-
2
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, 2008.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
3
-
-
84881250673
-
Cooperative jam technique to increase physical-layer security in CWSN
-
A. Araujo, J. Blesa, E. Romero, and O. Nieto-Taladriz, "Cooperative jam technique to increase physical-layer security in CWSN," in COCORA 2012, The Second International Conference on Advances in Cognitive Radio, 2012, pp. 11-14.
-
COCORA 2012, the Second International Conference on Advances in Cognitive Radio, 2012
, pp. 11-14
-
-
Araujo, A.1
Blesa, J.2
Romero, E.3
Nieto-Taladriz, O.4
-
4
-
-
72349099904
-
Cooperative jamming for wireless physical layer security
-
L. Dong, Z. Han, A. Petropulu, and H. Poor, "Cooperative jamming for wireless physical layer security," in Proceeding of IEEE Workshop on Statistical Signal Processing (SSP), sept 2009, pp. 417-420.
-
Proceeding of IEEE Workshop on Statistical Signal Processing (SSP), Sept 2009
, pp. 417-420
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.4
-
5
-
-
79955491895
-
Interference assisted secret communication
-
May
-
X. Tang, R. Liu, P. Spasojevic and, and H. Poor, "Interference assisted secret communication," IEEE Transactions on Information Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
-
(2011)
IEEE Transactions on Information Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.4
-
6
-
-
77955397265
-
Friendly jamming for wireless secrecy
-
J. Vilela, M. Bloch, J. Barros, and S. McLaughlin, "Friendly jamming for wireless secrecy," in Proceedings of the IEEE International Conference on Communications (ICC). IEEE, 2010, pp. 1-6.
-
Proceedings of the IEEE International Conference on Communications (ICC). IEEE, 2010
, pp. 1-6
-
-
Vilela, J.1
Bloch, M.2
Barros, J.3
McLaughlin, S.4
-
7
-
-
79957465600
-
Wireless secrecy regions with friendly jamming
-
june
-
-, "Wireless secrecy regions with friendly jamming," Information Forensics and Security, IEEE Transactions on, vol. 6, no. 2, pp. 256-266, june 2011.
-
(2011)
Information Forensics and Security, IEEE Transactions on
, vol.6
, Issue.2
, pp. 256-266
-
-
Vilela, J.1
Bloch, M.2
Barros, J.3
McLaughlin, S.4
-
8
-
-
39349090593
-
Keep on blockin' in the free world: Personal access control for low-cost RFID tags
-
Proc. 13th International Workshop on Security Protocols. Apr
-
M. R. Rieback, B. Crispo, and A. S. Tanenbaum, "Keep on blockin' in the free world: Personal access control for low-cost RFID tags," in Proc. 13th International Workshop on Security Protocols. LNCS, Apr 2005.
-
(2005)
LNCS
-
-
Rieback, M.R.1
Crispo, B.2
Tanenbaum, A.S.3
-
9
-
-
26444435642
-
RFID guardian: A battery-powered mobile device for RFID privacy management
-
Proc. 10th Australasian Conf. on Information Security and Privacy (ACISP 2005), ser. Springer-Verlag, July
-
-, "RFID guardian: A battery-powered mobile device for RFID privacy management," in Proc. 10th Australasian Conf. on Information Security and Privacy (ACISP 2005), ser. LNCS, vol. 3574. Springer-Verlag, July 2005, pp. 184-194.
-
(2005)
LNCS
, vol.3574
, pp. 184-194
-
-
Rieback, M.R.1
Crispo, B.2
Tanenbaum, A.S.3
-
10
-
-
70349107957
-
Jamming for good: A fresh approach to authentic communication in wsns
-
I. Martinovic, P. Pichota, and J. Schmitt, "Jamming for good: A fresh approach to authentic communication in wsns," in Proceedings of the second ACM conference on Wireless network security. ACM, 2009, pp. 161-168.
-
Proceedings of the Second ACM Conference on Wireless Network Security. ACM, 2009
, pp. 161-168
-
-
Martinovic, I.1
Pichota, P.2
Schmitt, J.3
-
11
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implanted medical devices
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: Non-invasive security for implanted medical devices," in Proceedings of the ACM SIGCOMM Conference, August 2011.
-
Proceedings of the ACM SIGCOMM Conference, August 2011
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
12
-
-
79960873920
-
Imdguard: Securing implantable medical devices with the external wearable guardian
-
F. Xu, Z. Qin, C. Tan, B. Wang, and Q. Li, "Imdguard: Securing implantable medical devices with the external wearable guardian," in INFOCOM, 2011 Proceedings IEEE. IEEE, 2011, pp. 1862-1870.
-
INFOCOM, 2011 Proceedings IEEE. IEEE, 2011
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.3
Wang, B.4
Li, Q.5
-
13
-
-
80053164710
-
WiFire: A firewall for wireless networks
-
M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders, "WiFire: a firewall for wireless networks," in Proceedings of the ACM SIGCOMM Conference, 2011, pp. 456-457.
-
Proceedings of the ACM SIGCOMM Conference, 2011
, pp. 456-457
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
Lenders, V.4
-
14
-
-
79959884874
-
Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
-
ACM
-
C. Kuo, M. Luk, R. Negi, and A. Perrig, "Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes," in Proceedings of the 5th international conference on Embedded networked sensor systems. ACM, 2007, pp. 233-246.
-
(2007)
Proceedings of the 5th International Conference on Embedded Networked Sensor Systems
, pp. 233-246
-
-
Kuo, C.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
15
-
-
84863552416
-
Optimization schemes for protective jamming
-
S. Sankararaman, K. Abu-Affash, A. Efrat, S. D. Eriksson-Bique, V. Polishchuk, S. Ramasubramanian, and M. Segal, "Optimization schemes for protective jamming," in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2012, pp. 65-74.
-
Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2012
, pp. 65-74
-
-
Sankararaman, S.1
Abu-Affash, K.2
Efrat, A.3
Eriksson-Bique, S.D.4
Polishchuk, V.5
Ramasubramanian, S.6
Segal, M.7
-
18
-
-
0017996501
-
The gaussian wiretap channel
-
S. Leung-Yan-Cheong and M. Hellman, "The gaussian wiretap channel," Information Theory, IEEE Transactions on, vol. 24, no. 4, pp. 451-456, 1978.
-
(1978)
Information Theory, IEEE Transactions on
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
22
-
-
70449514539
-
Wireless physical-layer security: The case of colluding eavesdroppers
-
P. Pinto, J. Barros, and M. Win, "Wireless physical-layer security: The case of colluding eavesdroppers," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2009, pp. 2442-2446.
-
Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2009
, pp. 2442-2446
-
-
Pinto, P.1
Barros, J.2
Win, M.3
-
29
-
-
84881218844
-
Investigation of signal and message manipulations on the wireless channel
-
C. Pöpper, N. O. Tippenhauer, B. Danev, and S. Čapkun, "Investigation of signal and message manipulations on the wireless channel," in Proceedings of the European Symposium on Research in Computer Security, 2011.
-
Proceedings of the European Symposium on Research in Computer Security, 2011
-
-
Pöpper, C.1
Tippenhauer, N.O.2
Danev, B.3
Čapkun, S.4
|