1 |
Dooho Choi, Seung-Hyun Seo, Yoon-Seok Oh, and Yousung Kang, "Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security," IEEE Internet of Things Journal(in press), May 2018.
|
2 |
R. Chien, "Cyclic decoding procedures for Bose-Chaudhuri-Hocquenghem codes," IEEE Transactions on Information Theory, vol. 10, no. 4, pp. 357-363, Oct. 1964.
DOI
|
3 |
N. Otsu, "A threshold selection method from gray-level histograms," IEEE transactions on systems, man, and cybernetics, vol. 9, no. 1, pp.62-66, Jan. 1979.
DOI
|
4 |
R. Maes, V. Leest, E. Sluis, and F. Willems, "Secure key generation from biased PUFs: extended version," Journal of Cryptographic Engineering, vol. 6, no. 2, pp. 121-137, Mar. 2016.
DOI
|
5 |
The ScienceTimes, "How vulnerable is the drones to hacking?" https://www.sciencetimes.co.kr/?news=%EB%93%9C%EB%A1%A0%EC%9D%80-%ED%95%B4%ED%82%B9%EC%97%90-%EC%96%BC%EB%A7%88%EB%82%98-%EC%B7%A8%EC%95%BD%ED%95%A0%EA%B9%8C, accessed Aug. 12, 2018.
|
6 |
F. Samland, J. Fruth, M Hildebrandt, T. Hoppe, and J. Dittmann, "AR. Drone: security threat analysis and exemplary attack to track persons," Proceedings of Intelligent Robots and Computer Vision XXIX: Algorithms and Techniques, International Society for Optics and Photonics, pp. 83010G, Jan. 2012.
|
7 |
A. Shoufan, H.M. Al-Angari, M.F.A. Sheikh, and E. Damiani, "Drone Pilot Identification by Classifying Radio-Control Signals," IEEE Transactions on Information Forensics and Security, vol. 10, no. 13, pp. 2439-2447, Mar. 2018.
|
8 |
Seung-Jin Kim, Seung-Hwan Kim, and Tae-Kyung Cho, "Drone password cracking through deauthorization and Hacking Drones Image Data," Proceedings of 2017 Annual Conference of the KIEE, pp. 143-150, Nov. 2017
|
9 |
G. Trujano, B. Chan, G. Beams, and R. Rivera, Security analysis of dji phantom 3 standard, Massachusetts Institute of Technology, May 2016.
|
10 |
R. Altawy and A.M. Youssef, "Security, privacy, and safety aspects of civilian drones: A survey," ACM Transactions on Cyber-Physical Systems, vol. 1, no. 2:7, Feb. 2017.
|
11 |
Jin-Seok Song, Eun-Joon Kim, Seung-Hyun Seo, "Design of a Secure Drone Control Protocol using AllJoyn," KIISC Summer Conference, 26(1), pp.216-218, June 2016
|
12 |
A. Juels and M. Wattenberg, "A Fuzzy Commitment Scheme," Proceedings of ACM conference on Computer and Communications Security, pp. 28-36, Nov. 1999.
|
13 |
Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, Springer, Berlin, Heidelberg, pp. 523-540, 2004.
|
14 |
A. Juels and M. Sudan, "A fuzzy vault scheme," Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237-257, Feb. 2006.
DOI
|
15 |
A.B.J. Teoh and J. Kim, "Secure biometric template protection in fuzzy commitment scheme," IEICE Electronics Express vol. 4, no. 23, pp. 724-730, Apr. 2007.
DOI
|
16 |
E. Maiorana and P. Campisi, "Fuzzy commitment for function based signature template protection," IEEE Signal Processing Letters, vol. 17, no. 3, pp. 249-252, Mar. 2010.
DOI
|
17 |
M. Sandhya and M. Prasad, "Cancelable fingerprint cryptosystem using multiple spiral curves and fuzzy commitment scheme," International Journal of Pattern Recognition and Artificial Intelligence, vol. 31, no. 4, Apr. 2017.
|