-
1
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
N. Borisov, I. Goldberg, and D. Wagner, "Intercepting mobile communications: the insecurity of 802.11," in Proc. MobiCom '01: Proc. 7th Annual International Conf. Mobile Computing Networking, 2001, pp. 180-189.
-
(2001)
Proc. MobiCom '01: Proc. 7th Annual International Conf. Mobile Computing Networking
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
2
-
-
34247366075
-
Your 802.11 network has no clothes
-
A. Mishra, M. Shin, and W. A. Arbaugh, "Your 802.11 network has no clothes," IEEE Commun. Mag., pp. 44-51, 2002.
-
(2002)
IEEE Commun. Mag.
, pp. 44-51
-
-
Mishra, A.1
Shin, M.2
Arbaugh, W.A.3
-
3
-
-
0002917345
-
Unsafe at any key size: An analysis of the WEP encapsulation
-
J. Walker, "Unsafe at any key size: an analysis of the WEP encapsulation," IEEE Document 802.11-00/362, 2000.
-
(2000)
IEEE Document 802.11-00/362
-
-
Walker, J.1
-
4
-
-
48049094399
-
Detecting and localizing wireless spoofing attacks
-
Y. Chen, W. Trappe, and R. Martin, "Detecting and localizing wireless spoofing attacks," in Proc. Sensor, Mesh Ad Hoc Commun. Networks, 2007, pp. 193-202.
-
(2007)
Proc. Sensor, Mesh Ad Hoc Commun. Networks
, pp. 193-202
-
-
Chen, Y.1
Trappe, W.2
Martin, R.3
-
5
-
-
0013046241
-
An initial security analysis of the IEEE 802.1x standard
-
A. Mishra and W. A. Arbaugh, "An initial security analysis of the IEEE 802.1x standard," Tech. Rep. CS-TR-4328, University of Maryland, College Park, 2002.
-
(2002)
Tech. Rep. CS-TR-4328
-
-
Mishra, A.1
Arbaugh, W.A.2
-
6
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
J. Bellardo and S. Savage, "802.11 denial-of-service attacks: real vulnerabilities and practical solutions," in Proc. USENIX Security Symp., 2003, pp. 15-28.
-
(2003)
Proc. USENIX Security Symp.
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
7
-
-
34247324807
-
Detecting identity-based attacks in wireless networks using signalprints
-
D. Faria and D. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in Proc. ACM Workshop Wireless Security, 2006, pp. 43-52.
-
(2006)
Proc. ACM Workshop Wireless Security
, pp. 43-52
-
-
Faria, D.1
Cheriton, D.2
-
10
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in the ether: using the physical layer for wireless authentication," in Proc. IEEE International Conf. Commun. (ICC), June 2007, pp. 4646-4651.
-
(2007)
Proc. IEEE International Conf. Commun.
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
11
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol.7, pp. 2571-2579, July 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
12
-
-
51849152971
-
MIMO-assisted channel-based authentication in wireless networks
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "MIMO-assisted channel-based authentication in wireless networks," in Proc. IEEE Conf. Inform. Sciences Syst. (CISS), Mar. 2008, pp. 642-646.
-
(2008)
Proc. IEEE Conf. Inform. Sciences Syst. (CISS)
, pp. 642-646
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
13
-
-
51249120889
-
A physical-layer technique to enhance authentication for mobile terminals
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "A physical-layer technique to enhance authentication for mobile terminals," in Proc. IEEE International Conf. Commun. (ICC), May 2008, pp. 1520-1524.
-
(2008)
Proc. IEEE International Conf. Commun.
, pp. 1520-1524
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
14
-
-
39449137863
-
Physical-layer authentication
-
P. Yu, J. Baras, and B. Sadler, "Physical-layer authentication, " IEEE Trans. Inf. Forensics Security, vol.1, pp. 38-51, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.1
, pp. 38-51
-
-
Yu, P.1
Baras, J.2
Sadler, B.3
-
16
-
-
0029272202
-
WiSE design of indoor wireless systems: practical computation and optimization
-
S. J. Fortune, D. H. Gay, B. W. Kernighan, O. Landron, M. H. Wright, and R. A. Valenzuela, "WiSE design of indoor wireless systems: practical computation and optimization," IEEE Computational Science Engineering, Mar. 1995.
-
(1995)
IEEE Computational Science Engineering
-
-
Fortune, S.J.1
Gay, D.H.2
Kernighan, B.W.3
Landron, O.4
Wright, M.H.5
Valenzuela, R.A.6
-
18
-
-
0032022195
-
On limits of wireless communications in a fading environment when using multiple antennas
-
G. J. Foschini and M. J. Gans, "On limits of wireless communications in a fading environment when using multiple antennas," IEEE Wireless Personal Commun., vol.6, pp. 311-335, Mar. 1998.
-
(1998)
IEEE Wireless Personal Commun.
, vol.6
, pp. 311-335
-
-
Foschini, G.J.1
Gans, M.J.2
-
19
-
-
73149111066
-
Characterizing indoor wireless channels via ray tracing combined with stocahstic modeling
-
A. O. Kaya, L. Greenstein, and W. Trappe, "Characterizing indoor wireless channels via ray tracing combined with stocahstic modeling," IEEE Trans. Wireless Commun., to appear.
-
IEEE Trans. Wireless Commun.
-
-
Kaya, A.O.1
Greenstein, L.2
Trappe, W.3
-
20
-
-
78650758970
-
Modeling temporal channel variations in wireless environments
-
A. O. Kaya, L. Greenstein, and W. Trappe, "Modeling temporal channel variations in wireless environments," in Proc. IEEE MILCOM, 2008.
-
(2008)
Proc. IEEE MILCOM
-
-
Kaya, A.O.1
Greenstein, L.2
Trappe, W.3
-
22
-
-
73049105848
-
PHY-techniques to Improve Higher-Layer Functions in Wireless Networks
-
New Brunswick
-
L. Xiao, "PHY-techniques to improve higher-layer functions in wireless networks," Ph.D. thesis, Rutgers Univ., New Brunswick, May 2009.
-
(2009)
Rutgers Univ.
-
-
Xiao, L.1
-
23
-
-
0004245694
-
-
New York: Dover
-
M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions, with Formulas, Graphs, and Mathematical Tables. New York: Dover, 1965.
-
(1965)
Handbook of Mathematical Functions, with Formulas, Graphs, and Mathematical Tables
-
-
Abramowitz, M.1
Stegun, I.A.2
-
24
-
-
84923996598
-
-
Cambridge University Press, ch. 2.8, eq. (2.51)
-
A. Goldsmith, Wireless Communications. Cambridge University Press, 2005: ch. 2.8, eq. (2.51).
-
(2005)
Wireless Communications
-
-
Goldsmith, A.1
|