Author:
Ismail Dhouha Kbaier Ben,Karadimas Petros,Epiphaniou Gregory,Al-Khateeb Haider
Publisher
Springer International Publishing
Reference32 articles.
1. Robshaw, M.J.B., Billet, O.: New Stream Cipher Designs—The eSTREAM Finalists, vol. 4986. Series Lecture Notes in Computer Science. Springer (2008)
2. Jha, N.K., Raghunathan, A., Potlapally, N.R., Ravi, S.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mobile Comput. 5(undefined), 128–143 (2006)
3. Mukherjee, S.A., Fakoorian, A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. CoRR, vol. abs/1011.3754 (2010) [Online]. Available: http://arxiv.org/abs/1011.3754
4. Shehadeh, Y.E.H., Hogrefe, D.: A survey on secret key generation mechanisms on the physical layer in wireless networks. Sec. Commun. Netw. 8(2), 332–341 (2015, Jan) [Online]. Available: http://dx.doi.org/10.1002/sec.973
5. Qu, Z., Wu, F., Wang, Y., Cho, W.: A security and privacy review of vanets. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996 (2015)