-
1
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
N. Borisov, I. Goldberg, and D. Wagner, "Intercepting mobile communications: the insecurity of 802.11," in MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking, 2001, pp. 180-189.
-
(2001)
MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
2
-
-
34247366075
-
Your 802.11 network has no clothes
-
A. Mishra, M. Shin, and W. A. Arbaugh, "Your 802.11 network has no clothes," IEEE Communications Magazine, pp. 44-51, 2002.
-
(2002)
IEEE Communications Magazine
, pp. 44-51
-
-
Mishra, A.1
Shin, M.2
Arbaugh, W.A.3
-
3
-
-
84958598390
-
Cryptoanalysis of the cellular encryption algorithm
-
D. Wagner, B. Schneier, and J. Kelsey, "Cryptoanalysis of the cellular encryption algorithm," in Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, 1997, pp. 526-537.
-
(1997)
Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
, pp. 526-537
-
-
Wagner, D.1
Schneier, B.2
Kelsey, J.3
-
4
-
-
0038187631
-
Security problems in 802.11-based networks
-
R. Housley and W. Arbaugh, "Security problems in 802.11-based networks," Commun. of the ACM, vol. 46, no. 5, pp. 31-34, 2003.
-
(2003)
Commun. of the ACM
, vol.46
, Issue.5
, pp. 31-34
-
-
Housley, R.1
Arbaugh, W.2
-
5
-
-
0037766154
-
Security flaws in 802.11 data link protocols
-
N. Cam-Winget, R. Housley, D. Wagner, and J. Walker, "Security flaws in 802.11 data link protocols," Commun, of the ACM, vol. 46, no. 5, pp. 35-39, 2003.
-
(2003)
Commun, of the ACM
, vol.46
, Issue.5
, pp. 35-39
-
-
Cam-Winget, N.1
Housley, R.2
Wagner, D.3
Walker, J.4
-
10
-
-
29044442014
-
-
A. F. Molisch, Ed, John Wiley and Sons
-
A. F. Molisch, Ed., Wireless Communications, John Wiley and Sons, 2005.
-
(2005)
Wireless Communications
-
-
-
11
-
-
23844490080
-
Propagation models for short range wireless channels with predictable path geometries
-
July
-
A. Domazetovic, L. J. Greenstein, I. Seskar, and N.B. Mandayam, "Propagation models for short range wireless channels with predictable path geometries," IEEE Trans. on COM, vol. 53, no. 7, pp. 1123-1126, July 2005.
-
(2005)
IEEE Trans. on COM
, vol.53
, Issue.7
, pp. 1123-1126
-
-
Domazetovic, A.1
Greenstein, L.J.2
Seskar, I.3
Mandayam, N.B.4
-
12
-
-
0038279754
-
Estimating the doppler spectrum of a short range fixed wireless channel
-
May
-
A. Domazetovic, L. J. Greenstein, I. Seskar, and N.B. Mandayam, "Estimating the doppler spectrum of a short range fixed wireless channel," IEEE COM Letters, vol. 7, no. 5, pp. 227-229, May 2003.
-
(2003)
IEEE COM Letters
, vol.7
, Issue.5
, pp. 227-229
-
-
Domazetovic, A.1
Greenstein, L.J.2
Seskar, I.3
Mandayam, N.B.4
-
13
-
-
34247383633
-
-
V. Erceg et. al., Channel Models for Fized Wireless Applications, IEEE 802.16 Broadband Wireless Access Working Group, July 27, 2003.
-
V. Erceg et. al., "Channel Models for Fized Wireless Applications," IEEE 802.16 Broadband Wireless Access Working Group, July 27, 2003.
-
-
-
-
14
-
-
0013046241
-
An initial security analysis of the IEEE 802.1x standard
-
Tech. Rep. CS-TR-4328, University of Maryland, College Park
-
A. Mishra and W. A. Arbaugh, "An initial security analysis of the IEEE 802.1x standard," Tech. Rep. CS-TR-4328, University of Maryland, College Park, 2002.
-
(2002)
-
-
Mishra, A.1
Arbaugh, W.A.2
-
15
-
-
0343789599
-
Single-user channel estimation and equalization
-
J. Tugnait, L. Tong, and Z. Ding, "Single-user channel estimation and equalization," IEEE Signal Processing Magazine, pp. 17-28, 2000.
-
(2000)
IEEE Signal Processing Magazine
, pp. 17-28
-
-
Tugnait, J.1
Tong, L.2
Ding, Z.3
-
16
-
-
0024717383
-
Characterization of UHF multipath radio channels in factory buildings
-
T. S. Rappaport, "Characterization of UHF multipath radio channels in factory buildings," IEEE Trans. on Antennas and Propagation, vol. 37, pp. 1058-1069, 1989.
-
(1989)
IEEE Trans. on Antennas and Propagation
, vol.37
, pp. 1058-1069
-
-
Rappaport, T.S.1
-
17
-
-
0015396645
-
Delay doppler characteristics of multipath delay spread and average excess delay for 910 MHz urban mobile radio paths
-
D. C. Cox, "Delay doppler characteristics of multipath delay spread and average excess delay for 910 MHz urban mobile radio paths," IEEE Trans. Antennas and Propagation, vol. 20, pp. 625-635, 1972.
-
(1972)
IEEE Trans. Antennas and Propagation
, vol.20
, pp. 625-635
-
-
Cox, D.C.1
-
18
-
-
0024479515
-
Propagation characteristics of microcellular mobile radio channels at 910 Mhz
-
R. J. C. Bultitude and G.K Bedal, "Propagation characteristics of microcellular mobile radio channels at 910 Mhz," IEEE J. Sel. Areas Commun., vol. 7, pp. 31-39, 1989.
-
(1989)
IEEE J. Sel. Areas Commun
, vol.7
, pp. 31-39
-
-
Bultitude, R.J.C.1
Bedal, G.K.2
-
19
-
-
4544263123
-
Impact of radio irregularity on wireless sensor networks
-
G. Zhou, T. He, S. Krishnamurthy, and J. Stankovic, "Impact of radio irregularity on wireless sensor networks," in MobiSYS '04: Proceedings of the 2nd international conference on Mobile systems, applications, and services, 2004, pp. 125-138.
-
(2004)
MobiSYS '04: Proceedings of the 2nd international conference on Mobile systems, applications, and services
, pp. 125-138
-
-
Zhou, G.1
He, T.2
Krishnamurthy, S.3
Stankovic, J.4
-
21
-
-
34247402640
-
-
Lecture notes on cryptography, MIT Summer Course, available at http://www.cs.ucsd.edu/users/mihir/papers/gb.html, 2001.
-
"Lecture notes on cryptography," MIT Summer Course, available at http://www.cs.ucsd.edu/users/mihir/papers/gb.html, 2001.
-
-
-
-
23
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. Journal, vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. Journal
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
24
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. 24, pp. 339-348, 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
26
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
28
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels .i. definitions and a completeness result
-
U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels .i. definitions and a completeness result," IEEE Trans. Inform. Theory, vol. 49, pp. 822-831, 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 822-831
-
-
Maurer, U.M.1
Wolf, S.2
-
29
-
-
0020936237
-
Quantum cryptography, or unforgeable subway tokens
-
C. H. Bennett, G. Brassard, S. Breidbart, and S. Wiesner, "Quantum cryptography, or unforgeable subway tokens," Advances in Cryptology: Crypto '82, p. 267 275, 1982.
-
(1982)
Advances in Cryptology: Crypto '82
, pp. 267-275
-
-
Bennett, C.H.1
Brassard, G.2
Breidbart, S.3
Wiesner, S.4
-
30
-
-
33750422921
-
Quantum cryptography
-
D. Wiedemann, "Quantum cryptography," Sigact News, vol. 18, pp. 48-51, 1987.
-
(1987)
Sigact News
, vol.18
, pp. 48-51
-
-
Wiedemann, D.1
-
31
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
J. Hershey, A. Hassan, and R. Yarlagadda, "Unconventional cryptographic keying variable management," IEEE Trans. on Communications, vol. 43, pp. 3-6, 1995.
-
(1995)
IEEE Trans. on Communications
, vol.43
, pp. 3-6
-
-
Hershey, J.1
Hassan, A.2
Yarlagadda, R.3
-
32
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
A. Hassan, W. Stark, J. Hershey, and S. Chennakeshu, "Cryptographic key agreement for mobile radio," Digital Signal Processing, vol. 6, pp. 207-212, 1996.
-
(1996)
Digital Signal Processing
, vol.6
, pp. 207-212
-
-
Hassan, A.1
Stark, W.2
Hershey, J.3
Chennakeshu, S.4
-
33
-
-
0033881606
-
Secure information transmission for mobile radio
-
H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," IEEE Commun. Letters, vol. 4, pp. 52-55, 2000.
-
(2000)
IEEE Commun. Letters
, vol.4
, pp. 52-55
-
-
Koorapaty, H.1
Hassan, A.2
Chennakeshu, S.3
-
34
-
-
84931425598
-
Secret communication using artificial noise
-
September
-
S. Goel R. Negi, "Secret communication using artificial noise," in IEEE Vehicular Technology Conference, September 2005, pp. 1906-1910.
-
(2005)
IEEE Vehicular Technology Conference
, pp. 1906-1910
-
-
Goel, S.1
Negi, R.2
|