-
4
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the Physical Layer for Wireless Authentication in Time-Variant Channels", IEEE Trans. Wireless Commun., vol. 7, 2008, pp. 2571-79.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
5
-
-
69749083720
-
Channel-based detection of sybil attacks in wireless networks
-
L. Xiao et al., "Channel-Based Detection of Sybil Attacks in Wireless Networks", IEEE Trans. Info. Forensics Security, vol. 4, 2009, pp. 492-503.
-
(2009)
IEEE Trans. Info. Forensics Security
, vol.4
, pp. 492-503
-
-
Xiao, L.1
-
6
-
-
79952383608
-
Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas
-
Sept.
-
X. He and A. Yener, "Providing Secrecy When the Eavesdropper Channel is Arbitrarily Varying: A Case for Multiple Antennas", Proc. 2010 48th Annual Allerton Conf. Commun., Control, and Computing, Sept. 2010, pp. 1228-35.
-
(2010)
Proc. 2010 48th Annual Allerton Conf. Commun., Control, and Computing
, pp. 1228-1235
-
-
He, X.1
Yener, A.2
-
9
-
-
84883075684
-
Is link signature dependable for wireless security?
-
April
-
X. He et al., "Is Link Signature Dependable for Wireless Security?" Proc. IEEE INFOCOM, 2013, April 2013, pp. 200-04.
-
(2013)
Proc. IEEE INFOCOM, 2013
, pp. 200-204
-
-
He, X.1
-
10
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
C. Ye et al., "Information-Theoretically Secret Key Generation for Fading Wireless Channels", IEEE Trans. Info. Forensics Security, vol. 5, 2010, pp. 240-54.
-
(2010)
IEEE Trans. Info. Forensics Security
, vol.5
, pp. 240-254
-
-
Ye, C.1
-
11
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana et al., "On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments", Proc. 15th ACM Annual Int'l. Conf. Mobile Computing and Networking, 2009, pp. 321-32.
-
(2009)
Proc. 15th ACM Annual Int'l. Conf. Mobile Computing and Networking
, pp. 321-332
-
-
Jana, S.1
-
12
-
-
79956227370
-
On the secrecy rate of multi-antenna wiretap channel under finite-alphabet input
-
May
-
S. Bashar, D. Zhi, and Chengshan Xiao, "On the Secrecy Rate of Multi-Antenna Wiretap Channel Under Finite-Alphabet Input", IEEE Commun. Lett., vol. 15, no. 5, May 2011, pp. 527-29.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.5
, pp. 527-529
-
-
Bashar, S.1
Zhi, D.2
Xiao, C.3
-
13
-
-
84871643875
-
On secrecy rate analysis of MIMO wiretap channels driven by finite-alphabet input
-
Dec.
-
S. Basharand, D. Zhi, and Chengshan Xiao, "On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input", IEEE Trans. Commun., vol. 60, no. 12, Dec. 2012, pp. 3816-25.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.12
, pp. 3816-3825
-
-
Basharand, S.1
Zhi, D.2
Xiao, C.3
-
14
-
-
77956908999
-
Achieving secret communication for fast rayleigh fading channels
-
Sept.
-
Z. Li, R. Yates, and W. Trappe, "Achieving Secret Communication for Fast Rayleigh Fading Channels", IEEE Trans. Wireless Commun., vol. 9, no. 9, Sept. 2010, pp. 2792-99.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.9
, pp. 2792-2799
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
|