咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 电气工程
    • 2 篇 计算机科学与技术...
    • 1 篇 信息与通信工程

主题

  • 2 篇 key exchange alg...
  • 1 篇 security in wire...
  • 1 篇 physical-layer s...
  • 1 篇 fading channels
  • 1 篇 neural nets
  • 1 篇 neural networks
  • 1 篇 telecommunicatio...
  • 1 篇 channel reciproc...
  • 1 篇 wireless sensor ...
  • 1 篇 channel level cr...
  • 1 篇 channel sampling
  • 1 篇 block codes
  • 1 篇 sampling methods
  • 1 篇 linear codes
  • 1 篇 wireless fading ...
  • 1 篇 channel estimati...
  • 1 篇 channel threshol...
  • 1 篇 linear block cod...
  • 1 篇 telecommunicatio...
  • 1 篇 error reconcilia...

机构

  • 1 篇 univ manitoba de...
  • 1 篇 aristotle univ t...
  • 1 篇 univ british col...

作者

  • 1 篇 schober robert
  • 1 篇 karas dimitrios ...
  • 1 篇 karagiannidis ge...
  • 1 篇 misic jelena

语言

  • 2 篇 英文
检索条件"主题词=key exchange algorithms"
2 条 记 录,以下是1-10 订阅
排序:
Channel level crossing-based security for communications over fading channels
收藏 引用
IET INFORMATION SECURITY 2013年 第3期7卷 221-229页
作者: Karas, Dimitrios S. Karagiannidis, George K. Schober, Robert Aristotle Univ Thessaloniki Dept Elect & Comp Engn GR-54124 Thessaloniki Greece Univ British Columbia Dept Elect & Comp Engn Vancouver BC V6T 1Z4 Canada
Several key exchange methods for wireless channels have been proposed in the literature. They are referred to as physical-layer security techniques and are usually based on the channel's fading characteristics and... 详细信息
来源: 评论
Traffic and energy consumption of an IEEE 802.15.4 network in the presence of authenticated, ECC Diffie-Hellman ephemeral key exchange
收藏 引用
COMPUTER NETWORKS 2008年 第11期52卷 2227-2236页
作者: Misic, Jelena Univ Manitoba Dept Comp Sci Winnipeg MB R3T 2N2 Canada
in this paper we have modeled traffic and energy consumption in a secured, power managed wireless sensor network implemented using IEEE 802.15.4 technology. The network is secured through a variant of the secure socke... 详细信息
来源: 评论