-
1
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Fingerprints in the Ether: Using the physical layer for wireless authentication," in IEEE International Conference on Communications ICC-07, pp. 4646-4651.
-
IEEE International Conference on Communications ICC-07
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
2
-
-
51349133236
-
Detecting 802.11 MAC layer spoofing using received signal strength
-
Y. Sheng, K. Tan, G. Chen, D. Kotz and A. Campbell, "Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength," in IEEE INFOCOM 2008, pp. 2441-2449.
-
IEEE INFOCOM 2008
, pp. 2441-2449
-
-
Sheng, Y.1
Tan, K.2
Chen, G.3
Kotz, D.4
Campbell, A.5
-
3
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, pp. 2571-2579, 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
5
-
-
73849140062
-
A trust system architecture for SCADA network security
-
G. M. Coates, K. M. Hopkinson, S. R. Graham and S. H. Kurkowski, "A Trust System Architecture for SCADA Network Security," IEEE Trans. Power Delivery, pp. 158-169.
-
IEEE Trans. Power Delivery
, pp. 158-169
-
-
Coates, G.M.1
Hopkinson, K.M.2
Graham, S.R.3
Kurkowski, S.H.4
-
6
-
-
21644434924
-
Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches
-
P. Albers and O. Camp and J. Percher and B. Jouga and R. Puttini, "Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches," in In Proceedings of the First International Workshop on Wireless Information Systems WIS-02, pp. 1-12, 2002.
-
(2002)
Proceedings of the First International Workshop on Wireless Information Systems WIS-02
, pp. 1-12
-
-
Albers, P.1
Camp, O.2
Percher, J.3
Jouga, B.4
Puttini, R.5
-
8
-
-
50149083937
-
Computing with trust: Definition, properties, and algorithms
-
J. Golbeck, "Computing with Trust: Definition, Properties, and Algorithms," in Securecomm and Workshops-Security and Privacy for Emerging Areas in Communications Networks, pp. 1-7, 2006.
-
(2006)
Securecomm and Workshops-security and Privacy for Emerging Areas in Communications Networks
, pp. 1-7
-
-
Golbeck, J.1
-
10
-
-
79952564784
-
Mobility reduces uncertainty in MANETs, in IEEE international conference on computer communications
-
F. Li and J. Wu, "Mobility Reduces Uncertainty in MANETs, in IEEE International Conference on Computer Communications," in INFO-COM07.
-
INFO-COM07
-
-
Li, F.1
Wu, J.2
-
11
-
-
33751024093
-
Information trustworthiness evaluation based on trust combination
-
Applied Computing 2006 - The 21st Annual ACM Symposium on Applied Computing - Proceedings of the 2006 ACM Symposium on Applied Computing
-
Y. Zuo and B. Panda, "Information trustworthiness evaluation based on trust combination," in SAC '06: Proceedings of the 2006 ACM symposium on Applied computing, pp. 1880-1885, 2006. (Pubitemid 44759112)
-
(2006)
Proceedings of the ACM Symposium on Applied Computing
, vol.2
, pp. 1880-1885
-
-
Zuo, Y.1
Panda, B.2
-
12
-
-
79551638644
-
Provenance based information trustworthiness evaluation in multi-hop networks
-
X. Wang, K. Govindan, P. Mohapatra, "Provenance Based Information Trustworthiness Evaluation in Multi-hop Networks," in Globecom, 2010.
-
(2010)
Globecom
-
-
Wang, X.1
Govindan, K.2
Mohapatra, P.3
-
13
-
-
70249102120
-
Malicious node detection in wireless sensor networks using weighted trust evaluation
-
I. M. Atakli, H. Hu, Y. Chen, W. S. Ku and Z. Su, "Malicious node detection in wireless sensor networks using weighted trust evaluation," in SpringSim '08: Proceedings of the 2008 Spring simulation multiconference, pp. 836-843, 2008.
-
(2008)
SpringSim '08: Proceedings of the 2008 Spring Simulation Multiconference
, pp. 836-843
-
-
Atakli, I.M.1
Hu, H.2
Chen, Y.3
Ku, W.S.4
Su, Z.5
|