3
    • 70349712498 scopus 로고    scopus 로고
    • Dialog codes for secure wireless communications
    • Technical Report, Ohio State University, OSU-CISRC-5/08-TR23
    • A. Arora and L. Sang. Dialog codes for secure wireless communications. Technical Report, Ohio State University, OSU-CISRC-5/08-TR23, 2008.
    • (2008)
    • Arora, A.1    Sang, L.2
  • 4
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • June
    • G. Blakley. Safeguarding cryptographic keys. Proc. AFIPS 1979 NCC, 48:pp. 313-317, June 1979.
    • (1979) Proc. AFIPS 1979 NCC , vol.48 , pp. 313-317
    • Blakley, G.1
  • 5
    • 77953853641 scopus 로고    scopus 로고
    • Shake them up!: A movement-based pairing protocol for cpu-constrained devices
    • C. Castelluccia and P. Mutaf. Shake them up!: a movement-based pairing protocol for cpu-constrained devices. Mobisys, 2005.
    • (2005) Mobisys
    • Castelluccia, C.1    Mutaf, P.2
  • 6
    • 0022199386 scopus 로고    scopus 로고
    • B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. FOCS85, pages pp. 383-395, 1985.
    • B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. FOCS85, pages pp. 383-395, 1985.
  • 7
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar and J. Korner. Broadcast channels with confidential messages. IEEE Trans. Information Theory, 24(3):339-348, May 1978.
    • (1978) IEEE Trans. Information Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 11
    • 55349095058 scopus 로고    scopus 로고
    • The wiretap channel with feedback: Encryption over the channel
    • Nov
    • L. Lai, H. E. Gamal, and H. V. Poor. The wiretap channel with feedback: Encryption over the channel. IEEE Transactions on Information Theory, 54(11):5059-5067, Nov 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.11 , pp. 5059-5067
    • Lai, L.1    Gamal, H.E.2    Poor, H.V.3
  • 14
    • 84869673512 scopus 로고    scopus 로고
    • MoteIV
    • MoteIV. http://www.moteiv.com/.
  • 16
  • 17
    • 51449114762 scopus 로고    scopus 로고
    • Secure wireless communications: Secret keys through multipath
    • A. Sayeed and A. Perrig. Secure wireless communications: Secret keys through multipath. ICASSP, 2008.
    • (2008) ICASSP
    • Sayeed, A.1    Perrig, A.2
  • 18
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 20
    • 45249101530 scopus 로고    scopus 로고
    • E. Tekin and A. Yener. The general gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming. IEEE Transactions on Information Theory - Special Issue on Information Theoretic Security, 54(6):2735-2751, 2008.
    • E. Tekin and A. Yener. The general gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming. IEEE Transactions on Information Theory - Special Issue on Information Theoretic Security, 54(6):2735-2751, 2008.
  • 22
    • 0026219389 scopus 로고
    • Generalized hamming weights for linear codes
    • V. K. Wei. Generalized hamming weights for linear codes. IEEE Transactions on Information Theory, 37(5):1412-1418, 1991.
    • (1991) IEEE Transactions on Information Theory , vol.37 , Issue.5 , pp. 1412-1418
    • Wei, V.K.1
  • 23
    • 0016562514 scopus 로고
    • The wire-tap channel. in
    • A. D. Wyner. The wire-tap channel. in Bell Syst. Tech. J., 54(8), pages 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.