<--- Back to Details
First PageDocument Content
Cryptography / Key management / Public-key cryptography / Public key infrastructure / DiffieHellman key exchange / Key-agreement protocol / Information-theoretic security / IEEE 802.11 / RSA / Key generation / Key distribution / Secure channel
Date: 2011-08-05 21:36:39
Cryptography
Key management
Public-key cryptography
Public key infrastructure
DiffieHellman key exchange
Key-agreement protocol
Information-theoretic security
IEEE 802.11
RSA
Key generation
Key distribution
Secure channel

Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

Add to Reading List

Source URL: www.winlab.rutgers.edu

Download Document from Source Website

File Size: 306,07 KB

Share Document on Facebook

Similar Documents

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

DocID: 1xVSj - View Document

PDF Document

DocID: 1xRwQ - View Document

PDF Document

DocID: 1xu6k - View Document

PDF Document

DocID: 1x9q3 - View Document

PDF Document

DocID: 1x1dn - View Document