메뉴 건너뛰기




Volumn , Issue , 2012, Pages 65-74

Optimization schemes for protective jamming

Author keywords

friendly jamming; rfid; security; wireless

Indexed keywords

BACK UP; CREDIT CARDS; ENCRYPTION TECHNIQUE; EXPERIMENTAL SIMULATIONS; JAMMERS; OPTIMIZATION SCHEME; POWER ALLOCATIONS; RF-ID TAGS; SECURITY; STORAGE LOCATION; VIRTUAL BARRIER; WIRELESS COMMUNICATIONS;

EID: 84863552416     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2248371.2248383     Document Type: Conference Paper
Times cited : (29)

References (28)
  • 1
    • 0003418699 scopus 로고
    • Complex analysis: An introduction to the theory of analytic functions of one complex variable
    • McGraw-Hill
    • L. V. Ahlfors. Complex analysis: an introduction to the theory of analytic functions of one complex variable. International series in pure and applied mathematics. McGraw-Hill, 1979.
    • (1979) International Series in Pure and Applied Mathematics
    • Ahlfors, L.V.1
  • 2
    • 84976826673 scopus 로고
    • Voronoi diagrams-a survey of a fundamental geometric data structure
    • F. Aurenhammer. Voronoi diagrams-a survey of a fundamental geometric data structure. ACM Comput. Surv., 23(3):345-405, 1991.
    • (1991) ACM Comput. Surv. , vol.23 , Issue.3 , pp. 345-405
    • Aurenhammer, F.1
  • 5
    • 33747142749 scopus 로고    scopus 로고
    • The capacity of wireless networks
    • P. Gupta and P. R. Kumar. The capacity of wireless networks. IEEE T. Inform. Theory, 46(2):388-404, 2000.
    • (2000) IEEE T. Inform. Theory , vol.46 , Issue.2 , pp. 388-404
    • Gupta, P.1    Kumar, P.R.2
  • 6
    • 76649135514 scopus 로고    scopus 로고
    • Physical layer security game: Interaction between source, eavesdropper, and friendly jammer
    • Jun.
    • Z. Han, N. Marina, M. Debbah, and A. Hjørungnes. Physical layer security game: Interaction between source, eavesdropper, and friendly jammer. EURASIP J. Wirel. Comm., pp. 11:1-11:10, Jun. 2009.
    • (2009) EURASIP J. Wirel. Comm.
    • Han, Z.1    Marina, N.2    Debbah, M.3    Hjørungnes, A.4
  • 8
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • A. Juels. Rfid security and privacy: a research survey. IEEE J. Sel. Area. Comm., 24(2):381-394, 2006. (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 12
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • L. Lai and H. El Gamal. The relay-eavesdropper channel: Cooperation for secrecy. IEEE T. Inform. Theory, 54(9):4005 -4019, 2008.
    • (2008) IEEE T. Inform. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 13
    • 0002058718 scopus 로고
    • Generalization of voronoi diagrams in the plane
    • D. T. Lee and R. L. Drysdale. Generalization of voronoi diagrams in the plane. SIAM J. Comput., 10(1):73-87, 1981.
    • (1981) SIAM J. Comput. , vol.10 , Issue.1 , pp. 73-87
    • Lee, D.T.1    Drysdale, R.L.2
  • 19
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53-57, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 22
    • 77956873542 scopus 로고    scopus 로고
    • A survey on key management mechanisms for distributed wireless sensor networks
    • M. Simplício Jr., P. Barreto, C. Margi, and T. Carvalho. A survey on key management mechanisms for distributed wireless sensor networks. Comp. Netw., 54(15):2591-2612, 2010.
    • (2010) Comp. Netw. , vol.54 , Issue.15 , pp. 2591-2612
    • Simplício Jr., M.1    Barreto, P.2    Margi, C.3    Carvalho, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.