-
2
-
-
68849088469
-
Fragility of the robust security network: 802.11 denial of service
-
Berlin, Heidelberg: Springer-Verlag
-
M. Eian, "Fragility of the robust security network: 802.11 denial of service," in Proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS '09. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 400-416.
-
(2009)
Proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS ' 09
, pp. 400-416
-
-
Eian, M.1
-
5
-
-
38549124508
-
Fingerprints in the Ether: Using the physical layer for wireless authentication
-
L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Fingerprints in the Ether: Using the physical layer for wireless authentication," in IEEE International Conference on Communications, ICC, 2007, pp. 4646-4651.
-
(2007)
IEEE International Conference on Communications, ICC
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
6
-
-
51249120889
-
A physical-layer technique to enhance authentication for mobile terminals
-
May
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "A Physical-Layer Technique to Enhance Authentication for Mobile Terminals," in IEEE International Conference on Communications, ICC, May 2008, pp. 1520-1524.
-
(2008)
IEEE International Conference on Communications, ICC
, pp. 1520-1524
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
7
-
-
51849152971
-
MIMOassisted channel-based authentication in wireless networks
-
L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "MIMOassisted channel-based authentication in wireless networks," in 42nd Annual Conference on Information Sciences and Systems, CISS, 2008, pp. 642-646.
-
(2008)
42nd Annual Conference on Information Sciences and Systems, CISS
, pp. 642-646
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
8
-
-
51349133236
-
Detecting 802.11 MAC layer spoofing using received signal strength
-
Sheng, Yong and Tan, K. and Chen, Guanling and Kotz, D. and Campbell, A, "Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength," in The 27th Conference on Computer Communications INFOCOM, 2008, pp. 1768-1776.
-
(2008)
The 27th Conference on Computer Communications INFOCOM
, pp. 1768-1776
-
-
Yong, S.1
Tan, K.2
Guanling, C.3
Kotz, D.4
Campbell, A.5
-
9
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
July
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2571-2579, July 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
10
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures," in Proceedings of the 14th ACM international conference on Mobile computing and networking MobiCom '08, 2008, pp. 116-127.
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking MobiCom '08
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
11
-
-
70349675562
-
Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks
-
J. Yang, Y. Chen, W. Trappe, and J. Cheng, "Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks," in The 28th Conference on Computer Communications INFO-COM, 2009, pp. 666-674.
-
(2009)
The 28th Conference on Computer Communications INFO-COM
, pp. 666-674
-
-
Yang, J.1
Chen, Y.2
Trappe, W.3
Cheng, J.4
-
13
-
-
60149103674
-
Advancing wireless link signatures for location distinction
-
Zhang, Junxing and Firooz, Mohammad H. and Patwari, Neal and Kasera, Sneha K. , "Advancing wireless link signatures for location distinction," in Proceedings of the 14th ACM international conference on Mobile computing and networking MobiCom, 2008, pp. 26-37.
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking MobiCom
, pp. 26-37
-
-
Zhang, J.1
Firooz, M.H.2
Patwari, N.3
Kasera, S.K.4
-
14
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: extracting a secret key from an unauthenticated wireless channel," in Proceedings of the 14th ACM international conference on Mobile computing and networking MobiCom 2008, 2008, pp. 128-139.
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking MobiCom 2008
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
15
-
-
36348950365
-
Detecting spoofing and anomalous traffic in wireless networks via forge-resistant relationships
-
December
-
Q. Li and W. Trappe, "Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships," IEEE Transactions on Information Foresics and Security, vol. 2, no. 4, pp. 793-808, December 2007.
-
(2007)
IEEE Transactions on Information Foresics and Security
, vol.2
, Issue.4
, pp. 793-808
-
-
Li, Q.1
Trappe, W.2
-
16
-
-
77958096949
-
Non-cryptographic authentication and identification in wireless networks
-
October
-
K. Zeng, K. Govindan, and P. Mohapatra, "Non-cryptographic authentication and identification in wireless networks," IEEE Wireless Communications, vol. 17, no. 5, pp. 56 -62, October 2010.
-
(2010)
IEEE Wireless Communications
, vol.17
, Issue.5
, pp. 56-62
-
-
Zeng, K.1
Govindan, K.2
Mohapatra, P.3
-
18
-
-
37749006403
-
802.11 user fingerprinting
-
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, "802.11 user fingerprinting," in Proceedings of the 13th annual ACM international conference on Mobile computing and networking Mobi- Com '07, 2007, pp. 99-110.
-
(2007)
Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking Mobi- Com '07
, pp. 99-110
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
19
-
-
48149099022
-
Detecting impersonation attacks in future wireless and mobile networks
-
M. Barbeau, J. Hall, and E. Kranakis, "Detecting impersonation attacks in future wireless and mobile networks," in Proceedings of MADNES'05 - Workshop on Secure Mobile Ad-hoc Networks and Sensors, 2005, pp. 80-95.
-
(2005)
Proceedings of MADNES'05 - Workshop on Secure Mobile Ad-hoc Networks and Sensors
, pp. 80-95
-
-
Barbeau, M.1
Hall, J.2
Kranakis, E.3
-
20
-
-
77952407534
-
Attacks on physical-layer identification
-
B. Danev, H. Luecken, S. Capkun, and K. El Defrawy, "Attacks on physical-layer identification," in Proceedings of the third ACM conference on Wireless network security, WiSec '10, 2010, pp. 89-98.
-
(2010)
Proceedings of the Third ACM Conference on Wireless Network Security, WiSec '10
, pp. 89-98
-
-
Danev, B.1
Luecken, H.2
Capkun, S.3
El Defrawy, K.4
-
22
-
-
70449560388
-
Detecting spoofing attacks in mobile wireless environments
-
J. Yang, Y. Chen, and W. Trappe, "Detecting spoofing attacks in mobile wireless environments," in Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON'09, 2009, pp. 189-197.
-
(2009)
Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON'09
, pp. 189-197
-
-
Yang, J.1
Chen, Y.2
Trappe, W.3
-
24
-
-
79960866123
-
-
[Online]
-
"TCPDUMP/LIBPCAP Public repository." [Online]. Available: http://www.tcpdump.org/
-
-
-
|