메뉴 건너뛰기




Volumn , Issue , 2011, Pages 115-126

Accelerometers and randomness: Perfect together

Author keywords

Computational RFID; Random number generation; Sensors; Ubiquitous computing

Indexed keywords

CHANGING ENVIRONMENT; COMPUTATIONAL RFID; ENTROPY SOURCES; ENVIRONMENTAL VARIATIONS; HIGH QUALITY; RANDOM NUMBERS; RESOURCECONSTRAINED DEVICES; RF-ID TAGS; SECURITY AND PRIVACY; STATIONARY STATE; WORLD MODEL;

EID: 80051914866     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1998412.1998433     Document Type: Conference Paper
Times cited : (46)

References (38)
  • 3
    • 84866884536 scopus 로고    scopus 로고
    • B. Crowell. Vibrations and Waves. Available at http://www.lightandmatter. com/html-books/3vw/ch02/ch02.html, 2009.
    • (2009) Vibrations and Waves
    • Crowell, B.1
  • 10
    • 80051911758 scopus 로고    scopus 로고
    • Creative Asia. Creative inspire m5300 5.1 speakers. Available at http://asia.creative.com/products/product.asp?category=4&subcategory= 25&product=15999&nav=1&listby, 2010.
    • (2010) Creative Inspire M5300 5.1 Speakers
  • 12
    • 70349301622 scopus 로고    scopus 로고
    • RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
    • A. Czeskis, K. Koscher, J. Smith, and T. Kohno. RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications. In ACM Conference on Computer and Communications Security, 2008.
    • (2008) ACM Conference on Computer and Communications Security
    • Czeskis, A.1    Koscher, K.2    Smith, J.3    Kohno, T.4
  • 14
    • 77957278441 scopus 로고    scopus 로고
    • HB#: Increasing the security and efficiency of HB+
    • H. Gilbert, M. Robshaw, and Y. Seurin. HB#: Increasing the Security and Efficiency of HB+. In EuroCrypt, 2008.
    • (2008) EuroCrypt
    • Gilbert, H.1    Robshaw, M.2    Seurin, Y.3
  • 19
    • 50249134033 scopus 로고    scopus 로고
    • Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
    • D. Holcomb, W. Burleson, and K. Fu. Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags. In Conference on RFID Security, 2007.
    • (2007) Conference on RFID Security
    • Holcomb, D.1    Burleson, W.2    Fu, K.3
  • 20
    • 68949175522 scopus 로고    scopus 로고
    • Power-up SRAM state as an identifying fingerprint and source of true random numbers
    • to appear
    • D. E. Holcomb, W. P. Burleson, and K. Fu. Power-up SRAM State as an Identifying Fingerprint and Source of True Random Numbers. IEEE Transactions on Computers, 2009. to appear.
    • (2009) IEEE Transactions on Computers
    • Holcomb, D.E.1    Burleson, W.P.2    Fu, K.3
  • 21
    • 63649112419 scopus 로고    scopus 로고
    • NeuralWISP: An energy-harvesting wireless neural interface with 1-m range
    • J. Holleman, D. Yeager, R. Prasad, J. Smith, and B. Otis. NeuralWISP: An Energy-Harvesting Wireless Neural Interface with 1-m Range. In BioCAS, 2008.
    • (2008) BioCAS
    • Holleman, J.1    Yeager, D.2    Prasad, R.3    Smith, J.4    Otis, B.5
  • 22
    • 80051866121 scopus 로고    scopus 로고
    • ICBuy.com
    • ICBuy.com. LIS302DL Acceleorometer Specifications. Available at http://tec.icbuy.com/product/productView/id/162826.html, 2008.
    • (2008) LIS302DL Acceleorometer Specifications
  • 25
    • 30344469114 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • A. Juels and S. Weis. Authenticating Pervasive Devices with Human Protocols. In CRYPTO, 2005.
    • (2005) CRYPTO
    • Juels, A.1    Weis, S.2
  • 28
    • 80051912756 scopus 로고    scopus 로고
    • MEMS Industry Group. Nokia Beats Apple to Compass-in-Phone. Available at http://memsblog.wordpress.com/2009/12/03/nokia-beats-apple-to-compass-in-phone/, 2009.
    • (2009) Nokia Beats Apple to Compass-in-phone
  • 29
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • D. Molnar and D. Wagner. Privacy and Security in Library RFID: Issues, Practices, and Architectures. In ACM Computer and Communications Security, 2004.
    • (2004) ACM Computer and Communications Security
    • Molnar, D.1    Wagner, D.2
  • 30
    • 70350687503 scopus 로고    scopus 로고
    • Design of a true random number generator using audio input
    • R. Morrison. Design of a True Random Number Generator Using Audio Input. In Journal of Craptology, 2001.
    • (2001) Journal of Craptology
    • Morrison, R.1
  • 34
    • 84856101295 scopus 로고    scopus 로고
    • We can remember it for you wholesale: Implications of data remanence on the use of RAM for true random number generation on RFID tags
    • N. Saxena and J. Voris. We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags. In Conference on RFID Security, 2009.
    • (2009) Conference on RFID Security
    • Saxena, N.1    Voris, J.2
  • 35
    • 80051881367 scopus 로고    scopus 로고
    • Behavior evaluation of sika deer (Cervus nippon) by RFID system
    • N. Segawa. Behavior Evaluation of Sika Deer (Cervus Nippon) by RFID System. In WISP Summit, 2009.
    • (2009) WISP Summit
    • Segawa, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.