-
1
-
-
0012578409
-
Distance-bounding protocols
-
S. Brands and D. Chaum. Distance-bounding protocols. In EUROCRYPT, 1993.
-
(1993)
EUROCRYPT
-
-
Brands, S.1
Chaum, D.2
-
2
-
-
4544259841
-
SECTOR: Secure tracking of node encounters in multi-hop wireless networks
-
S. Čapkun, L. Buttýan, and J.-P. Hubaux. SECTOR: secure tracking of node encounters in multi-hop wireless networks. In SASN, 2003.
-
(2003)
SASN
-
-
Čapkun, S.1
Buttýan, L.2
Hubaux, J.-P.3
-
4
-
-
33847329743
-
An RFID distance bounding protocol
-
G. Hancke and M. Kuhn. An RFID distance bounding protocol. In SecureComm, 2005.
-
(2005)
SecureComm
-
-
Hancke, G.1
Kuhn, M.2
-
7
-
-
84882715141
-
Distance bounding protocols: Authentication logic analysis and collusion attacks
-
Springer-Verlag, Series: Advances in Information Security
-
C. Meadows, R. Poovendran, D. Pavlovic, L.-W. Chang, and P. Syverson. Distance bounding protocols: Authentication logic analysis and collusion attacks. In Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Springer-Verlag, Series: Advances in Information Security, Vol.30, 2007.
-
(2007)
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
, vol.30
-
-
Meadows, C.1
Poovendran, R.2
Pavlovic, D.3
Chang, L.-W.4
Syverson, P.5
-
8
-
-
77952347546
-
Distance bounding in noisy environments
-
D. Singeĺee and B. Preneel. Distance bounding in noisy environments. In ESAS, 2007.
-
(2007)
ESAS
-
-
Singeĺee, D.1
Preneel, B.2
-
10
-
-
70349272427
-
Location privacy of distance bounding protocols
-
K. B. Rasmussen and S. Čapkun. Location privacy of distance bounding protocols. In CCS, 2008.
-
(2008)
CCS
-
-
Rasmussen, K.B.1
Čapkun, S.2
-
11
-
-
55349135872
-
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
-
Jorge Munilla and Alberto Peinado. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wireless Communications and Mobile Computing, 8(9), 2008.
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, Issue.9
-
-
Munilla, J.1
Peinado, A.2
-
12
-
-
70349940333
-
The swiss-knife RFID distance bounding protocol
-
P.J. Lee and J.H. Cheon, editors
-
C. H. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira. The swiss-knife RFID distance bounding protocol. In P.J. Lee and J.H. Cheon, editors, ICISC, 2008.
-
(2008)
ICISC
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
13
-
-
76749095501
-
RFID distance bounding protocol with mixed challenges to prevent relay attacks
-
C. H. Kim and G. Avoine. RFID distance bounding protocol with mixed challenges to prevent relay attacks. In CANS, 2009.
-
(2009)
CANS
-
-
Kim, C.H.1
Avoine, G.2
-
15
-
-
33847269759
-
Picking virtual pockets using relay attacks on contactless smartcard
-
Z. Kfir and A. Wool. Picking virtual pockets using relay attacks on contactless smartcard. In SecureComm, 2005.
-
(2005)
SecureComm
-
-
Kfir, Z.1
Wool, A.2
-
16
-
-
51749088454
-
Secure neighborhood discovery: A fundamental element for mobile ad hoc networking
-
P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Čapkun, and J.-P. Hubaux. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking. IEEE Communications Magazine, Vol.46, No.2, 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.2
-
-
Papadimitratos, P.1
Poturalski, M.2
Schaller, P.3
Lafourcade, P.4
Basin, D.5
Čapkun, S.6
Hubaux, J.-P.7
-
17
-
-
37749043207
-
SecNav: Secure broadcast localization and time synchronization in wireless networks
-
K. B. Rasmussen, S. Čapkun, and M. Cagalj. SecNav: s ecure broadcast localization and time synchronization in wireless networks. In MobiCom. ACM, 2007.
-
(2007)
MobiCom. ACM
-
-
Rasmussen, K.B.1
Čapkun, S.2
Cagalj, M.3
-
18
-
-
84876367662
-
So near and yet so far: Distance-bounding attacks in wireless networks
-
J. Clulow, G. P. Hancke, M. G. Kuhn, and T. Moore. So near and yet so far: Distance-bounding attacks in wireless networks. In ESAS, 2006.
-
(2006)
ESAS
-
-
Clulow, J.1
Hancke, G.P.2
Kuhn, M.G.3
Moore, T.4
-
19
-
-
56749181480
-
Attacks on time-of-flight distance bounding channels
-
G. P. Hancke and M. G. Kuhn. Attacks on time-of-flight distance bounding channels. In WiSec, 2008.
-
(2008)
WiSec
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
20
-
-
85032751286
-
Localization via ultra-wideband radios: A look at positioning aspects for future sensor networks
-
S. Gezici, Z. Tian, G.B. Giannakis, H. Kobayashi, A.F. Molisch, H.V. Poor, and Z. Sahinoglu. Localization via ultra-wideband radios: a look at positioning aspects for future sensor networks. Signal Processing Magazine, IEEE, 22(4), 2005.
-
(2005)
Signal Processing Magazine IEEE
, vol.22
, Issue.4
-
-
Gezici, S.1
Tian, Z.2
Giannakis, G.B.3
Kobayashi, H.4
Molisch, A.F.5
Poor, H.V.6
Sahinoglu, Z.7
-
21
-
-
77952376976
-
-
IEEE Std 802.15.4-2006 (Rev. of IEEE Std 802.15.4-2003), 2006
-
IEEE Std 802.15.4-2006 (Rev. of IEEE Std 802.15.4-2003), 2006.
-
-
-
-
22
-
-
77952324420
-
-
IEEE Std 802.15.4a-2007 (Amd. to IEEE Std 802.15.4-2006)
-
IEEE Std 802.15.4a-2007 (Amd. to IEEE Std 802.15.4-2006).
-
-
-
-
23
-
-
33947309703
-
Secure localization and authentication in ultra-wideband sensor networks
-
Y. Zhang, W. Liu, Y. Fang, and D. Wu. Secure localization and authentication in ultra-wideband sensor networks. IEEE J. Sel. Areas Commun., 24(4), 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.4
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
-
25
-
-
56749134314
-
An energy detection receiver robust to multi-user interference fo r IEEE 802.15.4a networks
-
M. Flury, R. Merz, and J.-Y. Le Boudec. An energy detection receiver robust to multi-user interference fo r IEEE 802.15.4a networks. In ICUWB, 2008.
-
ICUWB 2008
-
-
Flury, M.1
Merz, R.2
Le Boudec, J.-Y.3
-
27
-
-
34548858681
-
A 0.65-to-1.4nJ/burst 3-to-10GHz UWB digital TX in 90nm CMOS for IEEE 802.15.4a
-
J. Ryckaert, G. Van der Plas, V. De Heyn, C. Desset , G. Vanwijnsberghe, B. Van Poucke, and J. Craninckx. A 0.65-to-1.4nJ/burst 3-to-10GHz UWB digital TX in 90nm CMOS for IEEE 802.15.4a. ISSCC, 2007.
-
(2007)
ISSCC
-
-
Ryckaert, J.1
Plas Der G.Van2
De Heyn, V.3
Desset, C.4
Vanwijnsberghe, G.5
Van Poucke, B.6
Craninckx, J.7
-
28
-
-
77952338051
-
-
IEEE 802.15.4a channel model - final report 2004
-
IEEE 802.15.4a channel model - final report, 2004.
-
-
-
-
29
-
-
14244260660
-
Robust noncoherent receiver exploiting UWB channel properties
-
M. Weisenhorn and W. Hirt. Robust noncoherent receiver exploiting UWB channel properties. In Join t UWBST & IWUWBS, 2004.
-
(2004)
Join T UWBST & IWUWBS
-
-
Weisenhorn, M.1
Hirt, W.2
-
30
-
-
0141470711
-
The effects of timing jitter on the performance of impulse radio
-
W.M. Lovelace and J.K. Townsend. The effects of timing jitter on the performance of impulse radio. In UWBST, 2002.
-
(2002)
UWBST
-
-
Lovelace, W.M.1
Townsend, J.K.2
-
31
-
-
77952839301
-
Robust non-coherent timing acquisition in IEEE 802.15.4a IR-UWB networks
-
M. Flury, R. Merz, and J.-Y. Le Boudec. Robust non-coherent timing acquisition in IEEE 802.15.4a IR-UWB networks. In PIMRC, 2009.
-
(2009)
PIMRC
-
-
Flury, M.1
Merz, R.2
Le Boudec, J.-Y.3
-
32
-
-
14244260662
-
An impul se radio asynchronous transceiver for high data rates
-
S. Paquelet, L.-M. Aubert, and B. Uguen. An impul se radio asynchronous transceiver for high data rates. IWUWB, 2004.
-
(2004)
IWUWB
-
-
Paquelet, S.1
Aubert, L.-M.2
Uguen, B.3
-
33
-
-
0029391728
-
Modulation techniques for high-speed wireless indoor systems using narrowbeam antennas
-
P. F. Driessen and L. J. Greenstein. Modulation techniques for high-speed wireless indoor systems using narrowbeam antennas. IEEE Trans. Commun. , 1995.
-
(1995)
IEEE Trans. Commun.
-
-
Driessen, P.F.1
Greenstein, L.J.2
-
34
-
-
34547315697
-
MLSE post-detection f or ISI mitigation and synchronization in UWB low complexity receivers
-
F. Trösch and A. Wittneben. MLSE post-detection f or ISI mitigation and synchronization in UWB low complexity receivers. In VTC, 2007.
-
(2007)
VTC
-
-
Trösch, F.1
Wittneben, A.2
-
35
-
-
77952332017
-
-
http://www.realtechnews.com/posts/1366.
-
-
-
|