-
1
-
-
31344448046
-
Wireless network security and interworking
-
Feb.
-
M. Shin, J. Ma, A. Mishra and W.A. Arbaugh, "Wireless network security and interworking," Proc. IEEE, vol. 94, pp. 455-466, Feb. 2006.
-
(2006)
Proc. IEEE
, vol.94
, pp. 455-466
-
-
Shin, M.1
Ma, J.2
Mishra, A.3
Arbaugh, W.A.4
-
2
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
Glasgow, Scotland, June
-
L. Xiao, L. Greenstein, N. Mandayam and W. Trappe, "Fingerprints in the ether: using the physical layer for wireless authentication," in Proc. IEEE Intern. Conf. Commun. 2007, pp. 4646-4651, Glasgow, Scotland, June 2007.
-
(2007)
Proc. IEEE Intern. Conf. Commun. 2007
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
3
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
July
-
L. Xiao, L.J. Greenstein, N.B. Mandayam and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, pp. 2571-2579, July 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
4
-
-
51249120889
-
A physical-layer technique to enhance authentication for mobile terminals
-
Beijing, China, May
-
L. Xiao, L. Greenstein, N. Mandayam and W. Trappe, "A physical-layer technique to enhance authentication for mobile terminals," in Proc. IEEE Intern. Conf. Commun. 2008, pp. 1520-1524, Beijing, China, May 2008.
-
(2008)
Proc. IEEE Intern. Conf. Commun. 2008
, pp. 1520-1524
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
5
-
-
34247366075
-
Your 802.11 network has no clothes
-
Dec.
-
A. Mishra, M. Shin and W.A. Arbaugh, "Your 802.11 network has no clothes," IEEE Wireless Communications Magazine, vol. 9, No. 6, pp. 44-51, Dec. 2002.
-
(2002)
IEEE Wireless Communications Magazine
, vol.9
, Issue.6
, pp. 44-51
-
-
Mishra, A.1
Shin, M.2
Arbaugh, W.A.3
-
7
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
Sept.
-
Z. Li, W. Xu, R. Miller and W. Trappe, "Securing wireless systems via lower layer enforcements," in Proc. 5th ACM Workshop Wireless Security (WiSe '06), pp. 33-42, Sept. 2006.
-
(2006)
Proc. 5th ACM Workshop Wireless Security (WiSe '06)
, pp. 33-42
-
-
Li, Z.1
Xu, W.2
Miller, R.3
Trappe, W.4
-
9
-
-
0038274158
-
Optimal training for block transmissions over doubly-selective fading channels
-
May
-
X. Ma, G.B. Giannakis and S. Ohno, "Optimal training for block transmissions over doubly-selective fading channels," IEEE Trans. Signal Processing, vol. 51, pp. 1351-1366, May 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, pp. 1351-1366
-
-
Ma, X.1
Giannakis, G.B.2
Ohno, S.3
-
10
-
-
0038044787
-
Simulation models with correct statistical properties for Rayleigh fading channels
-
June
-
Y.R. Zheng and C Xiao, "Simulation models with correct statistical properties for Rayleigh fading channels," IEEE Trans. Commun., vol. 51, pp. 920-928, June 2003.
-
(2003)
IEEE Trans. Commun.
, vol.51
, pp. 920-928
-
-
Zheng, Y.R.1
Xiao, C.2
-
12
-
-
27644537515
-
Time-variant channel estimation using discrete prolate spheroidal sequences
-
Sept.
-
T. Zemen and F. Mecklenbräuker, "Time-variant channel estimation using discrete prolate spheroidal sequences," IEEE Trans. Signal Processing, vol. 53, no. 9, pp. 3597-3607, Sept. 2005.
-
(2005)
IEEE Trans. Signal Processing
, vol.53
, Issue.9
, pp. 3597-3607
-
-
Zemen, T.1
Mecklenbräuker, F.2
-
13
-
-
77953824492
-
A channel-based hypothesis testing approach to enhance user authentication
-
to be presented at the, Jan. 5-10, Bengalooru, India
-
J.K. Tugnait and H. Kim, "A channel-based hypothesis testing approach to enhance user authentication," to be presented at the 2nd Intern. Conf. Commun. Systems & Networks (COMSNETS 2010), Jan. 5-10, Bengalooru, India.
-
2nd Intern. Conf. Commun. Systems & Networks (COMSNETS 2010)
-
-
Tugnait, J.K.1
Kim, H.2
|