-
1
-
-
84893566708
-
-
accessed: March 1, 2013
-
J. Bernhard, J. Reed, J.-M. Park, and A. Clegg, "Final report of the NSF workshop on enhancing access to the radio spectrum (EARS)," http://www.nsf.gov/mps/ast/nsf-ears-workshop-2010-final-report.pdf, 2010, accessed: March 1, 2013.
-
(2010)
Final Report of the NSF Workshop on Enhancing Access to the Radio Spectrum (EARS)
-
-
Bernhard, J.1
Reed, J.2
Park, J.-M.3
Clegg, A.4
-
2
-
-
39449137863
-
Physical-layer authentication
-
Mar.
-
P. Yu, J. Baras, and B. Sadler, "Physical-layer authentication, " IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 38-51, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.1
, pp. 38-51
-
-
Yu, P.1
Baras, J.2
Sadler, B.3
-
3
-
-
52049112333
-
Multicarrier authentication at the physical layer
-
-, "Multicarrier authentication at the physical layer," in Int. Symp. on World of Wireless, Mobile and Multimedia Networks, June 2008, pp. 1-6.
-
Int. Symp. On World of Wireless, Mobile and Multimedia Networks, June 2008
, pp. 1-6
-
-
Yu, P.1
Baras, J.2
Sadler, B.3
-
4
-
-
80051914579
-
Cryptographic link signatures for spectrum usage authentication in cognitive radio
-
X. Tan, K. Borle, W. Du, and B. Chen, "Cryptographic link signatures for spectrum usage authentication in cognitive radio," in Proc. ACM WiSec, June 2011, pp. 79-90.
-
Proc. ACM WiSec, June 2011
, pp. 79-90
-
-
Tan, X.1
Borle, K.2
Du, W.3
Chen, B.4
-
5
-
-
77953185209
-
Physical layer authentication watermarks through synthetic channel emulation
-
N. Goergen, T. Clancy, and T. Newman, "Physical layer authentication watermarks through synthetic channel emulation," in IEEE Symp. New Frontiers Dynamic Spectrum, Apr. 2010, pp. 1-7.
-
IEEE Symp. New Frontiers Dynamic Spectrum, Apr. 2010
, pp. 1-7
-
-
Goergen, N.1
Clancy, T.2
Newman, T.3
-
6
-
-
84865520742
-
On the limitation of embedding cryptographic signature for primary transmitter authentication
-
Aug.
-
T. Jiang, H. Zeng, Q. Yan, W. Lou, and Y. Hou, "On the limitation of embedding cryptographic signature for primary transmitter authentication," IEEE Wireless Commun. Letters, vol. 1, no. 4, pp. 324-327, Aug. 2012.
-
(2012)
IEEE Wireless Commun. Letters
, vol.1
, Issue.4
, pp. 324-327
-
-
Jiang, T.1
Zeng, H.2
Yan, Q.3
Lou, W.4
Hou, Y.5
-
7
-
-
0017512893
-
Correlative coding: A bandwidth-efficient signaling scheme
-
July
-
S. Pasupathy, "Correlative coding: A bandwidth-efficient signaling scheme," IEEE Commun. Soc. Mag., vol. 15, no. 4, pp. 4-11, July 1977.
-
(1977)
IEEE Commun. Soc. Mag.
, vol.15
, Issue.4
, pp. 4-11
-
-
Pasupathy, S.1
-
8
-
-
0035681586
-
Partial response signaling for enhanced spectral efficiency and RF performance in OFDM systems
-
V. Vadde and S. Gray, "Partial response signaling for enhanced spectral efficiency and RF performance in OFDM systems," in IEEE Global Telecommun. Conf., vol. 5, 2001, pp. 3120-3124. (Pubitemid 34059165)
-
(2001)
Conference Record / IEEE Global Telecommunications Conference
, vol.5
, pp. 3120-3124
-
-
Vadde, V.1
Gray, S.2
-
10
-
-
0015346024
-
Maximum-likelihood sequence estimation of digital sequences in the presence of intersymbol interference
-
May
-
J. Forney, G., "Maximum-likelihood sequence estimation of digital sequences in the presence of intersymbol interference," IEEE Tran. Info. Theory, vol. 18, no. 3, pp. 363-378, May 1972.
-
(1972)
IEEE Tran. Info. Theory
, vol.18
, Issue.3
, pp. 363-378
-
-
Forney, G.J.1
-
11
-
-
0015600423
-
The viterbi algorithm
-
March
-
J. Forney, G.D., "The viterbi algorithm," IEEE Proc., vol. 61, no. 3, pp. 268-278, March 1973.
-
(1973)
IEEE Proc.
, vol.61
, Issue.3
, pp. 268-278
-
-
Forney, G.D.J.1
-
12
-
-
84863553166
-
Enforcing dynamic spectrum access with spectrum permits
-
L. Yang, Z. Zhang, B. Y. Zhao, C. Kruegel, and H. Zheng, "Enforcing dynamic spectrum access with spectrum permits," in Proc. ACM MobiHoc, 2012, pp. 195-204.
-
Proc. ACM MobiHoc, 2012
, pp. 195-204
-
-
Yang, L.1
Zhang, Z.2
Zhao, B.Y.3
Kruegel, C.4
Zheng, H.5
-
13
-
-
38049181728
-
Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting
-
Oct.
-
J. Hall, M. Barbeau, and E. Kranakis, "Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting," in Commun. Comput. Netw., Oct. 2006.
-
(2006)
Commun. Comput. Netw.
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
14
-
-
34249822230
-
Wireless security through RF fingerprinting
-
O. Ureten and N. Serinken, "Wireless security through RF fingerprinting," Canadian J. Electr. Comput. Eng., vol. 32, no. 1, pp. 27-33, 2007.
-
(2007)
Canadian J. Electr. Comput. Eng.
, vol.32
, Issue.1
, pp. 27-33
-
-
Ureten, O.1
Serinken, N.2
-
15
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures," in Proc. ACM MobiCom, 2008, pp. 116-127.
-
Proc. ACM MobiCom, 2008
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
18
-
-
0032625842
-
Watermarking as communication with side information
-
July
-
I. Cox, M. Miller, and A. McKellips, "Watermarking as communication with side information," Proc. IEEE, vol. 87, no. 7, pp. 1127-1141, July 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1127-1141
-
-
Cox, I.1
Miller, M.2
McKellips, A.3
-
19
-
-
33644995185
-
Analysis and design of secure watermark-based authentication systems
-
Mar.
-
C. Fei, D. Kundur, and R. Kwong, "Analysis and design of secure watermark-based authentication systems," IEEE Trans. Inform. Forensics Security, vol. 1, no. 1, pp. 43-55, Mar. 2006.
-
(2006)
IEEE Trans. Inform. Forensics Security
, vol.1
, Issue.1
, pp. 43-55
-
-
Fei, C.1
Kundur, D.2
Kwong, R.3
-
20
-
-
4544248818
-
Radio frequency watermarking for OFDM wireless networks
-
May
-
J. Kleider, S. Gifford, S. Chuprun, and B. Fette, "Radio frequency watermarking for OFDM wireless networks," in IEEE Int. Conf. Acoustics, Speech, and Signal Process. Proc., vol. 5, May 2004, pp. 397-400.
-
(2004)
IEEE Int. Conf. Acoustics, Speech, and Signal Process. Proc.
, vol.5
, pp. 397-400
-
-
Kleider, J.1
Gifford, S.2
Chuprun, S.3
Fette, B.4
-
21
-
-
5444259436
-
Transmitter identification using embedded pseudo random sequences
-
Sep.
-
X. Wang, Y. Wu, and B. Caron, "Transmitter identification using embedded pseudo random sequences," IEEE Trans. Broadcast., vol. 50, pp. 244-252, Sep. 2004.
-
(2004)
IEEE Trans. Broadcast.
, vol.50
, pp. 244-252
-
-
Wang, X.1
Wu, Y.2
Caron, B.3
-
22
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
July
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2571-2579, July 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
23
-
-
77955196382
-
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
-
Y. Liu, P. Ning, and H. Dai, "Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures," in IEEE Symp. Security and Privacy, May 2010, pp. 286-301.
-
IEEE Symp. Security and Privacy, May 2010
, pp. 286-301
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
-
24
-
-
80051889486
-
Short paper: ACE: Authenticating the channel estimation process in wireless communication systems
-
R. Miller and W. Trappe, "Short paper: ACE: authenticating the channel estimation process in wireless communication systems," in Proc. ACM WiSec, 2011, pp. 91-96.
-
Proc. ACM WiSec, 2011
, pp. 91-96
-
-
Miller, R.1
Trappe, W.2
|