-
1
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
Z. Li, W. Xu, R. Miller, and W. Trappe, "Securing wireless systems via lower layer enforcements," in Proc. of ACM WiSec, 2006.
-
(2006)
Proc. of ACM WiSec
-
-
Li, Z.1
Xu, W.2
Miller, R.3
Trappe, W.4
-
2
-
-
77955002645
-
Ensemble: Cooperative proximity-based authentication
-
A. Kalamandeen, A. Scannell, E. de Lara, A. Sheth, and A. LaMarca, "Ensemble: Cooperative proximity-based authentication," in Proc. of ACM MobiSys, 2010.
-
(2010)
Proc. of ACM MobiSys
-
-
Kalamandeen, A.1
Scannell, A.2
De Lara, E.3
Sheth, A.4
Lamarca, A.5
-
3
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
N. Patwari and S. Kasera, "Robust location distinction using temporal link signatures," in Proc. of ACM MobiCom, 2007.
-
(2007)
Proc. of ACM MobiCom
-
-
Patwari, N.1
Kasera, S.2
-
4
-
-
60149103674
-
Advancing wireless link signatures for location distinction
-
J. Zhang, M. Firooz, N. Patwari, and S. Kasera, "Advancing wireless link signatures for location distinction," in Proc. of ACM MobiCom, 2008.
-
(2008)
Proc. of ACM MobiCom
-
-
Zhang, J.1
Firooz, M.2
Patwari, N.3
Kasera, S.4
-
5
-
-
77955196382
-
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
-
Y. Liu, P. Ning, and H. Dai, "Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures," in IEEE Symposium on SP (Oakland), 2010.
-
(2010)
IEEE Symposium on SP (Oakland)
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
-
6
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in Proc. of ACM CCS, 2007.
-
(2007)
Proc. of ACM CCS
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
7
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. of ACM MobiCom, 2008.
-
(2008)
Proc. of ACM MobiCom
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
8
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
N. Patwari, J. Croft, S. Jana, and S. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," IEEE Trans. Mobile Comput., vol. 9, no. 1, pp. 17-30, 2010.
-
(2010)
IEEE Trans. Mobile Comput
, vol.9
, Issue.1
, pp. 17-30
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, S.4
-
9
-
-
33846583244
-
Wireless communications: Principles and practice
-
T. Rappaport, Wireless communications: Principles and practice. Prentice Hall, 2001.
-
(2001)
Prentice Hall
-
-
Rappaport, T.1
-
10
-
-
0032001175
-
Unified channel model for mobile radio systems with smart antennas
-
J. Fuhl, A. Molisch, and E. Bonek, "Unified channel model for mobile radio systems with smart antennas," in Proc. of IEE Radar, Sonar and Navigation, 1998.
-
(1998)
Proc. of IEE Radar, Sonar and Navigation
-
-
Fuhl, J.1
Molisch, A.2
Bonek, E.3
-
11
-
-
27744585978
-
Closed-form expressions for the correlation coefficient of directive antennas impinged by a multimodal truncated laplacian PAS
-
L. Schumacher and B. Raghothaman, "Closed-form expressions for the correlation coefficient of directive antennas impinged by a multimodal truncated laplacian PAS," IEEE Trans. Wireless Commun., vol. 4, no. 4, pp. 1351-1359, 2005.
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, Issue.4
, pp. 1351-1359
-
-
Schumacher, L.1
Raghothaman, B.2
-
12
-
-
0038236417
-
Correlation analysis based on MIMO channel measurements in an indoor environment
-
P. Kyritsi, D. Cox, R. Valenzuela, and P. Wolniansky, "Correlation analysis based on MIMO channel measurements in an indoor environment," IEEE J. Sel. Areas Commun., vol. 21, no. 5, pp. 713-720, 2003.
-
(2003)
IEEE J. Sel. Areas Commun.
, vol.21
, Issue.5
, pp. 713-720
-
-
Kyritsi, P.1
Cox, D.2
Valenzuela, R.3
Wolniansky, P.4
-
13
-
-
84861598237
-
Enhanced wireless channel authentication using time-synched link signature
-
Y. Liu and P. Ning, "Enhanced wireless channel authentication using time-synched link signature," in Proc. of IEEE INFOCOM-mini, 2012.
-
(2012)
Proc. of IEEE INFOCOM-mini
-
-
Liu, Y.1
Ning, P.2
-
14
-
-
79957837002
-
On passive inference attacks against physical-layer key extraction
-
M. Edman, A. Kiayias, and B. Yener, "On passive inference attacks against physical-layer key extraction," in Proc. of ACM EuroSec, 2011.
-
(2011)
Proc. of ACM EuroSec
-
-
Edman, M.1
Kiayias, A.2
Yener, B.3
-
17
-
-
0033887179
-
Fading correlation and its effect on the capacity of multielement antenna systems
-
D. Shiu, G. Foschini, M. Gans, and J. Kahn, "Fading correlation and its effect on the capacity of multielement antenna systems," IEEE Trans. Commun., vol. 48, no. 3, pp. 502-513, 2000.
-
(2000)
IEEE Trans. Commun.
, vol.48
, Issue.3
, pp. 502-513
-
-
Shiu, D.1
Foschini, G.2
Gans, M.3
Kahn, J.4
-
19
-
-
0036530337
-
A space-time correlation model for multielement antenna systems in mobile fading channels
-
IEEE
-
A. Abdi and M. Kaveh, "A space-time correlation model for multielement antenna systems in mobile fading channels," IEEE J. Sel. Areas Commun., vol. 20, no. 3, pp. 550-560, 2002.
-
(2002)
J. Sel. Areas Commun.
, vol.20
, Issue.3
, pp. 550-560
-
-
Abdi, A.1
Kaveh, M.2
-
21
-
-
84883112722
-
Is link signature dependable for wireless security?
-
NC State University, Department of Electrical Engineering
-
X. He, H. Dai, W. Shen, and P. Ning, "Is link signature dependable for wireless security?" NC State University, Department of Electrical Engineering, Tech. Rep., 2012, available at http://www4.ncsu.edu/hdai/ linksignature.pdf.
-
Tech. Rep.
, vol.2012
-
-
He, X.1
Dai, H.2
Shen, W.3
Ning, P.4
|