Author:
Azimi-Sadjadi B.,Kiayias A.,Mercado A.,Yener B.
Reference49 articles.
1. Camtepe SA, Yener B (2004) Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. In: Samarati et al (ed) Computer Security-ESORICS, Springer-Verlag, LNCS 3193
2. Bennett CH, Brassard G, Robert, J-M: Privacy Amplification by Public Discussion. SIAM J. Comput. 17(2): pp. 210–229, 1988.
3. Dodis Y, Ostrovsky R, Reyzin L, Smith A (2006) Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: The Computing Research Repository (CoRR), abs/cs/0602007
4. Dodis Y, Ostrovsky R, Reyzin L, Smith A (2007) Fuzzy Extractors. In: Security with Noisy Data, Springer
5. Holenstein T, Renner R (2005) One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption Advances in Cryptology. In: CRYPTO, Lecture Notes in Computer Science, Springer-Verlag
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献