-
1
-
-
84940644968
-
-
C.E. Shannon, A mathematical theory of communication, Bell System Technical Journal, 27, pp. 379-423 & 623-656, July & October 1948.
-
C.E. Shannon, "A mathematical theory of communication," Bell System Technical Journal, vol. 27, pp. 379-423 & 623-656, July & October 1948.
-
-
-
-
2
-
-
34247366075
-
Your 802.11 network has no clothes
-
A. Mishra, M. Shin, and W.A. Arbaugh, "Your 802.11 network has no clothes," IEEE Communication Magazine, pp. 44-51, 2002.
-
(2002)
IEEE Communication Magazine
, pp. 44-51
-
-
Mishra, A.1
Shin, M.2
Arbaugh, W.A.3
-
4
-
-
70449472123
-
-
J. Walker, Unsafe at any key size: an analysis of the WEP encapsulation, IEEE Document 802.11-00/362,2000.
-
J. Walker, "Unsafe at any key size: an analysis of the WEP encapsulation," IEEE Document 802.11-00/362,2000.
-
-
-
-
5
-
-
70449494510
-
Scalable location-based security in wireless networks,
-
Ph.D. Thesis, Stanford University, CA
-
D. Faria, "Scalable location-based security in wireless networks," Ph.D. Thesis, Stanford University, CA, 2007.
-
(2007)
-
-
Faria, D.1
-
6
-
-
84890522850
-
Communication theory of secrecy systems
-
October
-
C.E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, October 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
7
-
-
0016562514
-
The wire-tap channel
-
A.D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
8
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
11
-
-
70449506411
-
-
X.Li, Cooperative communications for wireless information assurance: secure cooperative communications and tested development, AFRL-IFRS-TR-2007-150, Final Technical Report, June 2007.
-
X.Li, "Cooperative communications for wireless information assurance: secure cooperative communications and tested development," AFRL-IFRS-TR-2007-150, Final Technical Report, June 2007.
-
-
-
-
12
-
-
70449478010
-
Encryption key generation based on wireless channel statistics
-
Wireless Networking & Communication Group WNCG
-
T. Kamakaris, "Encryption key generation based on wireless channel statistics," Wireless Networking Symposium, Wireless Networking & Communication Group (WNCG), 2003.
-
(2003)
Wireless Networking Symposium
-
-
Kamakaris, T.1
-
13
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
September
-
R. Wilson, D. Tse, and R.A. Scholtz, "Channel identification: secret sharing using reciprocity in ultrawideband channels," IEEE Trans. on Information Forensics And Security, vol. 2, no. 3, September 2007.
-
(2007)
IEEE Trans. on Information Forensics And Security
, vol.2
, Issue.3
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
14
-
-
0034228863
-
Authentication theory and hypothesis testing
-
July
-
U.M. Maurer, "Authentication theory and hypothesis testing", IEEE Tran. Inf. Theory, vol. 46, no. 4, July 2000.
-
(2000)
IEEE Tran. Inf. Theory
, vol.46
, Issue.4
-
-
Maurer, U.M.1
-
15
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
Glasgow, Scotland, June
-
L. Xiao, L.J. Greenstein, N.B. Mandayam, and W. Trappe, "Fingerprints in the ether: using the physical layer for wireless authentication" Proc. IEEE International Conference on Communications (ICC), pp. 4646-4651, Glasgow, Scotland, June 2007.
-
(2007)
Proc. IEEE International Conference on Communications (ICC)
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
18
-
-
70449506412
-
-
http://en.wikipedia.orgwikiStudent-t-test
-
-
-
|