-
1
-
-
0020128340
-
Theory of spreadspectrum communications-A tutorial
-
May
-
R. Pickholtz, D. Schilling, and L. Milstein, "Theory of spreadspectrum communications-a tutorial, " IEEE Transactions on Communications, vol. 30, no. 5, pp. 855-884, May 1982.
-
(1982)
IEEE Transactions on Communications
, vol.30
, Issue.5
, pp. 855-884
-
-
Pickholtz, R.1
Schilling, D.2
Milstein, L.3
-
2
-
-
48749133065
-
Keyless jam resistance
-
Montreal, CA, June
-
L. Baird, W. Bahn, M. Collins, C. Carlisle, and C. Butler, "Keyless jam resistance, " in IEEE IWA'07, Montreal, CA, June 2007, pp. 143-150.
-
(2007)
IEEE IWA'07
, pp. 143-150
-
-
Baird, L.1
Bahn, W.2
Collins, M.3
Carlisle, C.4
Butler, C.5
-
3
-
-
80051908809
-
Jammingresistant key establishment using uncoordinated frequency hopping
-
Oakland, CA, May
-
M. Strasser, C. Popper, S. Capkun, and M. Cagalj, "Jammingresistant key establishment using uncoordinated frequency hopping, " in IEEE S&P'08, Oakland, CA, May 2008.
-
(2008)
IEEE S&P'08
-
-
Strasser, M.1
Popper, C.2
Capkun, S.3
Cagalj, M.4
-
4
-
-
70450192514
-
Efficient uncoordinated fhss anti-jamming communication
-
Apr.
-
M. Strasser, C. Popper, and S. Capkun, "Efficient uncoordinated fhss anti-jamming communication, " in MobiHoc'09, Apr. 2009, pp. 207-218.
-
(2009)
MobiHoc'09
, pp. 207-218
-
-
Strasser, M.1
Popper, C.2
Capkun, S.3
-
5
-
-
70349110082
-
A coding-theoretic approach for efficient message verification over insecure channels
-
Zurich, Switzerland, Mar.
-
D. Slater, P. Tague, R. Poovendran, and B. J. Matt, "A coding-theoretic approach for efficient message verification over insecure channels, " in WiSec'09, Zurich, Switzerland, Mar. 2009, pp. 151-160.
-
(2009)
WiSec'09
, pp. 151-160
-
-
Slater, D.1
Tague, P.2
Poovendran, R.3
Matt, B.J.4
-
6
-
-
77953998228
-
Zero pre-shared secret key establishment in the presence of jammers
-
Apr.
-
T. Jin, G. Noubir, and B. Thapa, "Zero pre-shared secret key establishment in the presence of jammers, " in MobiHoc'09, Apr. 2009, pp. 219-228.
-
(2009)
MobiHoc'09
, pp. 219-228
-
-
Jin, T.1
Noubir, G.2
Thapa, B.3
-
7
-
-
85034799271
-
Jamming-resistant broadcast communication without shared keys
-
Aug.
-
C. Popper, M. Strasser, and S. Capkun, "Jamming-resistant broadcast communication without shared keys." in USENIX Security'09, Aug. 2009.
-
(2009)
USENIX Security'09
-
-
Popper, C.1
Strasser, M.2
Capkun, S.3
-
8
-
-
77953306472
-
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
-
San Diego, CA, Mar.
-
Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized differential DSSS: Jamming-resistant wireless broadcast communication, " in INFOCOM'10, San Diego, CA, Mar. 2010.
-
(2010)
INFOCOM'10
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
9
-
-
78650975080
-
USD-FH: Jammingresistant wireless communication using frequency hopping with uncoordinated seed disclosure
-
San Francisco, CA, Nov.
-
A. Liu, P. Ning, H. Dai, and Y. Liu, "USD-FH: Jammingresistant wireless communication using frequency hopping with uncoordinated seed disclosure, " in MASS'10, San Francisco, CA, Nov. 2010, pp. 41-50.
-
(2010)
MASS'10
, pp. 41-50
-
-
Liu, A.1
Ning, P.2
Dai, H.3
Liu, Y.4
-
10
-
-
78751527470
-
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
-
Austin, Texas, Dec
-
A. Liu, P. Ning, H. Dai, Y. Liu, and C. Wang, "Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure, " in ACSAC'10, Austin, Texas, Dec. 2010, pp. 367-376.
-
(2010)
ACSAC'10
, pp. 367-376
-
-
Liu, A.1
Ning, P.2
Dai, H.3
Liu, Y.4
Wang, C.5
-
11
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Oakland, CA, May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks, " in IEEE S&P'03, Oakland, CA, May 2003, pp. 197-213.
-
(2003)
IEEE S&P'03
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
12
-
-
0025448725
-
Optimum transmission ranges in a direct-sequence spread-spectrum multihop packet radio network
-
DOI 10.1109/49.56383
-
E. Sousa and J. Silvester, "Optimum transmission ranges in a direct-sequence spread-spectrum multihop packet radio network, " IEEE J. Select. Areas Commun., vol. 8, no. 5, pp. 762-771, Jun 1990. (Pubitemid 20726085)
-
(1990)
IEEE Journal on Selected Areas in Communications
, vol.8
, Issue.5
, pp. 762-771
-
-
Sousa Elvino, S.1
Silvester John, A.2
-
13
-
-
33751529199
-
Securing mobile ad hoc networks with certificateless public keys
-
DOI 10.1109/TDSC.2006.58
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys, " IEEE Transactions on Dependable and Secure Computing,, vol. 3, no. 4, pp. 386-399, Oct.-Dec. 2006. (Pubitemid 44837040)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 386-399
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
14
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing, " in CRYPTO'01, Santa Barbara, CA, Aug. 2001, pp. 213-229. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
15
-
-
0001174154
-
Polynomial codes over certain finite fields
-
June
-
I. S. Reed and G. Solomon, "Polynomial codes over certain finite fields, " Journal of the Society for Industrial and Applied Mathematics (SIAM), vol. 8, no. 2, pp. 300-304, June 1960.
-
(1960)
Journal of the Society for Industrial and Applied Mathematics (SIAM)
, vol.8
, Issue.2
, pp. 300-304
-
-
Reed, I.S.1
Solomon, G.2
|