-
2
-
-
46449132666
-
Towards an architecture for efficient spectrum slicing
-
BRIK, V., ET AL. Towards an architecture for efficient spectrum slicing. In Proc. of HotMobile (2007).
-
Proc. of HotMobile (2007)
-
-
Brik, V.1
-
3
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
BRIK, V., ET AL. Wireless device identification with radiometric signatures. In Proc. of MobiCom (2008).
-
Proc. of MobiCom (2008)
-
-
Brik, V.1
-
5
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Jan.
-
CHEN, R., PARK, J.-M., AND REED, J. Defense against primary user emulation attacks in cognitive radio networks. IEEE JSAC (Jan. 2008), 25 -37.
-
(2008)
IEEE JSAC
, pp. 25-37
-
-
Chen, R.1
Park, J.-M.2
Reed, J.3
-
6
-
-
71049178173
-
Transient-based identification of wireless sensor nodes
-
DANEV, B., AND CAPKUN, S. Transient-based identification of wireless sensor nodes. In Proc. of IPSN (2009).
-
Proc. of IPSN (2009)
-
-
Danev, B.1
Capkun, S.2
-
7
-
-
84863550859
-
Attacks on physical-layer identification
-
DANEV, B., ET AL. Attacks on physical-layer identification. In Proc. of WiSec (2010).
-
Proc. of WiSec (2010)
-
-
Danev, B.1
-
8
-
-
0035246117
-
Reliable communication over channels with insertions, deletions, and substitutions
-
Feb.
-
DAVEY, M., AND MACKAY, D. Reliable communication over channels with insertions, deletions, and substitutions. IEEE Trans. on Information Theory 47, 2 (Feb. 2001), 687 -698.
-
(2001)
IEEE Trans. on Information Theory
, vol.47
, Issue.2
, pp. 687-698
-
-
Davey, M.1
Mackay, D.2
-
11
-
-
0024057362
-
Signal interception: A unifying theoretical framework for feature detection
-
GARDNER, W. A. Signal interception: a unifying theoretical framework for feature detection. IEEE Trans. on Commun. 36, 8 (1988), 897-906.
-
(1988)
IEEE Trans. on Commun.
, vol.36
, Issue.8
, pp. 897-906
-
-
Gardner, W.A.1
-
12
-
-
33749154671
-
Difficulties in providing certification and assurance for software defined radios
-
GIACOMONI, J., AND SICKER, D. Difficulties in providing certification and assurance for software defined radios. In Proc. of IEEE DySPAN (2005).
-
Proc. of IEEE DySPAN (2005)
-
-
Giacomoni, J.1
Sicker, D.2
-
13
-
-
84923996598
-
-
Cambridge University Press, New York, NY, USA
-
GOLDSMITH, A. Wireless Communications. Cambridge University Press, New York, NY, USA, 2005.
-
(2005)
Wireless Communications
-
-
Goldsmith, A.1
-
14
-
-
78649240359
-
Airblue: A system for cross-layer wireless protocol development and experimentation
-
GUMMADI, R., NG, M., FLEMING, K., AND BALAKRISHNAN, H. Airblue: A system for cross-layer wireless protocol development and experimentation. In MIT Tech. Report (2008).
-
(2008)
MIT Tech. Report
-
-
Gummadi, R.1
Ng, M.2
Fleming, K.3
Balakrishnan, H.4
-
15
-
-
78149302549
-
Predictable 802.11 packet delivery from wireless channel measurements
-
HALPERIN, D., ET AL. Predictable 802.11 packet delivery from wireless channel measurements. In Proc. of SIGCOMM (2010).
-
Proc. of SIGCOMM (2010)
-
-
Halperin, D.1
-
17
-
-
84863539107
-
-
IEEE 802.11
-
IEEE 802.11. http://www.ieee802.org/11/.
-
-
-
-
18
-
-
4544248818
-
Radio frequency watermarking for OFDM wireless networks
-
KLEIDER, J., ET AL. Radio frequency watermarking for OFDM wireless networks. In Proc. of IEEE ICASSP (2004).
-
Proc. of IEEE ICASSP (2004)
-
-
Kleider, J.1
-
19
-
-
0019634370
-
Password authentication with insecure communication
-
Nov
-
LAMPORT, L. Password authentication with insecure communication. Comm. of the ACM 24, 11 (Nov 1981).
-
(1981)
Comm. of the ACM
, vol.24
, pp. 11
-
-
Lamport, L.1
-
20
-
-
33144460850
-
Serloc: Secure range-independent localization for wireless sensor networks
-
LAZOS, L., AND POOVENDRAN, R. Serloc: secure range-independent localization for wireless sensor networks. In Proc. of WiSe (2004).
-
Proc. of WiSe (2004)
-
-
Lazos, L.1
Poovendran, R.2
-
21
-
-
70349696172
-
ALDO: An anomaly detection framework for dynamic spectrum access networks
-
LIU, S., CHEN, Y., TRAPPE, W., AND GREENSTEIN, L. ALDO: An anomaly detection framework for dynamic spectrum access networks. In Proc. of INFOCOM (2009).
-
Proc. of INFOCOM (2009)
-
-
Liu, S.1
Chen, Y.2
Trappe, W.3
Greenstein, L.4
-
22
-
-
77955196382
-
Authenticating primary users'signals in cognitive radio networks via integrated cryptographic and wireless link signatures
-
LIU, Y., NING, P., AND DAI, H. Authenticating primary users'signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In Proc. of IEEE S&P (2010).
-
Proc. of IEEE S&P (2010)
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
-
23
-
-
0002586876
-
A digital signature based on a conventional encryption function
-
MERKLE, R. A digital signature based on a conventional encryption function. In Proc. of Crypto (1987).
-
(1987)
Proc. of Crypto
-
-
Merkle, R.1
-
24
-
-
0002741922
-
Efficient and secure source authentication for multicast
-
PERRIG, A., ET AL. Efficient and secure source authentication for multicast. In Proc. of NDSS (2001).
-
Proc. of NDSS (2001)
-
-
Perrig, A.1
-
25
-
-
60149094530
-
Assessment of urban-scale wireless networks with a small number of measurements
-
ROBINSON, J., ET AL. Assessment of urban-scale wireless networks with a small number of measurements. In Proc. of MobiCom (2008).
-
Proc. of MobiCom (2008)
-
-
Robinson, J.1
-
26
-
-
51349140478
-
Cyclostationary signature detection in multipath rayleigh fading environments
-
SUTTON, P., LOTZE, J., NOLAN, K., AND DOYLE, L. Cyclostationary signature detection in multipath rayleigh fading environments. In Proc. of Crowncom (2007).
-
Proc. of Crowncom (2007)
-
-
Sutton, P.1
Lotze, J.2
Nolan, K.3
Doyle, L.4
-
27
-
-
38149128324
-
Cyclostationary signatures in practical cognitive radio applications
-
Jan.
-
SUTTON, P., NOLAN, K., AND DOYLE, L. Cyclostationary signatures in practical cognitive radio applications. IEEE JSAC (Jan. 2008), 13 -24.
-
(2008)
IEEE JSAC
, pp. 13-24
-
-
Sutton, P.1
Nolan, K.2
Doyle, L.3
-
28
-
-
77955036368
-
SORA: High performance software radio using general purpose multicore processors
-
TAN, K., ET AL. SORA: High performance software radio using general purpose multicore processors. In Proc. of NSDI (2009).
-
Proc. of NSDI (2009)
-
-
Tan, K.1
-
29
-
-
39749096536
-
Secure location verification with hidden and mobile base stations
-
April
-
ČAPKUN, S., ET AL. Secure location verification with hidden and mobile base stations. IEEE Trans. on Mobile Computing (April 2008), 470-483.
-
(2008)
IEEE Trans. on Mobile Computing
, pp. 470-483
-
-
Čapkun, S.1
-
31
-
-
84863538425
-
Free Side Channel: Bits over Interference
-
WU, K., ET AL. Free Side Channel: Bits over Interference. In Proc. of MobiCom (2010).
-
Proc. of MobiCom (2010)
-
-
Wu, K.1
-
32
-
-
78650405865
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
XU, W., ET AL. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of MobiHoc (2005).
-
Proc. of MobiHoc (2005)
-
-
Xu, W.1
-
33
-
-
48349130414
-
TRIESTE: A trusted radio infrastructure for enforcing spectrum etiquettes
-
XU, W., KAMAT, P., AND TRAPPE, W. TRIESTE: A trusted radio infrastructure for enforcing spectrum etiquettes. In Proc. of SDR workshop (2006).
-
Proc. of SDR Workshop (2006)
-
-
Xu, W.1
Kamat, P.2
Trappe, W.3
-
34
-
-
85076753011
-
Supporting demanding wireless applications with frequency-agile radios
-
YANG, L., HOU, W., CAO, L., ZHAO, B. Y., AND ZHENG, H. Supporting demanding wireless applications with frequency-agile radios. In Proc. of NSDI (2010).
-
Proc. of NSDI (2010)
-
-
Yang, L.1
Hou, W.2
Cao, L.3
Zhao, B.Y.4
Zheng, H.5
-
35
-
-
39449137863
-
Physical-layer authentication
-
YU, P., BARAS, J., AND SADLER, B. Physical-layer authentication. IEEE Trans. on Info. Forensics and Security 3, 1 (2008), 38-51.
-
(2008)
IEEE Trans. on Info. Forensics and Security
, vol.3
, Issue.1
, pp. 38-51
-
-
Yu, P.1
Baras, J.2
Sadler, B.3
-
36
-
-
60149101747
-
eBay in the sky: Strategy-proof wireless spectrum auctions
-
ZHOU, X., GANDHI, S., SURI, S., AND ZHENG, H. eBay in the sky: strategy-proof wireless spectrum auctions. In Proc. of MobiCom (2008).
-
Proc. of MobiCom (2008)
-
-
Zhou, X.1
Gandhi, S.2
Suri, S.3
Zheng, H.4
|