-
2
-
-
77956062706
-
RFID: From supply chains to sensor nets
-
Aug.
-
S. Roy, V. Jandhyala, J. R. Smith, D. J. Wetherall, B. P. Otis, R. Chakraborty, M. Buettner, D. J. Yeager, Y. C. Ko, and A. P. Sample, "RFID: from supply chains to sensor nets," Proc. IEEE, vol. 98, no. 9, pp. 1583-1592, Aug. 2010.
-
(2010)
Proc. IEEE
, vol.98
, Issue.9
, pp. 1583-1592
-
-
Roy, S.1
Jandhyala, V.2
Smith, J.R.3
Wetherall, D.J.4
Otis, B.P.5
Chakraborty, R.6
Buettner, M.7
Yeager, D.J.8
Ko, Y.C.9
Sample, A.P.10
-
3
-
-
36849036303
-
RF tag antenna performance on various materials using radio link budgets
-
Dec.
-
J. D. Griffin, G. D. Durgina, A. Haldi, and B. Kippelen, "RF tag antenna performance on various materials using radio link budgets," IEEE Antennas Wireless Propag. Lett., vol. 5, no. 1, pp. 247-250, Dec. 2006.
-
(2006)
IEEE Antennas Wireless Propag. Lett.
, vol.5
, Issue.1
, pp. 247-250
-
-
Griffin, J.D.1
Durgina, G.D.2
Haldi, A.3
Kippelen, B.4
-
4
-
-
30344466340
-
Security standards for the RFID market
-
DOI 10.1109/MSP.2005.157
-
T. Philips, T. Karygiannis, and R. Kuhn, "Security standards for the RFID market," IEEE Security Privacy, vol. 3, no. 6, pp. 85-89, Nov. 2005. (Pubitemid 43060402)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.6
, pp. 85-89
-
-
Phillips, T.1
Karygiannis, T.2
Kuhn, R.3
-
5
-
-
84866599640
-
Energy-efficient RF source power control for opportunistic distributed sensing in wireless passive sensor networks
-
A. O. Bicen and O. B. Akan, "Energy-efficient RF source power control for opportunistic distributed sensing in wireless passive sensor networks," in Proc. 2012 IEEE Symp. Comput. Commun.
-
Proc. 2012 IEEE Symp. Comput. Commun.
-
-
Bicen, A.O.1
Akan, O.B.2
-
6
-
-
77955678553
-
Improving backscatter radio tag efficiency
-
June
-
A. Blestas, A. G. Dimitriou, and J. N. Sahalos, "Improving backscatter radio tag efficiency," IEEE Trans. Microwave Theory Techniques, vol. 58, no. 6, pp. 1502-1509, June 2010.
-
(2010)
IEEE Trans. Microwave Theory Techniques
, vol.58
, Issue.6
, pp. 1502-1509
-
-
Blestas, A.1
Dimitriou, A.G.2
Sahalos, J.N.3
-
7
-
-
40549091679
-
Gains for RF tags using multiple antennas
-
DOI 10.1109/TAP.2007.915423
-
J. D. Griffin and G. D. Durgin, "Gains for RF tags using multiple antennas," IEEE Trans. Antennas Propag., vol. 56, no. 2, pp. 563-570, Feb. 2008. (Pubitemid 351359333)
-
(2008)
IEEE Transactions on Antennas and Propagation
, vol.56
, Issue.2
, pp. 563-570
-
-
Griffin, J.D.1
Durgin, G.D.2
-
9
-
-
31344448830
-
A 950-MHz rectifier circuit for sensor network tags with 10-m distance
-
DOI 10.1109/JSSC.2005.858620
-
H. Yoshida, S. Sekine, Y. Fujita, T. Suzuki, and S. Otaka, "A 950-MHz rectifier circuit for sensor network tags with 10-m distance," IEEE J. Solid State Circuits, vol. 41, no. 1, pp. 35-41, Jan. 2006. (Pubitemid 43145960)
-
(2006)
IEEE Journal of Solid-State Circuits
, vol.41
, Issue.1
, pp. 35-41
-
-
Umeda, T.1
Yoshida, H.2
Sekine, S.3
Fujita, Y.4
Suzuki, T.5
Otaka, S.6
-
10
-
-
84855460528
-
Wideband characterization of backscatter channels: Derivations and theoretical background
-
Jan.
-
D. Arnitz, U. Muehlmann, and K. Witrisal, "Wideband characterization of backscatter channels: derivations and theoretical background," IEEE Trans. Antennas Propag., vol. 60, no. 1, pp. 257-266, Jan. 2012.
-
(2012)
IEEE Trans. Antennas Propag.
, vol.60
, Issue.1
, pp. 257-266
-
-
Arnitz, D.1
Muehlmann, U.2
Witrisal, K.3
-
11
-
-
84855345134
-
DDC: A novel scheme to directly decode the collisions in UHF RFID systems
-
Dec.
-
L. Kang, K. Wu, J. Zhang, H. Tan, and L. Ni, "DDC: a novel scheme to directly decode the collisions in UHF RFID systems," IEEE Trans. Parallel Distributed Comput., vol. 23, no. 2, pp. 263-270, Dec. 2011.
-
(2011)
IEEE Trans. Parallel Distributed Comput.
, vol.23
, Issue.2
, pp. 263-270
-
-
Kang, L.1
Wu, K.2
Zhang, J.3
Tan, H.4
Ni, L.5
-
12
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
A. Juels, "RFID security and privacy: a research survey," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 381-394, Feb. 2006. (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
15
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
Dec.
-
S. Piramuthu, "SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity," IEEE Trans. Dependable Secure Comput., vol. 4, no. 4, pp. 337-340, Dec. 2007.
-
(2007)
IEEE Trans. Dependable Secure Comput.
, vol.4
, Issue.4
, pp. 337-340
-
-
Piramuthu, S.1
-
21
-
-
36248977046
-
Security analysis of two ultra-lightweight RFID authentication protocols
-
T. Li and G. Wang, "Security analysis of two ultra-lightweight RFID authentication protocols," in Proc. 2007 IFIP SEC.
-
Proc. 2007 IFIP SEC.
-
-
Li, T.1
Wang, G.2
-
23
-
-
84871285357
-
EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications
-
EPCGlobal
-
EPCGlobal, "EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications," Tech. Rep. Available: http://www.epcglobalinc.org
-
Tech. Rep.
-
-
-
24
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell System Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
25
-
-
73449104694
-
Compound wire-tap channels
-
Article ID 142374, pages
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai, "Compound wire-tap channels," EURASIP J. Wireless Commun. Netw., vol. 2009, Article ID 142374, 12 pages, 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, vol.2009
, pp. 12
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai, S.4
-
26
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Sept.
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Sept. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
29
-
-
84893468086
-
A broadcast approach for fading wiretap channels
-
Feb.
-
Y. Liang, L. Lai, S. Shamai, and H. V. Poor, "A broadcast approach for fading wiretap channels," IEEE Trans. Inf. Theory, vol. 60, no. 2, pp. 842-858, Feb. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.2
, pp. 842-858
-
-
Liang, Y.1
Lai, L.2
Shamai, S.3
Poor, H.V.4
-
30
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
31
-
-
76649135514
-
Physical layer security game: Interaction between source, eavesdropper and friendly jammer
-
June
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: interaction between source, eavesdropper and friendly jammer," EURASIP J. Wireless Commun. Netw., Special Issue on Wireless Physical Layer Security, vol. 2009, June 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw., Special Issue on Wireless Physical Layer Security
, vol.2009
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
32
-
-
84867799883
-
Physical layer security for two way relay communications with untrusted relay and friendly jammers
-
to appear
-
R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two way relay communications with untrusted relay and friendly jammers," IEEE Trans. Veh. Technol., to appear, 2012.
-
(2012)
IEEE Trans. Veh. Technol.
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
33
-
-
79960857245
-
Physical layer wireless security made fast and channel independent
-
S. Gollakota and D. Katabi, "Physical layer wireless security made fast and channel independent," in Proc. 2011 IEEE INFOCOM.
-
Proc. 2011 IEEE INFOCOM.
-
-
Gollakota, S.1
Katabi, D.2
-
34
-
-
80053983111
-
Secrecy throughput of MANETs with active and passive attacks
-
Oct.
-
Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs with active and passive attacks," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6692-6702, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6692-6702
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
36
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
37
-
-
84855381750
-
Outage probability based power distribution between data and artificial noise for physical layer security
-
Feb.
-
N. Romero-Zurita, M. Ghogho, and D. McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
-
(2012)
IEEE Signal Process. Lett.
, vol.19
, Issue.2
, pp. 71-74
-
-
Romero-Zurita, N.1
Ghogho, M.2
McLernon, D.3
-
38
-
-
84858390705
-
Secrecy outage in MISO systems with partial channel information
-
Apr.
-
S. Gerbracht, C. Scheunert, and E. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 704-716
-
-
Gerbracht, S.1
Scheunert, C.2
Jorswieck, E.3
-
39
-
-
79955491895
-
Interference assisted secret communication
-
May
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
40
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
41
-
-
78650419602
-
RFID reader receivers for physical layer collision recovery
-
Dec.
-
C. M. Angerer, R. Langwieser, and M. Rupp, "RFID reader receivers for physical layer collision recovery," IEEE Trans. Commun., vol. 58, no. 12, pp. 3526-3537, Dec. 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.12
, pp. 3526-3537
-
-
Angerer, C.M.1
Langwieser, R.2
Rupp, M.3
-
42
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
|