共 31 条
[3]
[Anonymous], 1997, P ALL C COMM CONTR C
[4]
[Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
[7]
Eberz Simon, 2012, Computer Security - ESORICS 2012. Proceedings 17th European Symposium on Research in Computer Security, P235, DOI 10.1007/978-3-642-33167-1_14
[10]
On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments
[J].
FIFTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM 2009),
2009,
:321-332