메뉴 건너뛰기




Volumn , Issue , 2008, Pages 642-646

MIMO-assisted channel-based authentication in wireless networks

Author keywords

Channel based authentication; MIMO; Spoofing attacks

Indexed keywords

ANNUAL CONFERENCE; AUTHENTICATION SCHEMES; CHANNEL-BASED AUTHENTICATION; DIVERSITY GAINS; EXTRA DIMENSIONS; FUTURE WIRELESS SYSTEMS; INDOOR ENVIRONMENTS; LOW OVERHEAD; MIMO; MULTIPLE ANTENNAS; MULTIPLE-INPUT MULTIPLE-OUTPUT TECHNIQUES; RAY-TRACING; RECEIVE ANTENNAS; SPOOFING ATTACKS; SYSTEM CONFIGURATIONS;

EID: 51849152971     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISS.2008.4558602     Document Type: Conference Paper
Times cited : (34)

References (8)
  • 2
    • 0013046241 scopus 로고    scopus 로고
    • An initial security analysis of the IEEE 802.1x standard,
    • Tech. Rep. CS-TR-4328, University of Maryland, College Park
    • A. Mishra and W. A. Arbaugh, "An initial security analysis of the IEEE 802.1x standard," Tech. Rep. CS-TR-4328, University of Maryland, College Park, 2002.
    • (2002)
    • Mishra, A.1    Arbaugh, W.A.2
  • 3
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • J. Bellardo and S. Savage, "802.11 denial-of-service attacks: real vulnerabilities and practical solutions," in Proc. USENIX security symposium, 2003, pp. 15-28.
    • (2003) Proc. USENIX security symposium , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 6
    • 0032022195 scopus 로고    scopus 로고
    • On limits of wireless communications in a fading environment when using multiple antennas
    • March
    • G. J. Foschini and M. J. Gans, "On limits of wireless communications in a fading environment when using multiple antennas," IEEE Wireless Personal Communications, vol. 6, pp. 311-335, March 1998.
    • (1998) IEEE Wireless Personal Communications , vol.6 , pp. 311-335
    • Foschini, G.J.1    Gans, M.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.