-
2
-
-
84878616051
-
-
AGILENT. Agilent.
-
AGILENT. 2007a. Agilent InfiniiVision 6104A. Agilent. http://www.home.agilent.com/.
-
(2007)
Agilent InfiniiVision
-
-
-
4
-
-
84878586808
-
-
Agilent. http://www.home.agilent.com/agilent.
-
-
-
-
6
-
-
84871224677
-
-
(Last accessed 11/10.)
-
BOGGAN, S. 2006. Cracked it! http://www.guardian.co.uk/technology/2006/ nov/17/news.homeaffairs/. (Last accessed 11/10.).
-
(2006)
Cracked It
-
-
Boggan, S.1
-
7
-
-
10044297649
-
-
Springer
-
BOLLE, R., CONNELL, J., PANKANTI, S., RATHA, N., AND SENIOR, A. 2003. Guide to Biometrics. Springer.
-
(2003)
Guide to Biometrics
-
-
Bolle, R.1
Connell, J.2
Pankanti, S.3
Ratha, N.4
Senior, A.5
-
8
-
-
84878563724
-
-
US Patent 11691041
-
BOWSER, R. A., STAGER, P. J., THOMSON, A., AND DOUGLAS, B. L. 2008. Wireless transmitter identity validation in a wireless network. US Patent 11691041.
-
(2008)
Wireless Transmitter Identity Validation in A Wireless Network
-
-
Bowser, R.A.1
Stager, P.J.2
Thomson, A.3
Douglas, B.L.4
-
9
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
BRIK, V., BANERJEE, S., GRUTESER, M., AND OH, S. 2008. Wireless device identification with radiometric signatures. In Proceedings of the ACM International Conference on Mobile Computing and Networking.
-
(2008)
Proceedings of the ACM International Conference on Mobile Computing and Networking
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
10
-
-
70449127254
-
Robust stable radiometric fingerprinting for wireless devices
-
CANDORE, A.,KOCABAS, O., AND KOUSHANFAR, F. 2009. Robust stable radiometric fingerprinting for wireless devices. In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 43-49.
-
(2009)
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust
, pp. 43-49
-
-
Candore, A.1
Kocabas, O.2
Koushanfar, F.3
-
11
-
-
84878600207
-
-
US Patent 7346359
-
DAMARLA, C., IVERS, J., POLLARD, M., KOMPANEK, A. J., AND TRAMMELL, B. H. 2008. Method for RF fingerprinting. US Patent 7346359.
-
(2008)
Method for RF Fingerprinting
-
-
Damarla, C.1
Ivers, J.2
Pollard, M.3
Kompanek, A.J.4
Trammell, B.H.5
-
14
-
-
77952407534
-
Attacks on physical-layer identification
-
DANEV, B., LUECKEN, H., CAPKUN, S., AND DEFRAWY, K. 2010. Attacks on physical-layer identification. In Proceedings of the 3th ACM Conference on Wireless Network Security (WiSec'10). ACM, 89-98.
-
(2010)
Proceedings of the 3th ACM Conference on Wireless Network Security (WiSec'10). ACM
, pp. 89-98
-
-
Danev, B.1
Luecken, H.2
Capkun, S.3
Defrawy, K.4
-
16
-
-
49049105769
-
Design and implementation of PUF-based "unclonable" RFID ICs for anti-counterfeiting and security applications
-
DEVADAS, S., SUH, E., PARAL, S., SOWELL, R., ZIOLA, T., AND KHANDELWAL, V. 2008. Design and implementation of PUF-based "unclonable" RFID ICs for anti-counterfeiting and security applications. In Proceedings of the IEEE International Conference on RFID. 58-64.
-
(2008)
Proceedings of the IEEE International Conference on RFID
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
19
-
-
0035388827
-
Characteristics of radio transmitter fingerprints
-
ELLIS, K. AND SERINKEN, N. 2001. Characteristics of radio transmitter fingerprints. Radio Sci. 36, 585-597.
-
(2001)
Radio Sci.
, vol.36
, pp. 585-597
-
-
Ellis, K.1
Serinken, N.2
-
20
-
-
33748766901
-
The EPCglobal architecture framework v 1.3
-
Epcglobal
-
EPCGLOBAL. 2009. The EPCglobal architecture framework v. 1.3. EPCglobal.
-
(2009)
EPCglobal
-
-
-
21
-
-
84878587866
-
Universal software radio peripheral (USRP)
-
ETTUS
-
ETTUS. 2009. Universal software radio peripheral (USRP). Ettus. http://www.ettus.com/.
-
(2009)
Ettus
-
-
-
22
-
-
84878592811
-
Method and apparatus for characterizing a radio transmitter
-
FERRELL, P. 1991. Method and apparatus for characterizing a radio transmitter. US Patent 5005210.
-
(1991)
US Patent 5005210
-
-
Ferrell, P.1
-
24
-
-
4344587804
-
Identification and authentication of integrated circuits
-
GASSEND, B., LIM, D., CLARKE, D., DEVADAS, S., AND VAN DIJK, M. 2004. Identification and authentication of integrated circuits. Concurr. Comput.: Prac. Exper. 16, 11, 1077-1098.
-
(2004)
Concurr. Comput.: Prac. Exper.
, vol.11-16
, pp. 1077-1098
-
-
Gassend, B.1
Lim, D.2
Clarke, D.3
Devadas, S.4
Van Dijk, M.5
-
26
-
-
84878573049
-
New attack to RFID-systems and their middleware and backends
-
GRUNWALD, L. 2006. New attack to RFID-systems and their middleware and backends. In Black Hat Briefings.
-
(2006)
Black Hat Briefings
-
-
Grunwald, L.1
-
27
-
-
11144331561
-
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
-
HALL, J., BARBEAU, M., AND KRANAKIS, E. 2004. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In Proceedings of the Communications, Internet, and Information Technology.
-
(2004)
Proceedings of the Communications, Internet, and Information Technology
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
33
-
-
33144457479
-
RFID security and privacy: A research survey
-
JUELS, A. 2006. RFID security and privacy: A research survey. IEEE J. Select. Areas Comm. 24, 2.
-
(2006)
IEEE J. Select. Areas Comm.
, vol.24
, Issue.2
-
-
Juels, A.1
-
34
-
-
84922211116
-
Waveform collection for use in wireless telephone identification
-
KAPLAN, D. AND STANHOPE, D. 1999. Waveform collection for use in wireless telephone identification. US Patent 5999806.
-
(1999)
US Patent 5999806
-
-
Kaplan, D.1
Stanhope, D.2
-
35
-
-
79951851309
-
RF fingerprinting physical objects for anticounterfeiting applications
-
LAKAFOSIS, V., TRAILLE, A., LEE, H., GEBARA, E., TENTZERIS, M., DEJEAN, G., AND KIROVSKI, D. 2011. RF fingerprinting physical objects for anticounterfeiting applications. IEEE Trans. Micro. Theory Tech. 59, 2, 504-514.
-
(2011)
IEEE Trans. Micro. Theory Tech.
, vol.59
, Issue.2
, pp. 504-514
-
-
Lakafosis, V.1
Traille, A.2
Lee, H.3
Gebara, E.4
Tentzeris, M.5
Dejean, G.6
Kirovski, D.7
-
36
-
-
77957809914
-
An RFID system with enhanced hardware-enabled authentication and anticounterfeiting capabilities
-
LAKAFOSIS, V., TRAILLE, A., LEE, H., ORECCHINI, G., GEBARA, E., TENTZERIS, M., DEJEAN, G., AND KIROVSKI, D. 2010. An RFID system with enhanced hardware-enabled authentication and anticounterfeiting capabilities. In Proceedings of the IEEE MTT-S Int. Microw. Symp. Dig. 840-843.
-
(2010)
Proceedings of the IEEE MTT-S Int. Microw. Symp. Dig
, pp. 840-843
-
-
Lakafosis, V.1
Traille, A.2
Lee, H.3
Orecchini, G.4
Gebara, E.5
Tentzeris, M.6
Dejean, G.7
Kirovski, D.8
-
38
-
-
0014596095
-
Pinpointing location of hostile radars
-
MARGERUM, D. 1969. Pinpointing Location of Hostile Radars. Microwaves.
-
(1969)
Microwaves
-
-
Margerum, D.1
-
43
-
-
84871212721
-
Fingerprinting radio frequency identification tags using timing characteristics
-
PERIASWAMY,S. C. G., THOMPSON, D. R., AND ROMERO, H. P. 2010b. Fingerprinting radio frequency identification tags using timing characteristics. In Proceedings of the Workshop on RFID Security (RFIDSec, Asia).
-
(2010)
Proceedings of the Workshop on RFID Security (RFIDSec, Asia)
-
-
Periaswamy, S.C.G.1
Thompson, D.R.2
Romero, H.P.3
-
44
-
-
84878592120
-
GPS timing and frequency standards
-
QUARTZLOCK. 2010. GPS timing and frequency standards. Quartzlock. http://www.quartzlock.com/downloads/datasheets/E8-Y 4pp.pdf.
-
(2010)
Quartzlock
-
-
-
46
-
-
77950633052
-
Improved wireless security for GMSKbased devices using RF fingerprinting
-
REISING, D. R., TEMPLE, M. A., AND MENDENHALL, M. J. 2010a. Improved wireless security for GMSKbased devices using RF fingerprinting. Int. J. Electron. Secur. Digit. Forensic 3, 41-59.
-
(2010)
Int. J. Electron. Secur. Digit. Forensic 3
, pp. 41-59
-
-
Reising, D.R.1
Temple, M.A.2
Mendenhall, M.J.3
-
48
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
RHRMAIR, U., SEHNKE, F., SLTER, J., DROR, G., DEVADAS, S., AND SCHMIDHUBER, J. 2010. Modeling attacks on physical unclonable functions. In Proceedings of the ACM Computer and Communications Security Conference (CCS).
-
(2010)
Proceedings of the ACM Computer and Communications Security Conference (CCS)
-
-
Rhrmair, U.1
Sehnke, F.2
Slter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
49
-
-
67649259238
-
Electromagnetic measurements for counterfeit detection of radio frequency identification cards
-
ROMERO, H. P., REMLEY, K. A.,WILLIAMS, D. F., AND WANG, C.-M. 2009. Electromagnetic measurements for counterfeit detection of radio frequency identification cards. IEEE Trans. Microw. Theory Tech. 57, 5, 1383-1387.
-
(2009)
IEEE Trans. Microw. Theory Tech.
, vol.57
, Issue.5
, pp. 1383-1387
-
-
Romero, H.P.1
Remley, K.A.2
Williams, D.F.3
Wang, C.-M.4
-
50
-
-
77954657689
-
Identifying RF identification cards from measurements of resonance and carrier harmonics
-
ROMERO, H. P., REMLEY, K. A.,WILLIAMS, D. F.,WANG, C.-M., AND BROWN, T. X. 2010. Identifying RF identification cards from measurements of resonance and carrier harmonics. IEEE Trans. Micro. Theory Techniques 58, 7.
-
(2010)
IEEE Trans. Micro. Theory Techniques
, vol.58
, Issue.7
-
-
Romero, H.P.1
Remley, K.A.2
Williams, D.F.3
Wang, C.-M.4
Brown, T.X.5
-
51
-
-
27844521293
-
A shrinkage approach to large-scale covariance matrix estimation and implications for functional genomics
-
SCHAEFER, J. AND STRIMMER, K. 2005. A shrinkage approach to large-scale covariance matrix estimation and implications for functional genomics. Statist. Appli. Genet. Molec. Biol. 4, 32.
-
(2005)
Statist. Appli. Genet. Molec. Biol.
, vol.4
, pp. 32
-
-
Schaefer, J.1
Strimmer, K.2
-
57
-
-
33745654539
-
RFID-tags for anti-counterfeiting
-
TUYLS, P. AND BATINA, L. 2006. RFID-tags for anti-counterfeiting. In Topics in Cryptology - CT-RSA 2006, Lecture Notes in Computer Science, vol. 3860, 115-131.
-
(2006)
Topics in Cryptology - CT-RSA 2006, Lecture Notes in Computer Science
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
58
-
-
0033326545
-
Detection of radio transmitter turn-on transients
-
URETEN, O. AND SERINKEN, N. 1999. Detection of radio transmitter turn-on transients. Electron. Lett. 35. 1996-1997
-
(1999)
Electron. Lett.
, vol.35
, pp. 1996-1997
-
-
Ureten, O.1
Serinken, N.2
-
62
-
-
77955078948
-
Attacks on digital passports
-
WITTEMAN, M. 2005. Attacks on digital passports. In What The Hack.
-
(2005)
What the Hack
-
-
Witteman, M.1
-
64
-
-
77958096949
-
Non-cryptographic authentication and identification in wireless networks [security and privacy in emerging wireless networks]
-
ZENG, K., GOVINDAN, K., AND MOHAPATRA, P. 2010. Non-cryptographic authentication and identification in wireless networks [security and privacy in emerging wireless networks]. IEEE Comm. 17, 5, 56-62.
-
(2010)
IEEE Comm.
, vol.17
, Issue.5
, pp. 56-62
-
-
Zeng, K.1
Govindan, K.2
Mohapatra, P.3
-
65
-
-
52149099480
-
-
(Last accessed 11/10.)
-
ZETTER, K. 2006. Hackers clone e-passports. http://www.wired.com/science/ discoveries/news/2006/08/71521. (Last accessed 11/10.)
-
(2006)
Hackers clone e-passports
-
-
Zetter, K.1
|