-
1
-
-
84910637656
-
-
Accessed: May 15, 2014
-
Design considerations for minimum SNR. http://www.cisco.com/en/US/docs/wireless/technology/mesh/7.3/design/guide/Mesh-chapter-011.pdf. Accessed: May 15, 2014.
-
Design Considerations for Minimum SNR
-
-
-
3
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
volume 1880 of Lecture Notes in Computer Science, Springer Berlin Heidelberg
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 255-270. Springer Berlin Heidelberg, 2000.
-
(2000)
Advances in Cryptology - CRYPTO 2000
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
5
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In Proc. ACM MobiCom, pages 116-127, 2008.
-
(2008)
Proc. ACM MobiCom
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
6
-
-
33745699032
-
Maximum-likelihood estimation of frequency and time offsets in OFDM systems with multiple sets of identical data
-
July
-
M.-H. Cheng and C.-C. Chou. Maximum-likelihood estimation of frequency and time offsets in OFDM systems with multiple sets of identical data. Signal Processing, IEEE Transactions on, 54(7):2848-2852, July 2006.
-
(2006)
Signal Processing, IEEE Transactions on
, vol.54
, Issue.7
, pp. 2848-2852
-
-
Cheng, M.-H.1
Chou, C.-C.2
-
7
-
-
0032625842
-
Watermarking as communication with side information
-
July
-
I. Cox, M. Miller, and A. McKellips. Watermarking as communication with side information. Proc. IEEE, 87(7):1127-1141, July 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1127-1141
-
-
Cox, I.1
Miller, M.2
McKellips, A.3
-
8
-
-
71049178173
-
Transient-based identification of wireless sensor nodes
-
Apr.
-
B. Danev and S. Capkun. Transient-based identification of wireless sensor nodes. In Int. Conf. Inform. Process. Sensor Netw., pages 25-36, Apr. 2009.
-
(2009)
Int. Conf. Inform. Process. Sensor Netw.
, pp. 25-36
-
-
Danev, B.1
Capkun, S.2
-
9
-
-
77952407534
-
Attacks on physical-layer identification
-
B. Danev, H. Luecken, S. Čapkun, and K. Defrawy. Attacks on physical-layer identification. In ACM WiSec, pages 89-98, 2010.
-
(2010)
ACM WiSec
, pp. 89-98
-
-
Danev, B.1
Luecken, H.2
Čapkun, S.3
Defrawy, K.4
-
10
-
-
84897611045
-
Practical issues for spectrum management with cognitive radios
-
March
-
S. Dudley, W. Headley, M. Lichtman, E. Imana, X. Ma, M. Abdelbar, A. Padaki, A. Ullah, M. Sohul, T. Yang, and J. Reed. Practical issues for spectrum management with cognitive radios. Proceedings of the IEEE, 102(3):242-264, March 2014.
-
(2014)
Proceedings of the IEEE
, vol.102
, Issue.3
, pp. 242-264
-
-
Dudley, S.1
Headley, W.2
Lichtman, M.3
Imana, E.4
Ma, X.5
Abdelbar, M.6
Padaki, A.7
Ullah, A.8
Sohul, M.9
Yang, T.10
Reed, J.11
-
11
-
-
33644995185
-
Analysis and design of secure watermark-based authentication systems
-
Mar.
-
C. Fei, D. Kundur, and R. Kwong. Analysis and design of secure watermark-based authentication systems. IEEE Trans. Inform. Forensics Security, 1(1):43-55, Mar. 2006.
-
(2006)
IEEE Trans. Inform. Forensics Security
, vol.1
, Issue.1
, pp. 43-55
-
-
Fei, C.1
Kundur, D.2
Kwong, R.3
-
12
-
-
62949158691
-
Blind synchronization for OFDM systems in multipath channels
-
T. Fusco and M. Tanda. Blind synchronization for OFDM systems in multipath channels. IEEE Trans. Wireless Commun., 8(3):1340-1348, 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1340-1348
-
-
Fusco, T.1
Tanda, M.2
-
14
-
-
84910678430
-
Physical layer authentication in OFDM systems based on hypothesis testing of CFO estimates
-
W. Hou, X. Wang, and J.-Y. Chouinard. Physical layer authentication in OFDM systems based on hypothesis testing of CFO estimates. In IEEE ICC, 2012.
-
(2012)
IEEE ICC
-
-
Hou, W.1
Wang, X.2
Chouinard, J.-Y.3
-
16
-
-
4544248818
-
Radio frequency watermarking for OFDM wireless networks
-
May
-
J. Kleider, S. Gifford, S. Chuprun, and B. Fette. Radio frequency watermarking for OFDM wireless networks. In Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Process., volume 5, pages 397-400, May 2004.
-
(2004)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Process.
, vol.5
, pp. 397-400
-
-
Kleider, J.1
Gifford, S.2
Chuprun, S.3
Fette, B.4
-
17
-
-
84893562953
-
PHY-layer authentication by introducing controlled inter symbol interference
-
V. Kumar, J.-M. Park, T. Clancy, and K. Bian. PHY-layer authentication by introducing controlled inter symbol interference. In IEEE CNS, pages 10-18, 2013.
-
(2013)
IEEE CNS
, pp. 10-18
-
-
Kumar, V.1
Park, J.-M.2
Clancy, T.3
Bian, K.4
-
18
-
-
1842715081
-
The advantages of elliptic curve cryptography for wireless security
-
K. Lauter. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications, page 63, 2004.
-
(2004)
IEEE Wireless Communications
, pp. 63
-
-
Lauter, K.1
-
19
-
-
70350055213
-
An architecture for secure software defined radio
-
C. Li, A. Raghunathan, and N. Jha. An architecture for secure software defined radio. In Design, Automation and Test in Europe (DATE), pages 448-453, 2009.
-
(2009)
Design, Automation and Test in Europe (DATE)
, pp. 448-453
-
-
Li, C.1
Raghunathan, A.2
Jha, N.3
-
20
-
-
77955196382
-
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
-
May
-
Y. Liu, P. Ning, and H. Dai. Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In IEEE Symp. Security and Privacy, pages 286-301, May 2010.
-
(2010)
IEEE Symp. Security and Privacy
, pp. 286-301
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
-
21
-
-
80051889486
-
Short paper: ACE: Authenticating the channel estimation process in wireless communication systems
-
R. Miller and W. Trappe. Short paper: ACE: authenticating the channel estimation process in wireless communication systems. In Proc. ACM WiSec, pages 91-96, 2011.
-
(2011)
Proc. ACM WiSec
, pp. 91-96
-
-
Miller, R.1
Trappe, W.2
-
22
-
-
84897653172
-
Security and enforcement in spectrum sharing
-
March
-
J.-M. Park, J. Reed, A. Beex, T. Clancy, V. Kumar, and B. Bahrak. Security and enforcement in spectrum sharing. Proc. IEEE, 102(3):270-281, March 2014.
-
(2014)
Proc. IEEE
, vol.102
, Issue.3
, pp. 270-281
-
-
Park, J.-M.1
Reed, J.2
Beex, A.3
Clancy, T.4
Kumar, V.5
Bahrak, B.6
-
23
-
-
79952991896
-
Blind estimation of OFDM parameters in cognitive radio networks
-
March
-
A. Punchihewa, V. Bhargava, and C. Despins. Blind estimation of OFDM parameters in cognitive radio networks. IEEE Trans. Wireless Commun., 10(3):733-738, March 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.3
, pp. 733-738
-
-
Punchihewa, A.1
Bhargava, V.2
Despins, C.3
-
24
-
-
84910627827
-
-
April. US Patent App
-
N. Smith, D. Johnston, G. Cox, and A. Shaliv. Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware, April 2014. US Patent App. 13/631,562.
-
(2014)
Device, Method, And System For Secure Trust Anchor Provisioning And Protection Using Tamper-resistant Hardware
-
-
Smith, N.1
Johnston, D.2
Cox, G.3
Shaliv, A.4
-
25
-
-
80051914579
-
Cryptographic link signatures for spectrum usage authentication in cognitive radio
-
June
-
X. Tan, K. Borle, W. Du, and B. Chen. Cryptographic link signatures for spectrum usage authentication in cognitive radio. In Proc. ACM WiSec, pages 79-90, June 2011.
-
(2011)
Proc. ACM WiSec
, pp. 79-90
-
-
Tan, X.1
Borle, K.2
Du, W.3
Chen, B.4
-
26
-
-
84869380841
-
A comparison of PHY layer on the Ecma-392 and IEEE 802.11af standards
-
J.-S. Um, S.-H. Hwang, and B.-J. Jeong. A comparison of PHY layer on the Ecma-392 and IEEE 802.11af standards. In CROWNCOM, 7th Int. ICST Conf. on, pages 313-319, 2012.
-
(2012)
CROWNCOM, 7th Int. ICST Conf. on
, pp. 313-319
-
-
Um, J.-S.1
Hwang, S.-H.2
Jeong, B.-J.3
-
28
-
-
5444259436
-
Transmitter identification using embedded pseudo random sequences
-
Sep.
-
X. Wang, Y. Wu, and B. Caron. Transmitter identification using embedded pseudo random sequences. IEEE Trans. Broadcast., 50:244-252, Sep. 2004.
-
(2004)
IEEE Trans. Broadcast.
, vol.50
, pp. 244-252
-
-
Wang, X.1
Wu, Y.2
Caron, B.3
-
29
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
July
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe. Using the physical layer for wireless authentication in time-variant channels. IEEE Trans. Wireless Commun., 7(7):2571-2579, July 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
30
-
-
70449632782
-
Tamper resistance for software defined radio software
-
S. Xiao, J. Park, and Y. Ye. Tamper resistance for software defined radio software. In COMPSAC, pages 383-391, 2009.
-
(2009)
COMPSAC
, pp. 383-391
-
-
Xiao, S.1
Park, J.2
Ye, Y.3
-
31
-
-
84863553166
-
Enforcing dynamic spectrum access with spectrum permits
-
L. Yang, Z. Zhang, B. Y. Zhao, C. Kruegel, and H. Zheng. Enforcing dynamic spectrum access with spectrum permits. In Proc. ACM MobiHoc, pages 195-204, 2012.
-
(2012)
Proc. ACM MobiHoc
, pp. 195-204
-
-
Yang, L.1
Zhang, Z.2
Zhao, B.Y.3
Kruegel, C.4
Zheng, H.5
-
32
-
-
39449137863
-
Physical-layer authentication
-
Mar.
-
P. Yu, J. Baras, and B. Sadler. Physical-layer authentication. IEEE Trans. Inf. Forensics Security, 3(1):38-51, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.1
, pp. 38-51
-
-
Yu, P.1
Baras, J.2
Sadler, B.3
-
33
-
-
39349101790
-
OFDM signal identification and transmission parameter estimation for cognitive radio applications
-
T. Yucek and H. Arslan. OFDM signal identification and transmission parameter estimation for cognitive radio applications. In IEEE GlobeCom, pages 4056-4060, 2007.
-
(2007)
IEEE GlobeCom
, pp. 4056-4060
-
-
Yucek, T.1
Arslan, H.2
|