-
1
-
-
11144304214
-
-
IEEE Standard 802.11i-2004, June
-
IEEE Standard 802.11i-2004: MAC Security Enhancements, June 2004.
-
(2004)
MAC Security Enhancements
-
-
-
2
-
-
78650910787
-
-
IEEE Standard 802.11w-2009, Sept.
-
IEEE Standard 802.11w-2009: Protected Management Frames, Sept. 2009.
-
(2009)
Protected Management Frames
-
-
-
4
-
-
80051903947
-
Short paper: Security evaluation of IEEE 802.11w specification
-
M. Ahmad and S. Tadakamadla. Short paper: security evaluation of IEEE 802.11w specification. In Proceedings of ACM WiSec, 2011.
-
(2011)
Proceedings of ACM WiSec
-
-
Ahmad, M.1
Tadakamadla, S.2
-
5
-
-
84861601547
-
STROBE: Actively securing wireless communications using zero-forcing beamforming
-
N. Anand, S. Lee, and E. Knightly. STROBE: Actively securing wireless communications using zero-forcing beamforming. In Proc. of IEEE Infocom, 2012.
-
(2012)
Proc. of IEEE Infocom
-
-
Anand, N.1
Lee, S.2
Knightly, E.3
-
7
-
-
33748995703
-
-
Springer Lecture Notes in Computer Science, 4074, Aug. 2006
-
M. Barbeau, J. Hall, and E. Kranakis. Detecting impersonation attacks in future wireless and mobile networks. Springer Lecture Notes in Computer Science, 4074(2006):80-95, Aug. 2006.
-
(2006)
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
, pp. 80-95
-
-
Barbeau, M.1
Hall, J.2
Kranakis, E.3
-
8
-
-
70349147400
-
Practical attacks against WEP and WPA
-
M. Beck and E. Tews. Practical attacks against WEP and WPA. In Proc. of ACM WiSec, pages 79-86, 2009.
-
(2009)
Proc. of ACM WiSec
, pp. 79-86
-
-
Beck, M.1
Tews, E.2
-
9
-
-
84887054893
-
802.11W security: DOS attacks and vulnerability controls
-
B. Bertka. 802.11w security: DoS attacks and vulnerability controls. In Proc. of Infocom, 2012.
-
(2012)
Proc. of Infocom
-
-
Bertka, B.1
-
12
-
-
77951517339
-
Detecting identity spoofs in 802.11e wireless networks
-
G. Chandrasekaran, J. Deymious, V. Ganapathy, M. Gruteser, and W. Trappe. Detecting identity spoofs in 802.11e wireless networks. In Proc. of IEEE Globecom, 2009.
-
(2009)
Proc. of IEEE Globecom
-
-
Chandrasekaran, G.1
Deymious, J.2
Ganapathy, V.3
Gruteser, M.4
Trappe, W.5
-
13
-
-
81055155451
-
The modeling and comparison of wireless network denial of service attacks
-
M. Eian and S. Mjølsnes. The modeling and comparison of wireless network denial of service attacks. In Proc. of ACM MobiHeld, 2011.
-
(2011)
Proc. of ACM MobiHeld
-
-
Eian, M.1
Mjølsnes, S.2
-
14
-
-
84861639032
-
A formal analysis of IEEE 802.11w deadlock vulnerabilities
-
M. Eian and S. Mjølsnes. A formal analysis of IEEE 802.11w deadlock vulnerabilities. In Proc. of IEEE Infocom, 2012.
-
(2012)
Proc. of IEEE Infocom
-
-
Eian, M.1
Mjølsnes, S.2
-
15
-
-
34548342490
-
No long-term secrets: Location based security in overprovisioned wireless LANS
-
D. Faria and D. Cheriton. No long-term secrets: Location based security in overprovisioned wireless LANs. In Proc. of ACM HotNets, 2004.
-
(2004)
Proc. of ACM HotNets
-
-
Faria, D.1
Cheriton, D.2
-
16
-
-
84856542731
-
Radio-layer security: Detecting identity-based attacks in wireless networks using signalprints
-
D. Faria and D. Cheriton. Radio-layer security: Detecting identity-based attacks in wireless networks using signalprints. In Proc. of ACM WiSe, 2006.
-
(2006)
Proc. of ACM WiSe
-
-
Faria, D.1
Cheriton, D.2
-
17
-
-
69249113549
-
Zigzag decoding: Combating hidden terminals in wireless networks
-
S. Gollakota and D. Katabi. Zigzag decoding: Combating hidden terminals in wireless networks. In Proc. of ACM SIGCOMM, 2008.
-
(2008)
Proc. of ACM SIGCOMM
-
-
Gollakota, S.1
Katabi, D.2
-
20
-
-
1642314732
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. In Proc. of ACM WMASH, 2003.
-
(2003)
Proc. of ACM WMASH
-
-
Gruteser, M.1
Grunwald, D.2
-
21
-
-
79551483702
-
Tool release: Gathering 802.11n traces with channel state information
-
Jan.
-
D. Halperin, W. Hu, A. Sheth, and D. Wetherall. Tool release: Gathering 802.11n traces with channel state information. SIGCOMM CCR, 41(1):53, Jan. 2011.
-
(2011)
SIGCOMM CCR
, vol.41
, Issue.1
, pp. 53
-
-
Halperin, D.1
Hu, W.2
Sheth, A.3
Wetherall, D.4
-
22
-
-
18944390941
-
The model checker SPIN
-
G. Holzmann. The model checker SPIN. IEEE Trans. Software Eng., 23(5):279-295, 1997.
-
(1997)
IEEE Trans. Software Eng.
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.1
-
23
-
-
60349083720
-
On fast and accurate detection of unauthorized wireless access points using clock skews
-
S. Jana and S. K. Kasera. On fast and accurate detection of unauthorized wireless access points using clock skews. In Proceedings of ACM MobiCom, 2008.
-
(2008)
Proceedings of ACM MobiCom
-
-
Jana, S.1
Kasera, S.K.2
-
24
-
-
84883094081
-
Rejecting the attack: Source authentication for Wi-Fi management frames using CSI information
-
Z. Jiang, J. Zhao, X. Li, J. Han, and W. Xi. Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information. In Proc. of IEEE Infocom, 2013.
-
(2013)
Proc. of IEEE Infocom
-
-
Jiang, Z.1
Zhao, J.2
Li, X.3
Han, J.4
Xi, W.5
-
26
-
-
56749098358
-
Identifying unique devices through wireless fingerprinting
-
Mar.
-
D. C. Loh, C. Y. Cho, C. P. Tan, and R. S. Lee. Identifying unique devices through wireless fingerprinting. In Proc. of the ACM WiSec Conf., pages 46-55, Mar. 2008.
-
(2008)
Proc. of the ACM WiSec Conf.
, pp. 46-55
-
-
Loh, D.C.1
Cho, C.Y.2
Tan, C.P.3
Lee, R.S.4
-
27
-
-
37749006403
-
802.11 User fingerprinting
-
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 user fingerprinting. In Proc. of ACM MobiCom, 2007.
-
(2007)
Proc. of ACM MobiCom
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
28
-
-
51749088454
-
Secure neighborhood discovery: A fundamental element for mobile ad hoc networking
-
Feb.
-
P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Capkun, and J. Hubaux. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking. IEEE Comm. M., 46(2):132-139, Feb. 2008.
-
(2008)
IEEE Comm. M.
, vol.46
, Issue.2
, pp. 132-139
-
-
Papadimitratos, P.1
Poturalski, M.2
Schaller, P.3
Lafourcade, P.4
Basin, D.5
Capkun, S.6
Hubaux, J.7
-
29
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
Sept.
-
N. Patwari and S. Kasera. Robust location distinction using temporal link signatures. In Proc. of the ACM MobiCom Conf., pages 111-122, Sept. 2007.
-
(2007)
Proc. of the ACM MobiCom Conf.
, pp. 111-122
-
-
Patwari, N.1
Kasera, S.2
-
30
-
-
0022683359
-
Multiple emitter location and signal parameter estimation
-
Mar.
-
R. Schmidt. Multiple emitter location and signal parameter estimation. IEEE Trans. on Antennas and Propagation, 34(3):276-280, Mar. 1986.
-
(1986)
IEEE Trans. on Antennas and Propagation
, vol.34
, Issue.3
, pp. 276-280
-
-
Schmidt, R.1
-
33
-
-
54849406264
-
Detecting 802.11 MAC layer spoofing using received signal strength
-
Apr.
-
Y. Sheng, G. Chen, D. Kotz, and A. Campbell. Detecting 802.11 MAC layer spoofing using received signal strength. In Proc. of IEEE Infocom, pages 1768-1776, Apr. 2008.
-
(2008)
Proc. of IEEE Infocom
, pp. 1768-1776
-
-
Sheng, Y.1
Chen, G.2
Kotz, D.3
Campbell, A.4
-
34
-
-
84866599994
-
Argos: Practical many-antenna base stations
-
C. Shepard, H. Yu, N. Anand, L. Li, T. Marzetta, R. Yang, and L. Zhong. Argos: Practical many-antenna base stations. In Proc. of ACM MobiCom, 2012.
-
(2012)
Proc. of ACM MobiCom
-
-
Shepard, C.1
Yu, H.2
Anand, N.3
Li, L.4
Marzetta, T.5
Yang, R.6
Zhong, L.7
-
36
-
-
70450239608
-
Sam: Enabling practical spatial multiple access in wireless LAN
-
K. Tan, H. Liu, J. Fang, W. Wang, J. Zhang, M. Chen, and G. Voelker. SAM: Enabling practical spatial multiple access in wireless LAN. In Proc. of ACM MobiCom, 2009.
-
(2009)
Proc. of ACM MobiCom
-
-
Tan, K.1
Liu, H.2
Fang, J.3
Wang, W.4
Zhang, J.5
Chen, M.6
Voelker, G.7
-
37
-
-
38549101578
-
-
Springer Lecture Notes in Computer Science, 4867, Jan.
-
E. Tews, R.-P.Weinmann, and A. Pyshkin. Breaking 104-bit WEP in less than 60 seconds. Springer Lecture Notes in Computer Science, 4867:188-202, Jan. 2008.
-
(2008)
Breaking 104-bit WEP in Less than 60 Seconds
, pp. 188-202
-
-
Tews, E.1
Weinmann, R.-p.2
Pyshkin, A.3
-
38
-
-
84865566718
-
Secureangle: Improving wireless security using angle-of-arrival signatures
-
J. Xiong and K. Jamieson. SecureAngle: Improving wireless security using angle-of-arrival signatures. In Proc. of ACM HotNets, 2010.
-
(2010)
Proc. of ACM HotNets
-
-
Xiong, J.1
Jamieson, K.2
-
39
-
-
85076686625
-
Array Track: A fine-grained indoor location system
-
J. Xiong and K. Jamieson. ArrayTrack: A Fine-Grained Indoor Location System. In Proc. of NSDI, 2013.
-
(2013)
Proc. of NSDI
-
-
Xiong, J.1
Jamieson, K.2
|