Secure Communication Based on Ambient Audio

IEEE Transactions on Mobile Computing - Tập 12 Số 2 - Trang 358-370 - 2013
Dominik Schürmann1, Stephan Sigg2
1Tech. Univ. Braunschweig, Braunschweig, Germany
2Inf. Syst. Archit. Sci. Res. Div., Nat. Inst. of Inf. (NII), Tokyo, Japan

Tóm tắt

Từ khóa


Tài liệu tham khảo

10.1109/26.385951

10.1109/GLOCOM.2008.ECP.356

10.1109/TAP.2004.830257

10.1007/978-3-540-74853-3_10

hamida, 2009, An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements, Proc Third Int'l Conf New Technologies Mobility and Security

10.1109/TSA.2003.811538

10.1145/1161366.1161377

10.1007/978-1-84628-984-2

10.1109/ICME.2006.262884

schneider, 1996, Applied Cryptography Protocols Algorithms and Source Code in C

10.1137/0108018

10.1145/319709.319714

10.1145/641007.641125

10.1145/1145287.1145312

wang, 2003, An Industrial Strength Audio Search Algorithm, Proc Int'l Conf Music Information Retrieval (ISMIR)

hao, 2007, On Using Fuzzy Data in Security Mechanisms

10.1109/ASPAA.2001.969559

yang, 2001, MACS: Music Audio Characteristic Sequence Indexing for Similarity Retrieval, Proc IEEE Workshop Applications of Signal Processing to Audio and Acoustics, 123, 10.1109/ASPAA.2001.969558

fenzi, 2004, Linux Security HOWTO

10.1109/BCC.2007.4430534

10.1109/TIFS.2010.2046984

10.1145/185595.185651

2010, GStreamer Documentation

10.1109/90.392384

10.1109/ISPCS.2008.4659209

2001, Advanced Encryption Standard (AES) FIPS PUBS 197

mills, 2010, Network Time Protocol Version 4: Protocol and Algorithms Specification, 10.17487/rfc5905

2008, Secure Hash Standard (SHS) FIPS PUB 180-4

dupuy, 2006, Local Clusters Trust Confidence and Proximity, 175

miao, 2009, Biometrics Based Novel Key Distribution Solution for Body Sensor Networks, Proc IEEE Ann Int'l Conf Eng in Medicine and Biology Soc (EMBC '09), 2458

10.1007/978-3-540-74853-3_18

dodis, 2004, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Proc Int'l Conf the Theory and Applications of Cryptographic Techniques (EUROCRYPT '04), 79

10.1016/j.istr.2008.10.005

varshavsky, 2009, Amigo: Proximity-Based Authentication of Mobile Devices, Int'l J Security and Networks, 4, 4, 10.1504/IJSN.2009.023422

10.1109/ISIT.2002.1023680

10.1007/3-540-45427-6_10

10.1007/978-3-540-72037-9_9

10.1109/MPRV.2004.1321032

10.1109/GLOCOM.2007.41

10.1007/978-3-540-73275-4_1

dodis, 2006, Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets, Proc 26th Ann Int'l Conf Advances in Cryptology (CRYPTO '06), 232

cano, 2005, A Review of Algorithms for Audio Fingerprinting, VLSI Signal Processing, 41, 271, 10.1007/s11265-005-4151-3

10.1016/j.patcog.2008.05.006

10.1109/ICASSP.2006.1661249

kuiper, 1962, Tests Concerning Random Points on a Circle, Proc Koinklijke Nederlandse Akademie van Wetenschappen, 63, 38

10.1109/ICASSP.2002.5744966

brown, 2011, Dieharder: A Random Number Test Suite

haitsma, 2002, A Highly Robust Audio Fingerprinting System, Proc Third Int'l Conf Music Information Retrieval

10.1109/ICASSP.2005.1415633

10.1093/biomet/52.3-4.309

10.4304/jcm.5.5.409-424

parsons, 1975, The Directory of Tunes and Musical Themes

10.1145/217279.215273

chai, 2002, Melody Retrieval on the Web, Proc ACM/SPIE Conf Multimedia Computing and Networking

10.1145/544220.544291

10.1145/226931.226934

10.1145/376929.376978

haitsma, 2001, Robust Audio Hashing for Content Identification, Proc Int'l Workshop Content-Based Multimedia Indexing (CBMI)

10.1007/978-3-540-72847-4_25

10.1109/5.18626

10.1145/872773.872780

baeza-yates, 1992, Fast and Practical Approximate String Matching, Proc Third Ann Symp Combinatorial Pattern Matching