-
1
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
Sept
-
N. Borisov, I. Goldberg, and D. Wagner, "Intercepting mobile communications: the insecurity of 802.11," in Proc. ACM Annual International Conference on Mobile Computing and Networking (MOBICOM), pp. 180-189, Sept. 2002.
-
(2002)
Proc. ACM Annual International Conference on Mobile Computing and Networking (MOBICOM)
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
2
-
-
34247366075
-
Your 802.11 network has no clothes
-
Dec
-
A. Mishra, M. Shin, and W. A. Arbaugh, "Your 802.11 network has no clothes," IEEE Commun. Mag., vol. 9, pp. 44-51, Dec. 2002.
-
(2002)
IEEE Commun. Mag
, vol.9
, pp. 44-51
-
-
Mishra, A.1
Shin, M.2
Arbaugh, W.A.3
-
3
-
-
0004104571
-
Unsafe at any key size: An analysis of the WEP encapsulation
-
IEEE Document 802.11-00/362
-
J. Walker, "Unsafe at any key size: an analysis of the WEP encapsulation," IEEE Document 802.11-00/362, 2000.
-
(2000)
-
-
Walker, J.1
-
4
-
-
48149085594
-
-
A. J. Viterbi, CDMA: Principles of Spread Spectrum Communication. Redwood City, CA: Addison-Wesley Wireless Communications Series, 1995.
-
A. J. Viterbi, CDMA: Principles of Spread Spectrum Communication. Redwood City, CA: Addison-Wesley Wireless Communications Series, 1995.
-
-
-
-
5
-
-
0032022195
-
On limits of wireless communications in a fading environment when using multiple antennas
-
Mar
-
G. J. Foschini and M. J. Gans, "On limits of wireless communications in a fading environment when using multiple antennas," IEEE Wireless Personal Commun., vol. 6, pp. 311-335, Mar. 1998.
-
(1998)
IEEE Wireless Personal Commun
, vol.6
, pp. 311-335
-
-
Foschini, G.J.1
Gans, M.J.2
-
6
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in UWB channels
-
Sept
-
R. Wilson, D. Tse, and R. Scholtz, "Channel identification: secret sharing using reciprocity in UWB channels," IEEE Trans. Inform. Theory, vol. 2, pp. 364-375, Sept. 2007.
-
(2007)
IEEE Trans. Inform. Theory
, vol.2
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.3
-
7
-
-
0347337828
-
Secure space-time communication
-
Dec
-
A. E. Hero, "Secure space-time communication," IEEE Trans. Inform. Theory, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, pp. 3235-3249
-
-
Hero, A.E.1
-
9
-
-
0013046241
-
An initial security analysis of the IEEE 802.1x standard,
-
Tech. Rep. CS-TR-4328, University of Maryland, College Park
-
A. Mishra and W A. Arbaugh, "An initial security analysis of the IEEE 802.1x standard," Tech. Rep. CS-TR-4328, University of Maryland, College Park, 2002.
-
(2002)
-
-
Mishra, A.1
Arbaugh, W.A.2
-
10
-
-
42549087740
-
A passive approach to wireless NIC identification
-
June
-
C. Corbett, R. Beyah, and J. Copeland, "A passive approach to wireless NIC identification," in Proc. IEEE International Conference on Communications, vol. 5, pp. 2329-2334, June 2006.
-
(2006)
Proc. IEEE International Conference on Communications
, vol.5
, pp. 2329-2334
-
-
Corbett, C.1
Beyah, R.2
Copeland, J.3
-
11
-
-
1542747838
-
Detection of transient in radio frequency fingerprinting using signal phase
-
ACTA Press, pp, July
-
J. Hall, M. Barbeau, and E. Kranakis, "Detection of transient in radio frequency fingerprinting using signal phase," in Wireless and Optical Communications. ACTA Press, pp. 13-18, July 2003.
-
(2003)
Wireless and Optical Communications
, pp. 13-18
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
12
-
-
24344507334
-
Remote physical device finger-printing
-
Apr./June
-
T. Kohno, A. Broido, and C. Claffy, "Remote physical device finger-printing," IEEE Trans. Dependable and Secure Computing, vol. 2, pp. 93-108, Apr./June 2005.
-
(2005)
IEEE Trans. Dependable and Secure Computing
, vol.2
, pp. 93-108
-
-
Kohno, T.1
Broido, A.2
Claffy, C.3
-
13
-
-
33847300575
-
Short paper: A signal fingerprinting paradigm for general physical layer and sensor network security and assurance
-
Sept
-
T. Daniels, M. Mina, and S. F. Russell, "Short paper: a signal fingerprinting paradigm for general physical layer and sensor network security and assurance," in Proc. IEEE/Create Net Secure Commum., pp. 219-221, Sept. 2005.
-
(2005)
Proc. IEEE/Create Net Secure Commum
, pp. 219-221
-
-
Daniels, T.1
Mina, M.2
Russell, S.F.3
-
14
-
-
34247324807
-
Detecting identity-based attacks in wireless networks using signalprints
-
Los Angeles, CA, Sept
-
D. Faria and D. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in Proc. ACM Workshop on Wireless Security, pp. 43-52, Los Angeles, CA, Sept. 2006.
-
(2006)
Proc. ACM Workshop on Wireless Security
, pp. 43-52
-
-
Faria, D.1
Cheriton, D.2
-
16
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
Glasgow, Scotland, June
-
L. Xiao, L. Greenstein, N. Mandayam, and W Trappe, "Fingerprints in the ether: Using the physical layer for wireless authentication," in Proc. IEEE International Conference on Communications, Glasgow, Scotland, June 2007.
-
(2007)
Proc. IEEE International Conference on Communications
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
20
-
-
77955326733
-
Characterization of randomly time-variant linear channels
-
Dec
-
P.A. Bello, "Characterization of randomly time-variant linear channels," IEEE Trans. Commun. Syst., vol. CS-11, pp. 360-393, Dec. 1963.
-
(1963)
IEEE Trans. Commun. Syst
, vol.CS-11
, pp. 360-393
-
-
Bello, P.A.1
-
21
-
-
0033101351
-
A model for the multipath delay profile of fixed wireless channels
-
V. Erceg, D. G. Michelson, S. S. Ghassemzadeh, L. J. Greenstein, A. J. Rustako, P. B. Guerlain, M. K. Dennison, R. S. Roman, D. J. Barnickel, S. C. Wang, and R.R. Miller, "A model for the multipath delay profile of fixed wireless channels," IEEE J. Select. Areas Commun., vol. 17, pp. 399-410, 1999.
-
(1999)
IEEE J. Select. Areas Commun
, vol.17
, pp. 399-410
-
-
Erceg, V.1
Michelson, D.G.2
Ghassemzadeh, S.S.3
Greenstein, L.J.4
Rustako, A.J.5
Guerlain, P.B.6
Dennison, M.K.7
Roman, R.S.8
Barnickel, D.J.9
Wang, S.C.10
Miller, R.R.11
-
22
-
-
0001083776
-
The effect of frequency selective fading on the binary error probability of incoherent and differentially coherent matched filter receivers
-
June
-
P. A. Bello and B. D. Nelin, "The effect of frequency selective fading on the binary error probability of incoherent and differentially coherent matched filter receivers," IEEE Trans. Commun. Syst., vol. CS-11, pp. 170-186, June 1963.
-
(1963)
IEEE Trans. Commun. Syst
, vol.CS-11
, pp. 170-186
-
-
Bello, P.A.1
Nelin, B.D.2
-
23
-
-
0004245694
-
-
New York: Courier Dover Publications
-
M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions, With Formulas, Graphs, and Mathematical Tables. New York: Courier Dover Publications, 1965.
-
(1965)
Handbook of Mathematical Functions, With Formulas, Graphs, and Mathematical Tables
-
-
Abramowitz, M.1
Stegun, I.A.2
-
24
-
-
0029272202
-
WiSE design of indoor wireless systems: Practical computation and optimization
-
Mar
-
S. J. Fortune, D. H. Gay, B. W. Kernighan, O. Landron, M. H. Wright, and R. A. Valenzuela, "WiSE design of indoor wireless systems: Practical computation and optimization," IEEE Computational Science and Engineering, vol. 2, pp. 58-68, Mar. 1995.
-
(1995)
IEEE Computational Science and Engineering
, vol.2
, pp. 58-68
-
-
Fortune, S.J.1
Gay, D.H.2
Kernighan, B.W.3
Landron, O.4
Wright, M.H.5
Valenzuela, R.A.6
-
25
-
-
48149094788
-
Clarifications on the link budget evaluation
-
IEEE Document C802.20-05/18
-
A. Tee, "Clarifications on the link budget evaluation," IEEE Document C802.20-05/18, 2005.
-
(2005)
-
-
Tee, A.1
-
26
-
-
51249120889
-
A physical-layer technique to enhance authentication for mobile terminals
-
Beijing, China
-
L. Xiao, L. Greenstein, N. Mandayam, and W Trappe, "A physical-layer technique to enhance authentication for mobile terminals," in Proc. IEEE International Conference on Communications, Beijing, China, 2008.
-
(2008)
Proc. IEEE International Conference on Communications
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
|