-
1
-
-
33751507355
-
Secure location verification ssing radio broadcast
-
A. Vora, M. Nesterenko, "Secure location verification ssing radio broadcast," IEEE Trans. on Dependable and Secure Computing, vol. 3, no. 4, pp. 377-385, 2006.
-
(2006)
IEEE Trans. on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 377-385
-
-
Vora, A.1
Nesterenko, M.2
-
2
-
-
51349133236
-
Detecting 802.11 MAC-layer spoofing using received signal strength
-
Apr.
-
Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, "Detecting 802.11 MAC-layer spoofing using received signal strength," in Proc. IEE INF O COM, Apr. 2008, pp. 1768-1776.
-
(2008)
Proc. IEE INF O COM
, pp. 1768-1776
-
-
Sheng, Y.1
Tan, K.2
Chen, G.3
Kotz, D.4
Campbell, A.5
-
3
-
-
38549091723
-
Wireless intrusion detection using tracking verification
-
Glasgow, Jun.
-
R. A. Malaney, "Wireless intrusion detection using tracking verification," in Proc. IEEE ICC, Glasgow, Jun. 2007, pp. 1558-1563.
-
(2007)
Proc. IEEE ICC
, pp. 1558-1563
-
-
Malaney, R.A.1
-
4
-
-
77953789262
-
Detecting and localizing identity-based attacks in wireless and sensor networks
-
Jun.
-
Y. Chen, J. Yang, W. Trappe, and R. P. Martin, "Detecting and localizing identity-based attacks in wireless and sensor networks," IEEE Trans. Veh. Tecimoi., vol. 59, no. 5, pp. 2418-2434, Jun. 2010.
-
(2010)
IEEE Trans. Veh. Tecimoi.
, vol.59
, Issue.5
, pp. 2418-2434
-
-
Chen, Y.1
Yang, J.2
Trappe, W.3
Martin, R.P.4
-
5
-
-
39749096536
-
Secure location verification with hidden and mobile base station
-
Apr.
-
S. Capkun, K. B. Rasmussen, M. Cagalj, and M. Srivastava, "Secure location verification with hidden and mobile base station," IEEE Trans. Mobile Comput., vol. 7, no. 4, pp. 470-483, Apr. 2008.
-
(2008)
IEEE Trans. Mobile Comput.
, vol.7
, Issue.4
, pp. 470-483
-
-
Capkun, S.1
Rasmussen, K.B.2
Cagalj, M.3
Srivastava, M.4
-
6
-
-
44049090016
-
Evaluation of localization attacks on power-modulated challenge-response systems
-
Jun.
-
Z. Yu, L. Zang, and W. Trappe, "Evaluation of localization attacks on power-modulated challenge-response systems," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 259-272, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.2
, pp. 259-272
-
-
Yu, Z.1
Zang, L.2
Trappe, W.3
-
7
-
-
77951198358
-
A node-to-node location verification method
-
May
-
L. Dawei, L. Moon-Chuen, and W. Dan, "A node-to-node location verification method," IEEE Trans. Ind. Electron, vol. 57, pp. 1526-1537, May, 2010.
-
(2010)
IEEE Trans. Ind. Electron
, vol.57
, pp. 1526-1537
-
-
Dawei, L.1
Moon-Chuen, L.2
Dan, W.3
-
8
-
-
84856187703
-
A secure cooperative approach for nonline-of-sight location verification in VA NET
-
Jan.
-
O. Abumansoor, A. Boukerche, "A secure cooperative approach for nonline-of-sight location verification in VA NET," IEEE Trans. Veh. Technol., vol. 61, pp. 275-285, Jan. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, pp. 275-285
-
-
Abumansoor, O.1
Boukerche, A.2
-
9
-
-
33845597602
-
Position verification approaches for vehicular ad hoc networks
-
Oct.
-
T. Leinmiiller, E. Schoch, and F. Kargl, "Position verification approaches for vehicular ad hoc networks," IEEE Wireless Commun., vol. 13, no. 5, pp. 16-21, Oct. 2006.
-
(2006)
IEEE Wireless Commun.
, vol.13
, Issue.5
, pp. 16-21
-
-
Leinmiiller, T.1
Schoch, E.2
Kargl, F.3
-
10
-
-
46749099829
-
Providing VANET security through active position detection
-
Jul.
-
G. Yan, S. Olairu, and M. C. Weigle, "Providing VANET security through active position detection," Comput. Commun., vol. 31, no. 12, pp. 2883-2897, Jul. 2008.
-
(2008)
Comput. Commun.
, vol.31
, Issue.12
, pp. 2883-2897
-
-
Yan, G.1
Olairu, S.2
Weigle, M.C.3
-
11
-
-
1542317849
-
Secure verification of location claims
-
Sep.
-
N. Sastry, U. Shankar, and D. Wagner, "Secure verification of location claims," in Proc. ACM Workshop Wireless Security (WiSe '03), Sep. 2003, pp. 1-10.
-
(2003)
Proc. ACM Workshop Wireless Security (WiSe '03)
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
12
-
-
67249109195
-
Secure location verification for vehicular ad-hoc networks
-
Dec.
-
J.-H. Song, V. W. S. Wong, and V. C. M. Leung, "Secure location verification for vehicular ad-hoc networks," in Proc. IEEE GLOBECOM, Dec. 2008, pp. 1-5.
-
(2008)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
Song, J.-H.1
Wong, V.W.S.2
Leung, V.C.M.3
-
13
-
-
34247328623
-
Detection and localization of Sybil nodes in VA NETs
-
Sep.
-
B. Xiao, B. Yu, and C. Gao, "Detection and localization of Sybil nodes in VA NETs," in Proc. Workshop DlWANS, Sep. 2006, pp. 1-8.
-
(2006)
Proc. Workshop DIWANS
, pp. 1-8
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
14
-
-
34247332710
-
Measuring intrusion detection capability: An information-theoretic approach
-
Taipei, Taiwan, Mar.
-
G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skoric, "Measuring intrusion detection capability: An information-theoretic approach," in Proc. ASIACCS' 06, Taipei, Taiwan, Mar. 2006.
-
(2006)
Proc. ASIACCS' 06
-
-
Gu, G.1
Fogla, P.2
Dagon, D.3
Lee, W.4
Skoric, B.5
-
15
-
-
46749103795
-
Gaussian mixture modeling by exploiting the Mahanalobis distance
-
Jul.
-
D. Ververidis and C. Kotropoulos, "Gaussian mixture modeling by exploiting the Mahanalobis distance," IEEE Trans. Signal Process., vol. 56, no. 7, pp. 2797-2811, Jul. 2008.
-
(2008)
IEEE Trans. Signal Process.
, vol.56
, Issue.7
, pp. 2797-2811
-
-
Ververidis, D.1
Kotropoulos, C.2
-
16
-
-
33947604177
-
Nuisance parameters and location accuracy in lognormal fading model
-
Mar.
-
R. A. Malaney, "Nuisance parameters and location accuracy in lognormal fading model," IEEE Trans. Wireless Commun., vol. 6, no. 3, Mar. 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.3
-
-
Malaney, R.A.1
-
17
-
-
55849135998
-
Gaussian probability density functions: Properties and Error Characterization
-
Feb.
-
M. I. Ribeiro, "Gaussian probability density functions: Properties and Error Characterization," Instituto Superior Tcnico, Lisboa, Portugal, Tech. Rep. 1049-001, Feb. 2004.
-
(2004)
Instituto Superior Tcnico, Lisboa, Portugal, Tech. Rep. 1049-001
-
-
Ribeiro, M.I.1
-
18
-
-
45749124706
-
An information-theoretic measure of intrusion detection capability
-
G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skoric, "An information-theoretic measure of intrusion detection capability," College of Computing, Georgia Tech, Tech. Rep. GIT-CC-05-10, 2005.
-
(2005)
College of Computing, Georgia Tech, Tech. Rep. GIT-CC-05-10
-
-
Gu, G.1
Fogla, P.2
Dagon, D.3
Lee, W.4
Skoric, B.5
-
19
-
-
79961116371
-
Tagging systems
-
US Patent, Pub. No. US2006/0022832
-
A. Kent, W. Munro, T. Spiller and R. Beausoleil, "Tagging Systems," US Patent, Pub. No. US2006/0022832, 2006.
-
(2006)
-
-
Kent, A.1
Munro, W.2
Spiller, T.3
Beausoleil, R.4
-
20
-
-
77951261706
-
Location-dependent communications using quantum entanglement
-
R. A. Malaney, "Location-dependent communications using quantum entanglement," Phys. Rev. A 81, 042319, 2010.
-
(2010)
Phys. Rev. A
, vol.81
, pp. 042319
-
-
Malaney, R.A.1
-
21
-
-
79551621917
-
Quantum location verification in noisy channels
-
Dec.
-
R. A. Malaney, "Quantum location verification in noisy channels," in Proc. IEEE GLOBECOM, Dec. 2010, pp. 1-6.
-
(2010)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Malaney, R.A.1
-
22
-
-
84877660555
-
Location verification in quantum communications
-
WIPO Patent, Pub. No. W0/2011/044629
-
R. A. Malaney, "Location verification in quantum communications," WIPO Patent, Pub. No. W0/2011/044629, 2011.
-
(2011)
-
-
Malaney, R.A.1
-
23
-
-
80052013421
-
Position-based quantum cryptography: Impossibility and constructions
-
vol. 6841 of Lecture Notes in Computer Science, Springer-Verlag
-
H. Buhrman, N. Chandran, S. Fehr, R. Gelles, V. Goyal, R. Ostrovsky and C. Schaffner, "Position-based quantum cryptography: impossibility and constructions," In Advances in Cryptology, vol. 6841 of Lecture Notes in Computer Science, pp. 429-446, Springer-Verlag, 2011.
-
(2011)
Advances in Cryptology
, pp. 429-446
-
-
Buhrman, H.1
Chandran, N.2
Fehr, S.3
Gelles, R.4
Goyal, V.5
Ostrovsky, R.6
Schaffner, C.7
|