메뉴 건너뛰기




Volumn , Issue , 2015, Pages 1396-1403

A secret key extraction technique applied in vehicular networks

Author keywords

Information reconciliation; Key exchange; Privacy amplification; Quantization; VANET; VANETS security

Indexed keywords

CRYPTOGRAPHY; EXTRACTION; NETWORK SECURITY; SAFETY ENGINEERING; UBIQUITOUS COMPUTING;

EID: 84925274959     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSE.2014.264     Document Type: Conference Paper
Times cited : (17)

References (31)
  • 4
    • 46749151065 scopus 로고    scopus 로고
    • A mechanism to enforce privacy in vehicleto-infrastructure communication
    • P. Cencioni and R. Di Pietro, "A mechanism to enforce privacy in vehicleto-infrastructure communication", Computer communications, vol. 31, pp. 2790-2802, 2008.
    • (2008) Computer Communications , vol.31 , pp. 2790-2802
    • Cencioni, P.1    Di Pietro, R.2
  • 5
    • 46749099829 scopus 로고    scopus 로고
    • Providing VANET security through active position detection
    • G. Yan, S. Olariu, and M. C. Weigle, "Providing VANET security through active position detection", Computer Communications, vol. 31, pp. 2883-2897, 2008.
    • (2008) Computer Communications , vol.31 , pp. 2883-2897
    • Yan, G.1    Olariu, S.2    Weigle, M.C.3
  • 6
    • 33746097415 scopus 로고    scopus 로고
    • Privacy issues in vehicular ad hoc networks
    • F. Dötzer, "Privacy issues in vehicular ad hoc networks", in Privacy enhancing technologies, 2006, pp. 197-209.
    • (2006) Privacy Enhancing Technologies , pp. 197-209
    • Dötzer, F.1
  • 14
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels", Antennas and Propagation, IEEE Transactions on, vol. 53, pp. 3776-3784, 2005.
    • (2005) Antennas and Propagation, IEEE Transactions On , vol.53 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 25
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • N. Patwari, J. Croft, S. Jana, and S. K. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements", Mobile Computing, IEEE Transactions on, vol. 9, pp. 17-30, 2010.
    • (2010) Mobile Computing, IEEE Transactions On , vol.9 , pp. 17-30
    • Patwari, N.1    Croft, J.2    Jana, S.3    Kasera, S.K.4
  • 29
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data", in Advances in cryptology-Eurocrypt 2004, 2004, pp. 523-540.
    • (2004) Advances in Cryptology-eurocrypt 2004 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 30
    • 47749083946 scopus 로고    scopus 로고
    • IEEE 802.11 p: Towards an international standard for wireless access in vehicular environments
    • D. Jiang and L. Delgrossi, "IEEE 802.11 p: Towards an international standard for wireless access in vehicular environments", in Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE, 2008, pp. 2036-2040.
    • (2008) Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE , pp. 2036-2040
    • Jiang, D.1    Delgrossi, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.