-
1
-
-
84930331322
-
-
[Online]. Available: Accessed on Jan. 01 2013
-
Google, Google Wallet [Online]. Available: http://www.google.com/wallet/index.html. Accessed on Jan. 01, 2013.
-
Google Google Wallet
-
-
-
4
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
A. Perrig, J. M. Mccune, and M. K. Reiter, "Seeing-is-believing: Using camera phones for human-verifiable authentication," in Proc. IEEE Symp. Security Privacy, 2005, pp. 110-124.
-
(2005)
Proc. IEEE Symp. Security Privacy
, pp. 110-124
-
-
Perrig, A.1
McCune, J.M.2
Reiter, M.K.3
-
5
-
-
70350716576
-
Usability and security of out-ofband channels in secure device pairing protocols
-
R. Kainda, I. Flechais, and A. W. Roscoe, "Usability and security of out-ofband channels in secure device pairing protocols," in Proc. SOUPS '09, ACM, 2009, pp. 11:1-11:12.
-
(2009)
Proc. SOUPS '09 ACM
, pp. 111-1112
-
-
Kainda, R.1
Flechais, I.2
Roscoe, A.W.3
-
6
-
-
70349882603
-
Hf rfid eavesdropping and jamming tests
-
Tech. Rep. 818-7-71
-
J. Guerrieri and D. Novotny, "HF RFID eavesdropping and jamming tests," Electromagnetics Div., Electronics and Electrical Engineering Lab., National Inst. Standards and Technology, Tech. Rep. 818-7-71, 2006.
-
(2006)
Electromagnetics Div., Electronics and Electrical Engineering Lab., National Inst. Standards and Technology
-
-
Guerrieri, J.1
Novotny, D.2
-
7
-
-
84876153423
-
-
Norm ECMA-385" [Online]. Available
-
Norm ECMA-385, "NFC-SEC: NFCIP-1 Security Services and Protocol" [Online]. Available: http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-385.pdf, 2010.
-
(2010)
NFC-SEC: NFCIP-1 Security Services and Protocol
-
-
-
9
-
-
80053284276
-
A survey of architectures and localization techniques for underwater acoustic sensor networks
-
M. Erol-Kantarci, H. T. Mouftah, and S. F. Oktug, "A survey of architectures and localization techniques for underwater acoustic sensor networks," IEEE Commun. Surveys Tuts., vol. 13, no. 3, pp. 487-502, 2011.
-
(2011)
IEEE Commun. Surveys Tuts.
, vol.13
, Issue.3
, pp. 487-502
-
-
Erol-Kantarci, M.1
Mouftah, H.T.2
Oktug, S.F.3
-
10
-
-
85008041901
-
Growth of underwater communication technology in the u.s. Navy
-
Jan.
-
R. Headrick and L. Freitag, "Growth of underwater communication technology in the U.S. Navy," IEEE Commun. Mag., vol. 47, no. 1, pp. 80-82, Jan. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.1
, pp. 80-82
-
-
Headrick, R.1
Freitag, L.2
-
11
-
-
50249180134
-
Software acoustic modems for short range mote-based underwater sensor networks
-
R. Jurdak, C. V. Lopes, and P. Baldi, "Software acoustic modems for short range mote-based underwater sensor networks," in Proc. IEEE Oceans Asia, 2006, pp. 1-7.
-
(2006)
Proc. IEEE Oceans Asia
, pp. 1-7
-
-
Jurdak, R.1
Lopes, C.V.2
Baldi, P.3
-
12
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
13
-
-
0035448026
-
Blind separation of instantaneous mixtures of non-stationary sources
-
Sep.
-
D. Phan and J. Cardoso, "Blind separation of instantaneous mixtures of non-stationary sources," IEEE Trans. Signal Process., vol. 49, no. 9, pp. 1837-1848, Sep. 2001.
-
(2001)
IEEE Trans. Signal Process.
, vol.49
, Issue.9
, pp. 1837-1848
-
-
Phan, D.1
Cardoso, J.2
-
14
-
-
0033083243
-
Neural networks for blind separation with unknown number of sources
-
A. Cichocki, J. Karhunen, W. Kasprzak, and R. Vigario, "Neural networks for blind separation with unknown number of sources," Neurocomputing, vol. 24, no. 1, p. 5593, 1999.
-
(1999)
Neurocomputing
, vol.24
, Issue.1
, pp. 5593
-
-
Cichocki, A.1
Karhunen, J.2
Kasprzak, W.3
Vigario, R.4
-
15
-
-
85015528741
-
Blind separation of convolved mixtures in the frequency domain
-
P. Smaragdis, "Blind separation of convolved mixtures in the frequency domain," Neurocomputing, vol. 15, pp. 745-770, 1998.
-
(1998)
Neurocomputing
, vol.15
, pp. 745-770
-
-
Smaragdis, P.1
-
16
-
-
0032187518
-
Blind source separations: Statistical principles
-
J. Cardoso, "Blind source separations: Statistical principles," Proc. IEEE, vol. 86, no. 10, pp. 2009-2025, 1998.
-
(1998)
Proc. IEEE
, vol.86
, Issue.10
, pp. 2009-2025
-
-
Cardoso, J.1
-
17
-
-
0141813716
-
Multi-channel source separation by factorial hmms
-
M. Reyes-Gomez, B. Raj, and D. Eliss, "Multi-channel source separation by factorial HMMS," in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), 2003, pp. 664-667.
-
(2003)
Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP)
, pp. 664-667
-
-
Reyes-Gomez, M.1
Raj, B.2
Eliss, D.3
-
19
-
-
0141630475
-
Non-negative sparse representation for wiener based source separation with a single sensor
-
L. Benaroya, L. McDonagh, F. Bimbot, and R. Gribonval, "Non-negative sparse representation for Wiener based source separation with a single sensor," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP), pp. 613-616, 2004.
-
(2004)
Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP)
, pp. 613-616
-
-
Benaroya, L.1
McDonagh, L.2
Bimbot, F.3
Gribonval, R.4
-
20
-
-
50549175697
-
On a class of error correcting binary group codes
-
Mar.
-
R. C. Bose and D. K. Ray-Chaudhuri, "On a class of error correcting binary group codes," Inf. Control, vol. 3, no. 1, pp. 68-79, Mar. 1960.
-
(1960)
Inf. Control
, vol.3
, Issue.1
, pp. 68-79
-
-
Bose, R.C.1
Ray-Chaudhuri, D.K.2
-
21
-
-
84884829859
-
Noncoherent amplifyand-forward cooperative networks: Robust detection and performance analysis
-
Sep.
-
P. Liu, S. Gazor, I.-M. Kim, and D. I. Kim, "Noncoherent amplifyand-forward cooperative networks: Robust detection and performance analysis," IEEE Trans. Commun., vol. 61, no. 9, pp. 3644-3659, Sep. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.9
, pp. 3644-3659
-
-
Liu, P.1
Gazor, S.2
Kim, I.-M.3
Kim, D.I.4
-
22
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: Non-invasive security for implantable medical devices," in Proc. SIGCOMM, 2011, pp. 2-13.
-
(2011)
Proc. SIGCOMM
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
23
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
25
-
-
84931425598
-
Secret communication using artificial noise
-
R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. IEEE Veh. Technol. Conf., 2005, pp. 1906-1910.
-
(2005)
Proc. IEEE Veh. Technol. Conf.
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
26
-
-
85015520702
-
On limitations of friendly jamming for confidentiality
-
N. O. Tippenhauer, L. Malisa, A. Ranganathan, and S. Capkun, "On limitations of friendly jamming for confidentiality," in Proc. S & P (Oakland), 2013.
-
(2013)
Proc. S & P (Oakland)
-
-
Tippenhauer, N.O.1
Malisa, L.2
Ranganathan, A.3
Capkun, S.4
-
27
-
-
84883296152
-
Dhwani: Secure peer-to-peer acoustic nfc
-
New York, NY, USA: ACM [Online]. Available
-
R. Nandakumar, K. K. Chintalapudi, V. Padmanabhan, and R. Venkatesan, "Dhwani: Secure peer-to-peer acoustic NFC," in Proc. ACM SIGCOMM Conf. SIGCOMM, Ser. SIGCOMM '13, New York, NY, USA: ACM, 2013, pp. 63-74 [Online]. Available: http://doi.acm.org/10.1145/2486001. 2486037.
-
(2013)
Proc. ACM SIGCOMM Conf. SIGCOMM, Ser. SIGCOMM
, vol.13
, pp. 63-74
-
-
Nandakumar, R.1
Chintalapudi, K.K.2
Padmanabhan, V.3
Venkatesan, R.4
-
28
-
-
85015518171
-
The failure of noise-based non-continuous audio captchas
-
E. Bursztein, R. Beauxis, H. Paskov, D. Perito, C. Fabry, and J. C. Mitchell, "The failure of noise-based non-continuous audio captchas," in Proc. S&P (Oakland), 2011.
-
(2011)
Proc. S&P (Oakland)
-
-
Bursztein, E.1
Beauxis, R.2
Paskov, H.3
Perito, D.4
Fabry, C.5
Mitchell, J.C.6
-
30
-
-
84920790154
-
-
[Online]. Available: Accessed on Jan. 01 2013
-
K. Mostafa, Minimodem [Online]. Available: http://www.whence.com/minimodem/. Accessed on Jan. 01, 2013.
-
Minimodem
-
-
Mostafa, K.1
-
32
-
-
85076220979
-
I want my voice to be heard: Ip over voice-over-ip for unobservable censorship circumvention
-
A. Houmansadr, T. Riedl, N. Borisov, and A. Singer, "I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention," in Proc. NDSS, 2013, pp. 1-17.
-
(2013)
Proc. NDSS
, pp. 1-17
-
-
Houmansadr, A.1
Riedl, T.2
Borisov, N.3
Singer, A.4
-
33
-
-
1442284716
-
Acoustic modems for ubiquitous computing
-
Jul.
-
C. Lopes and P. Aguiar, "Acoustic modems for ubiquitous computing," IEEE Pervasive Comput., vol. 2, no. 3, pp. 62-71, Jul. 2003.
-
(2003)
IEEE Pervasive Comput.
, vol.2
, Issue.3
, pp. 62-71
-
-
Lopes, C.1
Aguiar, P.2
-
34
-
-
33947097020
-
Thewhoi micro-modem: An acoustic communications and navigation system for multiple platforms
-
L. Freitag,M. Grund, I. Singh, J. Partan, P. Koski,K. Ball et al., "TheWHOI micro-modem: An acoustic communications and navigation system for multiple platforms," in Proc. IEEEOCEANSConf. Exhib., 2005, pp. 1086-1092.
-
(2005)
Proc. IEEEOCEANSConf. Exhib.
, pp. 1086-1092
-
-
Freitag, L.1
Grund, M.2
Singh, I.3
Partan, J.4
Koski, P.5
Ball, K.6
-
35
-
-
84930358948
-
-
CNET Naratte: [Online]. Available
-
CNET, Naratte: Mobile payments using sound waves [Online]. Available: http://news.cnet.com/8301-19882-3-20072295-250/naratte-mobile-paymentsusing-sound-waves/.
-
Mobile Payments Using Sound Waves
-
-
-
36
-
-
84930333000
-
-
[Online]. Available:/. Accessed on Apr. 15 2013
-
Alipay, Sound wave mobile payment [Online]. Available: http://techcrunch. com/2013/04/14/alipay-launches-sound-wave-mobile-payments-systemin-beijing-subway/. Accessed on Apr. 15, 2013.
-
Alipay, Sound Wave Mobile Payment
-
-
|