메뉴 건너뛰기




Volumn , Issue , 2009, Pages 967-971

On channel-based user authentication for mobile terminals

Author keywords

[No Author keywords available]

Indexed keywords

BINARY HYPOTHESIS TESTING; CHANNEL FREQUENCY RESPONSE; CURRENT TRANSMISSION; HYPOTHESIS TESTING; LEGITIMATE USERS; MOBILE TERMINAL; MULTI CARRIER SYSTEMS; PHYSICAL LAYERS; RESIDUAL TESTING; SINGLE CARRIER; SPATIAL LOCATION; TIME-DOMAIN APPROACH; USER AUTHENTICATION; WIRELESS CHANNEL; WIRELESS SECURITY;

EID: 77953862278     PISSN: 10586393     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSSC.2009.5470026     Document Type: Conference Paper
Times cited : (3)

References (13)
  • 1
    • 31344448046 scopus 로고    scopus 로고
    • Wireless network security and interworking
    • Feb.
    • M. Shin, J. Ma, A. Mishra and W.A. Arbaugh, "Wireless network security and interworking," Proc. IEEE, vol. 94, pp. 455-466, Feb. 2006.
    • (2006) Proc. IEEE , vol.94 , pp. 455-466
    • Shin, M.1    Ma, J.2    Mishra, A.3    Arbaugh, W.A.4
  • 2
    • 38549124508 scopus 로고    scopus 로고
    • Fingerprints in the ether: Using the physical layer for wireless authentication
    • Glasgow, Scotland, June
    • L. Xiao, L. Greenstein, N. Mandayam and W. Trappe, "Fingerprints in the ether: using the physical layer for wireless authentication," in Proc. IEEE Intern. Conf. Commun. 2007, pp. 4646-4651, Glasgow, Scotland, June 2007.
    • (2007) Proc. IEEE Intern. Conf. Commun. 2007 , pp. 4646-4651
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 3
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in time-variant channels
    • July
    • L. Xiao, L.J. Greenstein, N.B. Mandayam and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, pp. 2571-2579, July 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.J.2    Mandayam, N.B.3    Trappe, W.4
  • 4
    • 51249120889 scopus 로고    scopus 로고
    • A physical-layer technique to enhance authentication for mobile terminals
    • Beijing, China, May
    • L. Xiao, L. Greenstein, N. Mandayam and W. Trappe, "A physical-layer technique to enhance authentication for mobile terminals," in Proc. IEEE Intern. Conf. Commun. 2008, pp. 1520-1524, Beijing, China, May 2008.
    • (2008) Proc. IEEE Intern. Conf. Commun. 2008 , pp. 1520-1524
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 6
    • 34247324807 scopus 로고    scopus 로고
    • Detecting identity-based attacks in wireless networks using signalprints
    • Sept.
    • D. Faria and D. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in Proc. 5th ACM Workshop Wireless Security (WiSe '06), pp. 43-52, Sept. 2006.
    • (2006) Proc. 5th ACM Workshop Wireless Security (WiSe '06) , pp. 43-52
    • Faria, D.1    Cheriton, D.2
  • 9
    • 0038274158 scopus 로고    scopus 로고
    • Optimal training for block transmissions over doubly-selective fading channels
    • May
    • X. Ma, G.B. Giannakis and S. Ohno, "Optimal training for block transmissions over doubly-selective fading channels," IEEE Trans. Signal Processing, vol. 51, pp. 1351-1366, May 2003.
    • (2003) IEEE Trans. Signal Processing , vol.51 , pp. 1351-1366
    • Ma, X.1    Giannakis, G.B.2    Ohno, S.3
  • 10
    • 0038044787 scopus 로고    scopus 로고
    • Simulation models with correct statistical properties for Rayleigh fading channels
    • June
    • Y.R. Zheng and C Xiao, "Simulation models with correct statistical properties for Rayleigh fading channels," IEEE Trans. Commun., vol. 51, pp. 920-928, June 2003.
    • (2003) IEEE Trans. Commun. , vol.51 , pp. 920-928
    • Zheng, Y.R.1    Xiao, C.2
  • 12
    • 27644537515 scopus 로고    scopus 로고
    • Time-variant channel estimation using discrete prolate spheroidal sequences
    • Sept.
    • T. Zemen and F. Mecklenbräuker, "Time-variant channel estimation using discrete prolate spheroidal sequences," IEEE Trans. Signal Processing, vol. 53, no. 9, pp. 3597-3607, Sept. 2005.
    • (2005) IEEE Trans. Signal Processing , vol.53 , Issue.9 , pp. 3597-3607
    • Zemen, T.1    Mecklenbräuker, F.2
  • 13
    • 77953824492 scopus 로고    scopus 로고
    • A channel-based hypothesis testing approach to enhance user authentication
    • to be presented at the, Jan. 5-10, Bengalooru, India
    • J.K. Tugnait and H. Kim, "A channel-based hypothesis testing approach to enhance user authentication," to be presented at the 2nd Intern. Conf. Commun. Systems & Networks (COMSNETS 2010), Jan. 5-10, Bengalooru, India.
    • 2nd Intern. Conf. Commun. Systems & Networks (COMSNETS 2010)
    • Tugnait, J.K.1    Kim, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.