메뉴 건너뛰기




Volumn , Issue , 2009, Pages 37-42

On key agreement in wireless sensor networks based on radio transmission properties

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL BEHAVIOR; HIGH RATE; INDOOR ENVIRONMENT; INFORMATION ENTROPY; KEY AGREEMENT; KEY AGREEMENT PROTOCOL; KEY AGREEMENT SCHEME; MICAZ SENSOR NODE; RANDOM VECTORS; SECURITY PROTOCOLS; SHARED SECRETS; WIRELESS CHANNEL; WIRELESS COMMUNICATIONS;

EID: 74549208614     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NPSEC.2009.5342245     Document Type: Conference Paper
Times cited : (16)

References (12)
  • 3
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM Journal on Computing, 38:97, 2008.
    • (2008) SIAM Journal on Computing , vol.38 , pp. 97
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 7
    • 52049085664 scopus 로고    scopus 로고
    • I. Martinovic, F. A. Zdarsky, M. Wilhelm, C. Wegmann, and Jens B. Schmitt. Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless. In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2008), Alexandria, VA, USA, March 2008.
    • I. Martinovic, F. A. Zdarsky, M. Wilhelm, C. Wegmann, and Jens B. Schmitt. Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless. In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2008), Alexandria, VA, USA, March 2008.
  • 9
    • 0037396695 scopus 로고    scopus 로고
    • Secret-Key Agreement Over Unauthenticated Public Channels - Parts I-III
    • April
    • U. Maurer and S. Wolf. Secret-Key Agreement Over Unauthenticated Public Channels - Parts I-III. IEEE Transactions on Information Theory, 49(4):822-851, April 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.4 , pp. 822-851
    • Maurer, U.1    Wolf, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.