메뉴 건너뛰기




Volumn , Issue , 2009, Pages 2886-2890

Random channel hopping schemes for key agreement in wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

WIRELESS NETWORKS;

EID: 77952839380     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PIMRC.2009.5450011     Document Type: Conference Paper
Times cited : (7)

References (21)
  • 1
    • 84898198306 scopus 로고    scopus 로고
    • [Online]. Available
    • "Wi-fi protected access." [Online]. Available: http://en.wikipedia.org/wiki/Wi-Fi Protected Access
    • Wi-fi Protected Access
  • 5
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • D. Otway and O. Rees, "Efficient and timely mutual authentication," SIGOPS Oper. Syst. Rev., vol. 21, no. 1, pp. 8-10, 1987.
    • (1987) SIGOPS Oper. Syst. Rev. , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 6
    • 0017018484 scopus 로고
    • New directions in cryptography
    • [Online]. Available: citeseer.ist.psu.edu/diffie76new.html
    • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, 1976. [Online]. Available: citeseer.ist.psu.edu/diffie76new.html
    • (1976) IEEE Transactions on Information Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 7
    • 77952794638 scopus 로고    scopus 로고
    • Online Available
    • (2009) Discrete logarithm. [Online]. Available: http://en.wikipedia.org/ wiki/Discrete logarithm problem
    • (2009) Discrete Logarithm
  • 8
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • R. C. Merkle, "Secure communications over insecure channels," Commun. ACM, vol. 21, no. 4, pp. 294-299, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.C.1
  • 13
    • 4143131440 scopus 로고    scopus 로고
    • Distributed symmetric key management for mobile ad hoc networks
    • A. C.-F. Chan, "Distributed symmetric key management for mobile ad hoc networks," IEEE INFOCOM, vol. 4, pp. 2414-2424, 2004.
    • (2004) IEEE INFOCOM , vol.4 , pp. 2414-2424
    • Chan, A.C.-F.1
  • 16
    • 84955614214 scopus 로고    scopus 로고
    • Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
    • C. Blundo, L. A. F. Mattos, and D. R. Stinson, "Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution," in CRYPTO, 1996, pp. 387-400.
    • (1996) CRYPTO , pp. 387-400
    • Blundo, C.1    Mattos, L.A.F.2    Stinson, D.R.3
  • 19
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • Nov.
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," Antennas and Propagation, IEEE Transactions on, vol. 53, no. 11, pp. 3776-3784, Nov. 2005.
    • (2005) Antennas and Propagation, IEEE Transactions on , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.