메뉴 건너뛰기




Volumn , Issue , 2013, Pages 750-755

Practical provably secure key sharing for near field communication devices

Author keywords

[No Author keywords available]

Indexed keywords

ACHIEVABILITY; KEY SHARING; KEY-SHARING SCHEMES; MODES OF OPERATION; NEAR FIELD COMMUNICATIONS; NUMERICAL RESULTS; PROVABLY SECURE; WIRELESS CHANNEL;

EID: 84877614231     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCNC.2013.6504182     Document Type: Conference Paper
Times cited : (7)

References (18)
  • 1
    • 84877605356 scopus 로고    scopus 로고
    • Juniper Research Press release: NFC mobile payments to drive contactless transactions to reach nearly 50 billion worldwide by 2014: New juniper research report
    • Juniper Research, "Press release: NFC mobile payments to drive contactless transactions to reach nearly 50 billion worldwide by 2014: New juniper research report," http://www.juniperresearch.com/viewpressrelease. php?pr=246.
  • 2
    • 84877630633 scopus 로고    scopus 로고
    • Press release: 1 in 5 smartphones will have NFC by 2014, spurred by recent breakthroughs: New juniper research report
    • -, "Press release: 1 in 5 smartphones will have NFC by 2014, spurred by recent breakthroughs: New juniper research report," http://www.juniperresearch.com/viewpressrelease.php?pr=239.
  • 6
    • 79951477401 scopus 로고    scopus 로고
    • Eavesdropping attacks on high-frequency rfid tokens
    • Budapest, Hungary
    • G. Hancke, "Eavesdropping Attacks on High-Frequency RFID Tokens," RFID Security, Budapest, Hungary, 2008.
    • (2008) RFID Security
    • Hancke, G.1
  • 10
    • 80052169777 scopus 로고    scopus 로고
    • Practical provably secure communication for half-duplex radios
    • A. Elmorsy, M. Yasser, M. Elsabagh, and M. Youssef, "Practical provably secure communication for half-duplex radios," in ICC, 2011.
    • (2011) ICC
    • Elmorsy, A.1    Yasser, M.2    Elsabagh, M.3    Youssef, M.4
  • 12
    • 77951585015 scopus 로고    scopus 로고
    • Randomization for security in half-duplex two-way gaussian channels
    • A. E. Gamal, M. Youssef, and H. E. Gamal, "Randomization for security in half-duplex two-way gaussian channels," in GLOBECOM, 2009.
    • (2009) GLOBECOM
    • Gamal, A.E.1    Youssef, M.2    Gamal, H.E.3
  • 13
    • 70449517098 scopus 로고    scopus 로고
    • On the delay limited secrecy capacity of fading channels
    • K. Khalil, M. Youssef, O. O. Koyluoglu, and H. E. Gamal, "On the delay limited secrecy capacity of fading channels," in ISIT, 2009, pp. 2617-2621.
    • ISIT, 2009 , pp. 2617-2621
    • Khalil, K.1    Youssef, M.2    Koyluoglu, O.O.3    Gamal, H.E.4
  • 14
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 15
    • 0016562514 scopus 로고
    • The wire-tap channel
    • January
    • A. D. Wyner, "The wire-tap channel," Bell Systems Technical Journal, vol. 54, no. 8, pp. 1355-1387, January 1975.
    • (1975) Bell Systems Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 16
    • 33745771753 scopus 로고    scopus 로고
    • Noisy tags: A pretty good key exchange protocol for rfid tags
    • Springer
    • C. Castelluccia and G. Avoine, "Noisy tags: A pretty good key exchange protocol for RFID tags," in CARDIS, ser. Lecture Notes in Computer Science, vol. 3928. Springer, 2006, pp. 289-299.
    • (2006) CARDIS, Ser. Lecture Notes in Computer Science , vol.3928 , pp. 289-299
    • Castelluccia, C.1    Avoine, G.2
  • 17
    • 84877591845 scopus 로고    scopus 로고
    • Nxp nfc controller pn544 for mobile phones and portable equipment
    • NXP Semiconductors
    • NXP Semiconductors, "NXP NFC controller PN544 for mobile phones and portable equipment," Avaialble online at: http://www.nxp.com/documents/ leaflet/75016890.pdf.
    • Avaialble Online at


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.