Author:
Sigg Stephan,Schuermann Dominik,Ji Yusheng
Publisher
Springer Berlin Heidelberg
Reference30 articles.
1. Bichler, D., Stromberg, G., Huemer, M.: Innovative key generation approach to encrypt wireless communication in personal area networks. In: Proceedings of the 50th International Global Communications Conference (2007)
2. Lecture Notes in Computer Science;D. Bichler,2007
3. Brown, R.G.: Dieharder: A random number test suite (2011),
http://www.phy.duke.edu/~rgb/General/dieharder.php
4. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)
5. Dunning, J.P.: Taming the blue beast: A survey of Bluetooth based threats. IEEE Security Privacy 8(2), 20–27 (2010)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献