A shared-secret free security infrastructure for wireless networks

被引:0
|
作者
Department of Computer Science and Engineering, Ohio State University, Columbus, OH 43210, United States [1 ]
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] SURVEILLANCE AND INTERVENTION OF INFRASTRUCTURE-FREE MOBILE COMMUNICATIONS: A NEW WIRELESS SECURITY PARADIGM
    Xu, Jie
    Duan, Lingjie
    Zhang, Rui
    IEEE WIRELESS COMMUNICATIONS, 2017, 24 (04) : 152 - 159
  • [22] Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography
    Koschuch, Manuel
    Hudler, Matthias
    Krueger, Michael
    Lory, Peter
    Wenzl, Juergen
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 314 : 74 - +
  • [23] Differential Secret Sharing in Wireless Networks
    Miao, Lei
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2015, 4 (02) : 213 - 216
  • [24] A Reciprocity Approach for Shared Secret Key Generation Extracted from Received Signal Strength in The Wireless Networks
    Sudarsono, Amang
    Yuliana, Mike
    Kristalina, Prima
    2018 INTERNATIONAL ELECTRONICS SYMPOSIUM ON ENGINEERING TECHNOLOGY AND APPLICATIONS (IES-ETA), 2018, : 170 - 175
  • [25] Metasource-Based Secret Key: Physical Layer Security Guarantee for Future Wireless Networks
    Yang, Yuli
    Guizani, Mohsen
    IEEE WIRELESS COMMUNICATIONS, 2024, 31 (05) : 126 - 133
  • [26] Efficient secret key generation scheme of physical layer security communication in ubiquitous wireless networks
    Xiong, Hailiang
    Wang, Guangyuan
    Ding, Jian
    Zhu, Weihong
    Xu, Hongji
    Hu, Changwu
    Mai, Zhenzhen
    Bian, Ruochen
    IET COMMUNICATIONS, 2021, 15 (08) : 1123 - 1132
  • [27] Security-quality aware routing for wireless multimedia sensor networks using secret sharing
    Rashwan, Abdelnaser
    Wang, Honggang
    Wu, Dalei
    Huang, Xinming
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2798 - 2812
  • [28] Wireless telecommunications, infrastructure security, and the Nimby problem
    Eagle, SJ
    CATHOLIC UNIVERSITY LAW REVIEW, 2005, 54 (02): : 445 - 496
  • [29] Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption
    N. N. Shenets
    Automatic Control and Computer Sciences, 2019, 53 : 857 - 864
  • [30] Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption
    Shenets, N. N.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 857 - 864