2006 IEEE 63rd Vehicular Technology Conference
DOI: 10.1109/vetecs.2006.1682939
|View full text |Cite
|
Sign up to set email alerts
|

Secure Pairing Architecture for Wireless Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…Providing a confidential channel between the IMD and the pro grammer is another major goal when using cryptographic solu tions. Some approaches suggest to exploit the limited coverage of the physical layer during the initialization phase [74]. Most pro posals are based on symmetric ciphers [44], and some of them incorporate a key updating mechanism (e.g, a hash chain based updating scheme [50]).…”
Section: Cryptographic Measuresmentioning
confidence: 99%
“…Providing a confidential channel between the IMD and the pro grammer is another major goal when using cryptographic solu tions. Some approaches suggest to exploit the limited coverage of the physical layer during the initialization phase [74]. Most pro posals are based on symmetric ciphers [44], and some of them incorporate a key updating mechanism (e.g, a hash chain based updating scheme [50]).…”
Section: Cryptographic Measuresmentioning
confidence: 99%