-
1
-
-
33646014118
-
-
SPIE
-
Agaian, S.S., Akopian, D., D'Souza, S.: Wireless steganography, No. 1, p. 60740G. SPIE (2006), http://link.aip.org/link/?PSI/6074/60740G/1
-
(2006)
Wireless Steganography
, Issue.1
-
-
Agaian, S.S.1
Akopian, D.2
D'Souza, S.3
-
4
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
ACM, New York
-
Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom 2008, pp. 116-127. ACM, New York (2008), http://doi.acm.org/10.1145/1409944.1409959
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom 2008
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
5
-
-
84915769185
-
An intelligent physical layer for cognitive radio networks
-
Dutta, A., Fifield, J., Schelle, G., Grunwald, D., Sicker, D.: An intelligent physical layer for cognitive radio networks. In:WICON 2008: Proceedings of the 4th International Conference on Wireless Internet (2008)
-
WICON 2008: Proceedings of the 4th International Conference on Wireless Internet (2008)
-
-
Dutta, A.1
Fifield, J.2
Schelle, G.3
Grunwald, D.4
Sicker, D.5
-
6
-
-
70349723025
-
Experiences with a platform for frequency agile techniques
-
Fifield, J., Kasemir, P., Grunwald, D., Sicker, D.: Experiences with a platform for frequency agile techniques. In: DYSPAN (2007)
-
(2007)
DYSPAN
-
-
Fifield, J.1
Kasemir, P.2
Grunwald, D.3
Sicker, D.4
-
7
-
-
77955358422
-
Implementation and experimental results of superposition coding on software radio
-
May
-
Ganti, R., Gong, Z., Haenggi, M., Lee, C., Srinivasa, S., Tisza, D., Vanka, S., Vizi, P.: Implementation and experimental results of superposition coding on software radio. In: 2010 IEEE International Conference on Communications (ICC), pp. 1-5 (May 2010)
-
(2010)
2010 IEEE International Conference on Communications (ICC)
, pp. 1-5
-
-
Ganti, R.1
Gong, Z.2
Haenggi, M.3
Lee, C.4
Srinivasa, S.5
Tisza, D.6
Vanka, S.7
Vizi, P.8
-
8
-
-
84955119830
-
Echo Hiding
-
Anderson, R. (ed.) IH 1996. Springer, Heidelberg
-
Gruhl, D., Bender, W., Lu, A.: Echo Hiding. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 295-315. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1174
, pp. 295-315
-
-
Gruhl, D.1
Bender, W.2
Lu, A.3
-
10
-
-
84874402702
-
Peak-to-average power ratio of ieee 802.11 a phy layer signals
-
Wysocki, T.A., Darnell, M., Honary, B. (eds.) Advanced Signal Processing for Communication Systems. Springer US
-
Jayalath, A., Tellambura, C.: Peak-to-average power ratio of ieee 802.11 a phy layer signals. In: Wysocki, T.A., Darnell, M., Honary, B. (eds.) Advanced Signal Processing for Communication Systems. The International Series in Engineering and Computer Science, vol. 703, pp. 83-96. Springer US (2002), http://dx.doi.org/10.1007/0-306-47791-2-7
-
(2002)
The International Series in Engineering and Computer Science
, vol.703
, pp. 83-96
-
-
Jayalath, A.1
Tellambura, C.2
-
11
-
-
33750928630
-
Wlan steganography: A first practical review
-
ACM, New York
-
Krätzer, C., Dittmann, J., Lang, A., Kühne, T.: Wlan steganography: a first practical review. In: MM&S;Sec 2006: Proceedings of the 8th Workshop on Multimedia and Security, pp. 17-22. ACM, New York (2006)
-
(2006)
MM&S;Sec 2006: Proceedings of the 8th Workshop on Multimedia and Security
, pp. 17-22
-
-
Krätzer, C.1
Dittmann, J.2
Lang, A.3
Kühne, T.4
-
12
-
-
0032680807
-
Information hiding - A survey
-
Petitcolas, F., Anderson, R., Kuhn, M.: Information hiding-a survey. Proceedings of the IEEE 87(7), 1062-1078 (1999)
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
14
-
-
71149098880
-
Securing ofdm over wireless time-varying channels using subcarrier overloading with joint signal constellations
-
Tsouri, G.R., Wulich, D.: Securing ofdm over wireless time-varying channels using subcarrier overloading with joint signal constellations. EURASIP J. Wirel. Commun. Netw. 2009, 2-2 (2009)
-
(2009)
EURASIP J. Wirel. Commun. Netw.
, vol.2009
, pp. 2-2
-
-
Tsouri, G.R.1
Wulich, D.2
-
15
-
-
0034515656
-
Data hiding in digital binary image
-
Wu, M., Tang, E., Lin, B.: Data hiding in digital binary image. In: 2000 IEEE International Conference on Multimedia and Expo, ICME 2000, vol. 1, pp. 393-396 (2000)
-
(2000)
2000 IEEE International Conference on Multimedia and Expo, ICME 2000
, vol.1
, pp. 393-396
-
-
Wu, M.1
Tang, E.2
Lin, B.3
-
16
-
-
45849154260
-
Steganography in compressed video stream
-
Xu, C., Ping, X., Zhang, T.: Steganography in compressed video stream. In: First International Conference on Innovative Computing, Information and Control, ICICIC 2006, vol. 1, pp. 269-272 (2006)
-
(2006)
First International Conference on Innovative Computing, Information and Control, ICICIC 2006
, vol.1
, pp. 269-272
-
-
Xu, C.1
Ping, X.2
Zhang, T.3
-
17
-
-
44449087948
-
A survey of covert channels and countermeasures in computer network protocols
-
Zander, S., Armitage, G., Branch, P.: A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys Tutorials 9(3), 44-57 (2007)
-
(2007)
IEEE Communications Surveys Tutorials
, vol.9
, Issue.3
, pp. 44-57
-
-
Zander, S.1
Armitage, G.2
Branch, P.3
|