-
1
-
-
37749006403
-
802.11 user fingerprinting
-
J. Pang et al., "802.11 User Fingerprinting," Proc. 13th ACM MobiCom '07, 2007, pp. 99-110.
-
(2007)
Proc. 13th ACM MobiCom '07
, pp. 99-110
-
-
Pang, J.1
-
2
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik et al., "Wireless Device Identification with Radiometric Signatures," Proc. 14th ACM MobiCom '08, 2008, pp. 116-127
-
(2008)
Proc. 14th ACM MobiCom '08
, pp. 116-127
-
-
Brik, V.1
-
3
-
-
51249120889
-
A physical-layer technique to enhance authentication for mobile terminals
-
May
-
L. Xiao et al., "A Physical-Layer Technique to Enhance Authentication for Mobile Terminals," IEEE ICC, May 2008, pp. 1520-1524
-
(2008)
IEEE ICC
, pp. 1520-1524
-
-
Xiao, L.1
-
5
-
-
77952407534
-
Attacks on physical-layer identification
-
B. Danev et al., "Attacks on Physical-Layer Identification," Proc. 3rd ACM WiSec '10, 2010, pp. 89-98.
-
(2010)
Proc. 3rd ACM WiSec '10
, pp. 89-98
-
-
Danev, B.1
-
6
-
-
60349083720
-
On fast and accurate detection of unauthorized wireless access points using clock skews
-
S. Jana and S. K. Kasera, "On Fast and Accurate Detection of Unauthorized Wireless Access Points using Clock Skews," Proc. 14th ACM MobiCom '08, 2008, pp. 104-115
-
(2008)
Proc. 14th ACM MobiCom '08
, pp. 104-115
-
-
Jana, S.1
Kasera, S.K.2
-
7
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
G. E. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," Proc. 44th ACM Annual Design Automation Conf. '07, 2007, pp. 9-14.
-
(2007)
Proc. 44th ACM Annual Design Automation Conf. '07
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
8
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
N. Patwari and S. K. Kasera, "Robust Location Distinction using Temporal Link Signatures," Proc. 13th ACM MobiCom '07, 2007, pp. 111-122
-
(2007)
Proc. 13th ACM MobiCom '07
, pp. 111-122
-
-
Patwari, N.1
Kasera, S.K.2
-
9
-
-
70349675562
-
Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks
-
J. Yang et al., "Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks," 28th IEEE INFOCOM, 2009, pp. 666-674
-
(2009)
28th IEEE INFOCOM
, pp. 666-674
-
-
Yang, J.1
-
10
-
-
77953297543
-
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
-
Mar.
-
K. Zeng et al., "Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks," IEEE INFOCOM '10, Mar. 2010.
-
(2010)
IEEE INFOCOM '10
-
-
Zeng, K.1
|