-
1
-
-
31344448046
-
Wireless network security and interworking
-
Feb.
-
M. Shin, J. Ma, A. Mishra, and W. A. Arbaugh, "Wireless network security and interworking," Proc. IEEE, vol. 94, pp. 455-466, Feb. 2006.
-
(2006)
Proc. IEEE
, vol.94
, pp. 455-466
-
-
Shin, M.1
Ma, J.2
Mishra, A.3
Arbaugh, W.A.4
-
2
-
-
0034228863
-
Authentication theory and hypothesis testing
-
July
-
U. Maurer, "Authentication theory and hypothesis testing," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1350-1356, July 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1350-1356
-
-
Maurer, U.1
-
3
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
Jul.
-
L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. on Wireless Commun., vol. 7, no. 7, pp. 2571-2579, Jul. 2008.
-
(2008)
IEEE Trans. on Wireless Commun.
, vol.7
, Issue.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
4
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in the ether: using the physical layer for wireless authentication," in Proc. IEEE International Conference on Communications (ICC), June 2007, pp. 4646-4651.
-
Proc. IEEE International Conference on Communications (ICC), June 2007
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
5
-
-
51249120889
-
A physical-layer technique to enhance authentication for mobile terminals
-
L. Xiao, L. Greenstein, N. Mandayam and W. Trappe, "A physical-layer technique to enhance authentication for mobile terminals," in Proc. IEEE International Conference on Communications (ICC), May 2008, pp. 1520-1524.
-
Proc. IEEE International Conference on Communications (ICC), May 2008
, pp. 1520-1524
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
6
-
-
73049092718
-
Channel-based spoofing detection in frequency-selective Rayleigh channels
-
Dec.
-
L. Xiao, L. J. Greenstern, N. B. Mandayam and W. Trappe, "Channel-based spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. on Wireless Commun., vol. 8, no. 12, pp. 5948-5956, Dec. 2009.
-
(2009)
IEEE Trans. on Wireless Commun.
, vol.8
, Issue.12
, pp. 5948-5956
-
-
Xiao, L.1
Greenstern, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
7
-
-
70449476691
-
EPSON: Enhanced physical security in OFDM networks
-
F. He, H. Man, D. Kivanc and B. McNair, "EPSON: enhanced physical security in OFDM networks," in Proc. IEEE International Conference on Communications (ICC), 2009, pp. 1-5.
-
Proc. IEEE International Conference on Communications (ICC), 2009
, pp. 1-5
-
-
He, F.1
Man, H.2
Kivanc, D.3
McNair, B.4
-
8
-
-
79951607531
-
REAM: Rake receiver enhanced authentication method
-
F. He, W. Wang and H. Man, "REAM: rake receiver enhanced authentication method," in Proc. IEEE Military Communications Conference (MILCOM), Oct. 2010, pp. 2205-2210.
-
Proc. IEEE Military Communications Conference (MILCOM), Oct. 2010
, pp. 2205-2210
-
-
He, F.1
Wang, W.2
Man, H.3
-
10
-
-
78751632083
-
Temporal link signature measurements for location distinction
-
Mar.
-
N. Patwari, and S. K. Kasera, "Temporal link signature measurements for location distinction," IEEE Trans. on Mobile Computing, vol. 10, no. 3, Mar. 2011.
-
(2011)
IEEE Trans. on Mobile Computing
, vol.10
, Issue.3
-
-
Patwari, N.1
Kasera, S.K.2
-
11
-
-
77951565236
-
OFDM channel estimation with optimal threshold-based selection of CIR samples
-
S. Rosati, G. E. Corazza and A. V. - Coralli, "OFDM channel estimation with optimal threshold-based selection of CIR samples," in Proc. IEEE Global Telecommunication Conference (GLOBECOM), 2009, pp. 1-7.
-
Proc. IEEE Global Telecommunication Conference (GLOBECOM), 2009
, pp. 1-7
-
-
Rosati, S.1
Corazza, G.E.2
Coralli, A.V.3
-
12
-
-
57149141813
-
Non data-aided SNR estimation of OFDM signals
-
Nov.
-
F.-X. Socheleau, A. A.-El-Bey and S. Houcke, "Non data-aided SNR estimation of OFDM signals," in IEEE Communication Letters, vol. 12, no. 11, pp. 813-815, Nov. 2008.
-
(2008)
IEEE Communication Letters
, vol.12
, Issue.11
, pp. 813-815
-
-
Socheleau, F.-X.1
El-Bey, A.A.2
Houcke, S.3
|