-
1
-
-
0036980638
-
Your 802.11 network has no clothes
-
DEC
-
W. Arbaugh, N. Shankar, Y. Wan, and K. Zhang, "Your 802.11 network has no clothes," IEEE Trans. Wireless Communications, vol. 9, no. 4, pp. 44-51, DEC 2002.
-
(2002)
IEEE Trans. Wireless Communications
, vol.9
, Issue.4
, pp. 44-51
-
-
Arbaugh, W.1
Shankar, N.2
Wan, Y.3
Zhang, K.4
-
3
-
-
0004104571
-
Unsafe at any key size: An analysis of the wep encapsulation
-
Tech. Rep.
-
J.Walker, "Unsafe at any key size: an analysis of the wep encapsulation," IEEE Document 802.11-00-362, Tech. Rep., 2000.
-
(2000)
IEEE Document 802.11-00-362
-
-
Walker, J.1
-
4
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
-
-
Shannon, C.1
-
5
-
-
0016562514
-
The wire-tap channel
-
A. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
6
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
-
-
Csiszar, I.1
Korner, J.2
-
8
-
-
61349140043
-
Authentication over noisy channels
-
Feb.
-
L. Lai, H. Gamal, and H. Poor, "Authentication over noisy channels," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 906-916, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 906-916
-
-
Lai, L.1
Gamal, H.2
Poor, H.3
-
9
-
-
70449478010
-
Encryption key generation based on wireless channel statistics
-
T. Kamakaris, "Encryption key generation based on wireless channel statistics," in Wireless Networking Symposium, 2003.
-
Wireless Networking Symposium, 2003
-
-
Kamakaris, T.1
-
10
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
Sept.
-
R. Wilson, D. Tse, and R. Scholtz, "Channel identification: secret sharing using reciprocity in ultrawideband channels," IEEE Trans. on Information Forensics And Security, vol. 2, no. 3, pp. 364-375, Sept. 2007.
-
(2007)
IEEE Trans. on Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.3
-
11
-
-
0034228863
-
Authentication theory and hypothesis testing
-
July
-
U. Maurer, "Authentication theory and hypothesis testing," IEEE Tran. Inf. Theory, vol. 46, no. 4, pp. 1350-1356, July 2000.
-
(2000)
IEEE Tran. Inf. Theory
, vol.46
, Issue.4
, pp. 1350-1356
-
-
Maurer, U.1
-
12
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in the ether: using the physical layer for wireless authentication," in IEEE International Conference on Communications (ICC), 2007.
-
IEEE International Conference on Communications (ICC), 2007
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
13
-
-
51849152971
-
MIMO-assisted channel-based authentication in wireless networks
-
L. Xiao, L. Greenstein, N. Mandayam, and W.Trappe, "MIMO-assisted channel-based authentication in wireless networks," in Conference on Information Sciences and Systems(CISS), 2008. 42nd Annual Conference, 2008.
-
Conference on Information Sciences and Systems(CISS), 2008. 42nd Annual Conference, 2008
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
15
-
-
79951603013
-
EPSON: Enhanced physical layer security in ofdm networks
-
F. He, H. Man, D. Kivanc, and B. McNair, "EPSON: Enhanced physical layer security in ofdm networks," IEEE International Conference on Communications (ICC),2009.
-
IEEE International Conference on Communications (ICC),2009
-
-
He, F.1
Man, H.2
Kivanc, D.3
McNair, B.4
-
16
-
-
0035120843
-
Direct blind multiuser detection for cdma in multipath without channel estimation
-
January
-
X. Li and H. Fan, "Direct blind multiuser detection for cdma in multipath without channel estimation," IEEE Tran. Signal Processing, vol. 49, no. 1, p. 63, January 2001.
-
(2001)
IEEE Tran. Signal Processing
, vol.49
, Issue.1
, pp. 63
-
-
Li, X.1
Fan, H.2
|