3.8 Proceedings Paper

Vehicle-Key: A Secret Key Establishment Scheme for LoRa-enabled IoV Communications

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Proceedings Paper Computer Science, Hardware & Architecture

Bipartite Graph Matching Based Secret Key Generation

Hongbo Liu et al.

Summary: The generation of physical layer secret key using wireless channel reciprocity has been proven feasible in various RF systems, but existing quantization techniques often lead to inconsistent results and mismatched secret bits. A new approach of solving a bipartite graph matching problem for secret key agreement shows promise in mitigating these issues.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021) (2021)

Article Computer Science, Hardware & Architecture

Physical Layer Key Generation in 5G Wireless Networks

Long Jiao et al.

IEEE WIRELESS COMMUNICATIONS (2019)

Proceedings Paper Computer Science, Theory & Methods

H2B: Heartbeat-based Secret Key Generation Using Piezo Vibration Sensors

Qi Lin et al.

IPSN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (2019)

Article Computer Science, Hardware & Architecture

Deep Learning for Human Activity Recognition in Mobile Computing

Thomas Plotz et al.

COMPUTER (2018)

Article Telecommunications

VANet security challenges and solutions: A survey

Hamssa Hasrouny et al.

VEHICULAR COMMUNICATIONS (2017)

Proceedings Paper Computer Science, Information Systems

Instant and Robust Authentication and Key Agreement among Mobile Devices

Wei Xi et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Computer Science, Information Systems

Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation

Hongbo Liu et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2014)

Article Computer Science, Information Systems

High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements

Neal Patwari et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2010)

Article Engineering, Electrical & Electronic

Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels

T Aono et al.

IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION (2005)

Article Computer Science, Artificial Intelligence

Framewise phoneme classification with bidirectional LSTM and other neural network architectures

A Graves et al.

NEURAL NETWORKS (2005)