-
1
-
-
60149102635
-
Agilent 802.11a/g Manufacturing Test Application Note : A Guide to Getting Started
-
Agilent Technologies
-
Agilent Technologies. Agilent 802.11a/g Manufacturing Test Application Note : A Guide to Getting Started. Application note 1308-3.
-
Application note 1308-3
-
-
-
2
-
-
84948074711
-
Making 802.11g transmitter measurements
-
Agilent Technologies
-
Agilent Technologies. Making 802.11g transmitter measurements. Application note 1380-4.
-
Application note 1380-4
-
-
-
3
-
-
60149083124
-
RF Testing of WLAN products
-
Agilent Technologies
-
Agilent Technologies. RF Testing of WLAN products. Application note 1380-1.
-
Application note 1380-1
-
-
-
4
-
-
60149108331
-
Testing and Troubleshooting Digital RF Communications Transmitter Designs
-
Agilent Technologies
-
Agilent Technologies. Testing and Troubleshooting Digital RF Communications Transmitter Designs. Application note 1313.
-
Application note 1313
-
-
-
5
-
-
48149099022
-
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
-
M. Barbeau, J. Hall, and E. Kranakis. Detecting Impersonation Attacks in Future Wireless and Mobile Networks. MADNES, 2006.
-
(2006)
MADNES
-
-
Barbeau, M.1
Hall, J.2
Kranakis, E.3
-
6
-
-
0004283194
-
-
Artech House, See entry on Target Recongnition and Identification
-
David K. Barton and Sergey A. Leonov. Radar Technology Encyclopedia. Artech House, 1998. See entry on Target Recongnition and Identification.
-
(1998)
Radar Technology Encyclopedia
-
-
Barton, D.K.1
Leonov, S.A.2
-
9
-
-
0029462943
-
Novel identification of intercepted signals from unknown radio transmitters
-
H.C. Choe, C.E. Poole, A.M. Yu, and H.H. Szu. Novel identification of intercepted signals from unknown radio transmitters. SPIE, 2491:504, 2003.
-
(2003)
SPIE
, vol.2491
, pp. 504
-
-
Choe, H.C.1
Poole, C.E.2
Yu, A.M.3
Szu, H.H.4
-
10
-
-
34247324807
-
Detecting identity-based attacks in wireless networks using signalprints
-
D.B. Faria and D.R. Cheriton. Detecting identity-based attacks in wireless networks using signalprints. ACM WiSe, pages 43-52, 2006.
-
(2006)
ACM WiSe
, pp. 43-52
-
-
Faria, D.B.1
Cheriton, D.R.2
-
11
-
-
85018108881
-
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Van Randwyk, and D. Sicker. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. Usenix Security Symposium, 2006.
-
(2006)
Usenix Security Symposium
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Van Randwyk, J.5
Sicker, D.6
-
12
-
-
85180626613
-
Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach
-
R. Gerdes, T. Daniels, M. Mina, and S. Russell. Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach. NDSS, 2006.
-
(2006)
NDSS
-
-
Gerdes, R.1
Daniels, T.2
Mina, M.3
Russell, S.4
-
17
-
-
0012785420
-
IEEE Std 802.11a
-
IEEE Standards Association
-
IEEE Standards Association. IEEE Std 802.11a. http://standards.ieee.org/ getieee802/download/802.11a-1999.pdf.
-
-
-
-
18
-
-
84868868850
-
IEEE Std 802.11b
-
IEEE Standards Association
-
IEEE Standards Association. IEEE Std 802.11b. http://standards.ieee.org/ getieee802/download/802.11b-1999.pdf.
-
-
-
-
19
-
-
24344507334
-
Remote physical device fingerprinting
-
T. Kohno, A. Broido, and KC Claffy. Remote physical device fingerprinting. Dependable and Secure Computing, 2(2):93-108, 2005.
-
(2005)
Dependable and Secure Computing
, vol.2
, Issue.2
, pp. 93-108
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
20
-
-
84979563757
-
Specific emitter identification (SEI) and classical parameter fusion technology
-
L.E. Langley. Specific emitter identification (SEI) and classical parameter fusion technology. WESCON, 1993.
-
(1993)
WESCON
-
-
Langley, L.E.1
-
21
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
Z. Li, W. Xu, R. Miller, and W. Trappe. Securing wireless systems via lower layer enforcements. Proceedings of the 5th A CM workshop on Wireless security, pages 33-42, 2006.
-
(2006)
Proceedings of the 5th A CM workshop on Wireless security
, pp. 33-42
-
-
Li, Z.1
Xu, W.2
Miller, R.3
Trappe, W.4
-
24
-
-
60149098160
-
-
ORBIT wireless research laboratory. WINLAB, Rutgers University, http://www.orbit-lab.org/.
-
ORBIT wireless research laboratory. WINLAB, Rutgers University, http://www.orbit-lab.org/.
-
-
-
-
25
-
-
37749006403
-
-
Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, and David Wetherall. 802.11 user fingerprinting. In MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 99-110, New York, NY, USA, 2007. ACM.
-
Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, and David Wetherall. 802.11 user fingerprinting. In MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 99-110, New York, NY, USA, 2007. ACM.
-
-
-
-
26
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
N. Patwari and S.K. Kasera. Robust location distinction using temporal link signatures. ACM MOBICOM, pages 111-122, 2007.
-
(2007)
ACM MOBICOM
, pp. 111-122
-
-
Patwari, N.1
Kasera, S.K.2
-
28
-
-
51349157157
-
Implications of Radio Fingerprinting on the Security of Sensor Networks
-
K.B. Rasmussen and S. Capkun. Implications of Radio Fingerprinting on the Security of Sensor Networks. Proceedings of IEEE SecureComm, 2007.
-
(2007)
Proceedings of IEEE SecureComm
-
-
Rasmussen, K.B.1
Capkun, S.2
-
29
-
-
33846997176
-
Electromagnetic Signatures of WLAN Cards and Network Security
-
K.A. Remley, C.A. Grosvenor, R.T. Johnk, D.R. Novotny, P.D. Hale, M.D. McKinley, A. Karygiannis, and E. Antonakakis. Electromagnetic Signatures of WLAN Cards and Network Security. ISSPIT, 2005.
-
(2005)
ISSPIT
-
-
Remley, K.A.1
Grosvenor, C.A.2
Johnk, R.T.3
Novotny, D.R.4
Hale, P.D.5
McKinley, M.D.6
Karygiannis, A.7
Antonakakis, E.8
-
30
-
-
1542487484
-
Cellular security: Better, but foes still lurk
-
M.J. Riezenman. Cellular security: better, but foes still lurk. Spectrum, IEEE, 2000.
-
(2000)
Spectrum, IEEE
-
-
Riezenman, M.J.1
-
31
-
-
0038343934
-
Information fusion in biometrics
-
A. Ross and A. Jain. Information fusion in biometrics. Pattern Recognition Letters, 24(13):2115-2125, 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.13
, pp. 2115-2125
-
-
Ross, A.1
Jain, A.2
-
32
-
-
60149110675
-
-
89600S series VXI-based Vector Signal Analyzer. Agilent technologies
-
89600S series VXI-based Vector Signal Analyzer. Agilent technologies.
-
-
-
-
34
-
-
26444609828
-
Capacity and Examples of Template-Protecting Biometrie Authentication Systems
-
P. Tuyls and J. Goseling. Capacity and Examples of Template-Protecting Biometrie Authentication Systems. ECCV, 2004.
-
(2004)
ECCV
-
-
Tuyls, P.1
Goseling, J.2
-
35
-
-
34249822230
-
-
O. Ureten and N. Serinken. Wireless security through RF fingerprinting. Electrical and Computer Engineering, Canadian Journal of, 32(1):27-33, 2007.
-
O. Ureten and N. Serinken. Wireless security through RF fingerprinting. Electrical and Computer Engineering, Canadian Journal of, 32(1):27-33, 2007.
-
-
-
|