메뉴 건너뛰기




Volumn , Issue , 2013, Pages 429-439

Creating secrets out of erasures

Author keywords

Group secret agreement; Physical layer security

Indexed keywords

COMPUTATIONAL CAPABILITY; COMPUTATIONAL LIMITATIONS; PHYSICAL-LAYER SECURITIES; SHARED SECRETS; WIRELESS DEVICES; WIRELESS NODES;

EID: 84887051297     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2500423.2500440     Document Type: Conference Paper
Times cited : (17)

References (32)
  • 2
    • 84887043492 scopus 로고    scopus 로고
    • Redbow Labs. http://vimeo.com/37679492.
    • Redbow Labs
  • 21
    • 0027599802 scopus 로고
    • Secret-key agreement by public discussion from common information
    • U. Maurer. Secret-Key Agreement by Public Discussion from Common Information. IEEE Transactions on Information Theory, 39:733-742, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , pp. 733-742
    • Maurer, U.1
  • 24
    • 0037396951 scopus 로고    scopus 로고
    • Secret key agreement over unauthenticated public channels Part III: Privacy amplification
    • U. Maurer and S. Wolf. Secret Key Agreement over Unauthenticated Public Channels Part III: Privacy Amplification. IEEE Transactions on Information Theory, 49(4):839-851, 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.1    Wolf, S.2
  • 27
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 30


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.