메뉴 건너뛰기




Volumn 7459 LNCS, Issue , 2012, Pages 235-252

A practical man-in-the-middle attack on signal-based key generation protocols

Author keywords

[No Author keywords available]

Indexed keywords

FALSE POSITIVE RATES; KEY GENERATION; KEY GENERATION PROTOCOLS; KEY RECOVERY; MAN IN THE MIDDLE ATTACKS; MULTIPATH SIGNALS; OFF-THE-SHELF HARDWARES; OVERALL BENEFIT; SECRET KEY; WIRELESS CHANNEL;

EID: 84865611232     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-33167-1_14     Document Type: Conference Paper
Times cited : (76)

References (21)
  • 4
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 6
    • 0001777508 scopus 로고    scopus 로고
    • Linking information reconciliation and privacy amplification
    • Cachin, C., Maurer, U.: Linking information reconciliation and privacy amplification. Journal of Cryptology 10(2), 97-110 (1997)
    • (1997) Journal of Cryptology , vol.10 , Issue.2 , pp. 97-110
    • Cachin, C.1    Maurer, U.2
  • 9
    • 78149248764 scopus 로고
    • Protocols for Secret Key Agreement by Public Discussion Based on Common Information
    • Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
    • Maurer, U.M.: Protocols for Secret Key Agreement by Public Discussion Based on Common Information. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 461-470. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 461-470
    • Maurer, U.M.1
  • 18
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • Aono, T., Higuchi, K., Ohira, T., Komiyama, B., Sasaoka, H.: Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Transactions on Antennas and Propagation 53(11), 3776-3784 (2005)
    • (2005) IEEE Transactions on Antennas and Propagation , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 20
    • 85036621397 scopus 로고    scopus 로고
    • Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity
    • Chung, Y., Yung, M. (eds.) WISA 2010. Springer, Heidelberg
    • Döttling, N., Lazich, D., Müller-Quade, J., de Almeida, A.S.: Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol. 6513, pp. 206-220. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6513 , pp. 206-220
    • Döttling, N.1    Lazich, D.2    Müller-Quade, J.3    De Almeida, A.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.