1 |
임용재 외 2, "미래 인터넷의 진화방향: Internet of Things," PM Issue Report 2012, vol. 2, no. 1, 2012.
|
2 |
W. B. Davenport, Jr. and W. L. Root, An Introduction to the Theory of Random Signals and Noise, NY: McGraw-Hill, 1958.
|
3 |
W. C. Jakes, Microwave Mobile Communications, NY: IEEE Press, 1974.
|
4 |
NIST, A statistical test suite for random and pseudorandom number generators for cryptographic applications, 800th Ed., National Institute of Standards and Technology, 2001.
|
5 |
김동희 외 2, "IoT 서비스를 위한 보안," Inf. Commun. Mag., vol. 30, no. 8, pp. 53-59, 2013.
과학기술학회마을
|
6 |
J. Park, S. Shin, and N. Kang, "Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things," J. KICS, vol., 38B no. 09, pp. 707-714, 2013.
과학기술학회마을
DOI
|
7 |
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography, Part I: secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
DOI
ScienceOn
|
8 |
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
DOI
ScienceOn
|
9 |
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental quantum cryptography," J. Cryptology, vol. 5, pp. 3-28, 1992.
|
10 |
C. Bennett, G. Brassard, C. Crepeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
DOI
ScienceOn
|
11 |
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in Proc. ACM Comput. Commun. Security, pp. 401-410, Oct. 2007.
|
12 |
N. Patwari, J. Croft, S. Jana, and S. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," IEEE Trans. Mob. Comput., vol. 9, no. 1, pp. 17-30, Jan. 2010.
DOI
ScienceOn
|
13 |
M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," J. Comp. Syst. Sci., vol. 22, pp. 265-279, 1981.
DOI
|
14 |
C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly gaussian random variables," in Proc. IEEE Int. Symp. Inf. Theory, pp. 2593-2597, Jul. 2006.
|
15 |
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radio telepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. ACM Int. Conf. Mob. Comput. Netw. (MobiCom '08), pp. 128-139, San Francisco, CA, Sept. 2008.
|
16 |
J. L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comp. Syst. Sci., vol. 18, pp. 143-154, 1979.
DOI
ScienceOn
|