메뉴 건너뛰기




Volumn 43, Issue 4, 2013, Pages 63-74

Dhwani: Secure peer-to-peer acoustic NFC

Author keywords

nfc; security; wireless

Indexed keywords

KEY FEATURE; NEAR FIELD COMMUNICATIONS; NETWORK CONFIGURATION; NFC; PEER TO PEER; SECURE COMMUNICATION CHANNELS; SECURITY; SELF-INTERFERENCES;

EID: 84891591388     PISSN: 01464833     EISSN: 19435819     Source Type: Conference Proceeding    
DOI: 10.1145/2534169.2486037     Document Type: Conference Paper
Times cited : (88)

References (21)
  • 1
    • 84891601627 scopus 로고    scopus 로고
    • Wimbeep. https://sites.google.com/site/wimbeep/.
    • Wimbeep
  • 2
    • 84891591098 scopus 로고    scopus 로고
    • Zoosh. http://www.naratte.com/.
    • Zoosh
  • 3
    • 84891592638 scopus 로고    scopus 로고
    • Advanced Encryption Standard (AES), Nov
    • Advanced Encryption Standard (AES), Nov 2001. U.S. Federal Information Processing Standard Publication 197, http://csrc.nist.gov/publications/fips/ fips197/fips-197.pdf.
    • (2001) U.S. Federal Information Processing Standard Publication , vol.197
  • 4
  • 5
    • 84883291484 scopus 로고    scopus 로고
    • Dec
    • NFC-SEC Whitepaper, Dec 2008. http://www.ecma-international. org/activities/Communications/tc47-2008-089.pdf.
    • (2008) NFC-SEC Whitepaper
  • 7
    • 84876153423 scopus 로고    scopus 로고
    • Jun ECMA-385 Standard (2nd Edition)
    • NFC-SEC: NFCIP-1 Security Services and Protocol, Jun 2010. ECMA-385 Standard (2nd Edition), http://www.ecma-international.org/publications/ standards/Ecma-385.htm.
    • (2010) NFC-SEC: NFCIP-1 Security Services and Protocol
  • 12
    • 80053135174 scopus 로고    scopus 로고
    • They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices
    • S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices. In SIGCOMM, 2011.
    • (2011) SIGCOMM
    • Gollakota, S.1    Hassanieh, H.2    Ransford, B.3    Katabi, D.4    Fu, K.5
  • 15
    • 70450242725 scopus 로고    scopus 로고
    • On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments
    • S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy. On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments. In Mobicom, 2009.
    • (2009) Mobicom
    • Jana, S.1    Premnath, S.2    Clark, M.3    Kasera, S.4    Patwari, N.5    Krishnamurthy, S.6
  • 18
    • 70349107957 scopus 로고    scopus 로고
    • Jamming for Good: A Fresh Approach to Authentic Communication in WSNs
    • I. Martinovic, P. Pichota, and J. B. Schmitt. Jamming for Good: A Fresh Approach to Authentic Communication in WSNs. In WiSec, 2009.
    • (2009) WiSec
    • Martinovic, I.1    Pichota, P.2    Schmitt, J.B.3
  • 19
    • 60149097098 scopus 로고    scopus 로고
    • Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
    • S. Mathur, N. M, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Mobicom, 2008.
    • (2008) Mobicom
    • Mathur, S.1    Ye, N.M.C.2    Reznik, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.