-
1
-
-
33748061660
-
Jamming and sensing of encrypted wireless ad hoc networks
-
Technical Report CU-CS-1005-06, University of Colorado at Boulder
-
Timothy X Brown, Jesse James, and Amita Sethi. Jamming and sensing of encrypted wireless ad hoc networks. Technical Report CU-CS-1005-06, University of Colorado at Boulder, 2006.
-
(2006)
-
-
Brown, T.X.1
James, J.2
Sethi, A.3
-
2
-
-
0018443381
-
Privacy and authentication: An introduction to cryptography
-
March
-
Whitfield Difiie and Martin E. Hellman. Privacy and authentication: An introduction to cryptography. Proceedings of the IEEE, 67(3):397-427, March 1979.
-
(1979)
Proceedings of the IEEE
, vol.67
, Issue.3
, pp. 397-427
-
-
Difiie, W.1
Hellman, M.E.2
-
5
-
-
0347023984
-
Evolution of wireless data services: IS-95 to CDMA2000
-
140-149, October
-
D. N. Knisely, S. Kumar, S. Laha, and S. Nanda. Evolution of wireless data services: IS-95 to CDMA2000. IEEE Communications Magazine, 36(10):140-149, October 1998.
-
(1998)
IEEE Communications Magazine
, vol.36
, Issue.10
-
-
Knisely, D.N.1
Kumar, S.2
Laha, S.3
Nanda, S.4
-
6
-
-
35048826237
-
An asymmetric security mechanism for navigation signals
-
May
-
Markus G. Kuhn. An asymmetric security mechanism for navigation signals. In Proceedings of the 6th Information Hiding Workshop, volume 3200, pages 239-252, May 2004.
-
(2004)
Proceedings of the 6th Information Hiding Workshop
, vol.3200
, pp. 239-252
-
-
Kuhn, M.G.1
-
7
-
-
64149093709
-
Overview of the technical basis of Qualcomm's CDMA cellular telephone system design: A view of North American TIA/EIA IS-95
-
November
-
J. S. Lee. Overview of the technical basis of Qualcomm's CDMA cellular telephone system design: a view of North American TIA/EIA IS-95. In Proc ICCS '94, volume 2, pages 353-358, November 1994.
-
(1994)
Proc ICCS '94
, vol.2
, pp. 353-358
-
-
Lee, J.S.1
-
8
-
-
33847420872
-
Physical layer built-in security analysis and enhancement of CDMA systems
-
October
-
Tontong Li, Jian Ren, Qi Ling, and Anil Jain. Physical layer built-in security analysis and enhancement of CDMA systems. In Proceedings of the Military Communications Conference, 2005. MILCOM 2005. IEEE, pages 956-962, October 2005.
-
(2005)
Proceedings of the Military Communications Conference, 2005. MILCOM 2005. IEEE
, pp. 956-962
-
-
Li, T.1
Ren, J.2
Ling, Q.3
Jain, A.4
-
9
-
-
0017959977
-
Secure communication over insecure channels
-
R. Merkle. Secure communication over insecure channels. Communications of the ACM, 21(4):294-299, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.1
-
10
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy, July
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), Rome, Italy, July 2001.
-
(2001)
Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
11
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
12
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
May
-
Alan T. Sherman and David A. McGrew. Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering, 29(5):444-458, May 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
-
13
-
-
37749013945
-
-
A. J. Viterbi. CDMA Principles of Spread Spectrum Communication. Addison-Wesley, 1995.
-
A. J. Viterbi. CDMA Principles of Spread Spectrum Communication. Addison-Wesley, 1995.
-
-
-
-
14
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
May
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of The 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), pages 46-57, May 2005.
-
(2005)
Proceedings of The 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
|