메뉴 건너뛰기




Volumn 11, Issue 1, 2013, Pages 288-297

SHAKE: Single HAsh key establishment for resource constrained devices

Author keywords

Cyber physical security; Key establishment; Received signal strength; Resource constrained devices; Wireless Sensor Networks

Indexed keywords

BIT STREAM; COMPUTATIONAL BURDEN; COMPUTATIONAL RESOURCES; COMPUTING RESOURCE; CYBER-PHYSICAL SECURITY; KEY ESTABLISHMENTS; NOVEL ALGORITHM; RECEIVED SIGNAL STRENGTH; RESOURCECONSTRAINED DEVICES; SECRET KEY; SIGNAL STRENGTHS; SINK-IN; WIRELESS CHANNEL;

EID: 84870059338     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2012.05.013     Document Type: Article
Times cited : (10)

References (24)
  • 7
    • 85027496257 scopus 로고
    • Secret-key reconciliation by public discussion
    • G. Brassard, L. Salvail, Secret-key reconciliation by public discussion, in: EUROCRYPT, 1993, pp. 410-423.
    • (1993) EUROCRYPT , pp. 410-423
    • Brassard, G.1    Salvail, L.2
  • 9
    • 65349086799 scopus 로고    scopus 로고
    • Shake well before use: Intuitive and secure pairing of mobile devices
    • R. Mayrhofer, and H. Gellersen Shake well before use: intuitive and secure pairing of mobile devices IEEE Transactions on Mobile Computing 8 6 2009 792 806
    • (2009) IEEE Transactions on Mobile Computing , vol.8 , Issue.6 , pp. 792-806
    • Mayrhofer, R.1    Gellersen, H.2
  • 11
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels IEEE Transactions on Antennas and Propagation 53 11 2005 3776 3784
    • (2005) IEEE Transactions on Antennas and Propagation , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 20
    • 84908985308 scopus 로고    scopus 로고
    • Crossbow. < http://www.xbow.com >.
    • Crossbow
  • 22
    • 41949122085 scopus 로고    scopus 로고
    • Computing binary combinatorial gray codes via exhaustive search with sat solvers
    • 10.1109/TIT.2008.917695
    • I. Zinovik, D. Kroening, and Y. Chebiryak Computing binary combinatorial gray codes via exhaustive search with sat solvers IEEE Transactions on Information Theory 54 4 2008 1819 1823 10.1109/TIT.2008.917695
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.4 , pp. 1819-1823
    • Zinovik, I.1    Kroening, D.2    Chebiryak, Y.3
  • 23
    • 78649746650 scopus 로고    scopus 로고
    • Choosing key sizes for cryptography
    • 10.1016/j.istr.2010.10.006
    • A.W. Dent Choosing key sizes for cryptography Information Security Technical Report 15 1 2010 21 27 10.1016/j.istr.2010.10.006
    • (2010) Information Security Technical Report , vol.15 , Issue.1 , pp. 21-27
    • Dent, A.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.