메뉴 건너뛰기




Volumn , Issue , 2010, Pages 2205-2210

REAM: RAKE receiver enhanced authentication method

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION METHODS; COMPUTATIONAL SECURITY; EFFICIENT AUTHENTICATION; LOW SNR; PHYSICAL PARAMETERS; RAKE RECEIVER; SIMULATION RESULT; TRANSMISSION POWER; TRANSMITTER AND RECEIVER; WIRELESS CHANNEL; WIRELESS COMMUNICATIONS; WIRELESS MEDIUM;

EID: 79951607531     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2010.5680394     Document Type: Conference Paper
Times cited : (14)

References (17)
  • 3
    • 0004104571 scopus 로고    scopus 로고
    • Unsafe at any key size: An analysis of the wep encapsulation
    • Tech. Rep.
    • J.Walker, "Unsafe at any key size: an analysis of the wep encapsulation," IEEE Document 802.11-00-362, Tech. Rep., 2000.
    • (2000) IEEE Document 802.11-00-362
    • Walker, J.1
  • 4
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, 1949.
    • (1949) Bell System Technical Journal , vol.28
    • Shannon, C.1
  • 5
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.1
  • 6
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24
    • Csiszar, I.1    Korner, J.2
  • 8
    • 61349140043 scopus 로고    scopus 로고
    • Authentication over noisy channels
    • Feb.
    • L. Lai, H. Gamal, and H. Poor, "Authentication over noisy channels," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 906-916, Feb. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.2 , pp. 906-916
    • Lai, L.1    Gamal, H.2    Poor, H.3
  • 9
  • 10
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • Sept.
    • R. Wilson, D. Tse, and R. Scholtz, "Channel identification: secret sharing using reciprocity in ultrawideband channels," IEEE Trans. on Information Forensics And Security, vol. 2, no. 3, pp. 364-375, Sept. 2007.
    • (2007) IEEE Trans. on Information Forensics and Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.3
  • 11
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • July
    • U. Maurer, "Authentication theory and hypothesis testing," IEEE Tran. Inf. Theory, vol. 46, no. 4, pp. 1350-1356, July 2000.
    • (2000) IEEE Tran. Inf. Theory , vol.46 , Issue.4 , pp. 1350-1356
    • Maurer, U.1
  • 16
    • 0035120843 scopus 로고    scopus 로고
    • Direct blind multiuser detection for cdma in multipath without channel estimation
    • January
    • X. Li and H. Fan, "Direct blind multiuser detection for cdma in multipath without channel estimation," IEEE Tran. Signal Processing, vol. 49, no. 1, p. 63, January 2001.
    • (2001) IEEE Tran. Signal Processing , vol.49 , Issue.1 , pp. 63
    • Li, X.1    Fan, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.