Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices.
Fabian MonroseMichael K. ReiterQi LiDaniel P. LoprestiChilin ShihPublished in: USENIX Security Symposium (2002)
Keyphrases
- resource constrained
- key management
- resource constraints
- sensor networks
- embedded systems
- wireless sensor networks
- rfid tags
- resource limitations
- visual sensor networks
- speech recognition
- hash functions
- multipath
- security mechanisms
- mobile devices
- smart card
- security protocols
- real time
- secret key
- sensor nodes
- simulated annealing
- low cost
- search algorithm