메뉴 건너뛰기




Volumn 17, Issue 5, 2010, Pages 56-62

Non-cryptographic authentication and identification in wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

CROSS-LAYER; PRACTICAL IMPLEMENTATION; SECURITY DESIGN; SECURITY SERVICES; USER AUTHENTICATION;

EID: 77958096949     PISSN: 15361284     EISSN: None     Source Type: Journal    
DOI: 10.1109/MWC.2010.5601959     Document Type: Article
Times cited : (242)

References (10)
  • 1
    • 37749006403 scopus 로고    scopus 로고
    • 802.11 user fingerprinting
    • J. Pang et al., "802.11 User Fingerprinting," Proc. 13th ACM MobiCom '07, 2007, pp. 99-110.
    • (2007) Proc. 13th ACM MobiCom '07 , pp. 99-110
    • Pang, J.1
  • 2
    • 60149092949 scopus 로고    scopus 로고
    • Wireless device identification with radiometric signatures
    • V. Brik et al., "Wireless Device Identification with Radiometric Signatures," Proc. 14th ACM MobiCom '08, 2008, pp. 116-127
    • (2008) Proc. 14th ACM MobiCom '08 , pp. 116-127
    • Brik, V.1
  • 3
    • 51249120889 scopus 로고    scopus 로고
    • A physical-layer technique to enhance authentication for mobile terminals
    • May
    • L. Xiao et al., "A Physical-Layer Technique to Enhance Authentication for Mobile Terminals," IEEE ICC, May 2008, pp. 1520-1524
    • (2008) IEEE ICC , pp. 1520-1524
    • Xiao, L.1
  • 5
    • 77952407534 scopus 로고    scopus 로고
    • Attacks on physical-layer identification
    • B. Danev et al., "Attacks on Physical-Layer Identification," Proc. 3rd ACM WiSec '10, 2010, pp. 89-98.
    • (2010) Proc. 3rd ACM WiSec '10 , pp. 89-98
    • Danev, B.1
  • 6
    • 60349083720 scopus 로고    scopus 로고
    • On fast and accurate detection of unauthorized wireless access points using clock skews
    • S. Jana and S. K. Kasera, "On Fast and Accurate Detection of Unauthorized Wireless Access Points using Clock Skews," Proc. 14th ACM MobiCom '08, 2008, pp. 104-115
    • (2008) Proc. 14th ACM MobiCom '08 , pp. 104-115
    • Jana, S.1    Kasera, S.K.2
  • 7
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • G. E. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," Proc. 44th ACM Annual Design Automation Conf. '07, 2007, pp. 9-14.
    • (2007) Proc. 44th ACM Annual Design Automation Conf. '07 , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 8
    • 37749047975 scopus 로고    scopus 로고
    • Robust location distinction using temporal link signatures
    • N. Patwari and S. K. Kasera, "Robust Location Distinction using Temporal Link Signatures," Proc. 13th ACM MobiCom '07, 2007, pp. 111-122
    • (2007) Proc. 13th ACM MobiCom '07 , pp. 111-122
    • Patwari, N.1    Kasera, S.K.2
  • 9
    • 70349675562 scopus 로고    scopus 로고
    • Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks
    • J. Yang et al., "Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks," 28th IEEE INFOCOM, 2009, pp. 666-674
    • (2009) 28th IEEE INFOCOM , pp. 666-674
    • Yang, J.1
  • 10
    • 77953297543 scopus 로고    scopus 로고
    • Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
    • Mar.
    • K. Zeng et al., "Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks," IEEE INFOCOM '10, Mar. 2010.
    • (2010) IEEE INFOCOM '10
    • Zeng, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.