-
1
-
-
13844296408
-
Cognitive radio: Brain-empowered wireless communications
-
February
-
S. Haykin, "Cognitive radio: brain-empowered wireless communications," in IEEE Journal on Selected Areas in Communications, vol. 23, February 2005, pp. 201-220.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, pp. 201-220
-
-
Haykin, S.1
-
3
-
-
33846911348
-
Cognitive networks: Adaptation and learning to achieve end-to-end performance objectives
-
R. Thomas, D. Friend, L. Desilva, and A. Mackenzie, "Cognitive networks: adaptation and learning to achieve end-to-end performance objectives," IEEE Communications Magazine, vol. 44, no. 12, pp. 51-57, 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.12
, pp. 51-57
-
-
Thomas, R.1
Friend, D.2
Desilva, L.3
Mackenzie, A.4
-
5
-
-
33846641223
-
An experimental study of cross-layer security protocols in public access wireless networks
-
December
-
A. Agarwal, W. Wang, and J. McNair, "An experimental study of cross-layer security protocols in public access wireless networks," in IEEE Global Telecommunications Conference, vol. 3, December 2005.
-
(2005)
IEEE Global Telecommunications Conference
, vol.3
-
-
Agarwal, A.1
Wang, W.2
McNair, J.3
-
6
-
-
0033698551
-
Network traffic analysis and security monitoring with UniMon
-
August
-
W. Erhard, M. Gutzmann, and H. Libati, "Network traffic analysis and security monitoring with UniMon," in IEEE Conference on High Performance Switching and Routing, vol. 23, no. 8, August 2000, pp. 439-446.
-
(2000)
IEEE Conference on High Performance Switching and Routing
, vol.23
, Issue.8
, pp. 439-446
-
-
Erhard, W.1
Gutzmann, M.2
Libati, H.3
-
7
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
December
-
M. Bellare, J. Kilian, and P. Rogaway, "The security of the cipher block chaining message authentication code," in Journal of Computer and System Sciences, vol. 61, no. 3, December 2000, pp. 362-399.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
10
-
-
70349686422
-
Ofdm method and apparatus for protecting and authenticating wirelessly trasmitted digital information,
-
Patent US/0180315 Al, August 2005
-
P. R. Chitrapu, J. D. Kaewell, R. L. Olesen, S. H. Shin, J. E. Hoffmann, and R. D. Herschaft, "Ofdm method and apparatus for protecting and authenticating wirelessly trasmitted digital information," Patent US2005/0180315 Al, August 2005.
-
(2005)
-
-
Chitrapu, P.R.1
Kaewell, J.D.2
Olesen, R.L.3
Shin, S.H.4
Hoffmann, J.E.5
Herschaft, R.D.6
-
11
-
-
48649093110
-
-
D. Tseng and J. Chiu, An ofdm speech scrambler without residual intelligibility, in TENCON - IEEE Region 10 Conference, 2007, pp. l-4.
-
D. Tseng and J. Chiu, "An ofdm speech scrambler without residual intelligibility," in TENCON - IEEE Region 10 Conference, 2007, pp. l-4.
-
-
-
-
12
-
-
47949086128
-
Feature suppression for physical-layer security in ofdm systems
-
T. Yucek and H. Arslan, "Feature suppression for physical-layer security in ofdm systems," in IEEE Military Communications Conference, 2007, pp. 1-5.
-
(2007)
IEEE Military Communications Conference
, pp. 1-5
-
-
Yucek, T.1
Arslan, H.2
-
14
-
-
70349658179
-
-
Nruns, "Bt bruteforce crack tool," http://www.nruns.com/ security-tools-btcrack.php.
-
Bt bruteforce crack tool
-
-
-
15
-
-
1542438026
-
A novel family of frequency hopping sequences for multi-hop bluetooth networks
-
Nov
-
Z. Li, Y. Chang, and L. Jin, "A novel family of frequency hopping sequences for multi-hop bluetooth networks," Consumer Electronics, IEEE Transactions on, vol. 49, no. 4, pp. 1084-1089, Nov. 2003.
-
(2003)
Consumer Electronics, IEEE Transactions on
, vol.49
, Issue.4
, pp. 1084-1089
-
-
Li, Z.1
Chang, Y.2
Jin, L.3
|