-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, ‘‘Communication theory of secrecy systems,’’ Bell Syst. Tech. J., vol. 29, pp. 656–715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.29
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, ‘‘The wire-tap channel,’’ Bell Syst. Tech. J., vol. 54, pp. 1355–1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May 1978
-
I. Csiszar and J. Korner, ‘‘Broadcast channels with confidential messages,’’ IEEE Trans. Inf. Theory, vol. 24, pp. 339–348, May 1978.
-
IEEE Trans. Inf. Theory
, vol.24
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
4
-
-
0347337828
-
Secure space-time communication
-
Dec. 2003
-
A.O. Hero, ‘‘Secure space-time communication,’’ IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235–3249, Dec. 2003.
-
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.O.1
-
5
-
-
51849132358
-
Using antenna array redundancy and channel diversity for secure wireless transmissions
-
May 2007
-
X. Li and J. Hwu, ‘‘Using antenna array redundancy and channel diversity for secure wireless transmissions,’’ J. Commun., vol. 2, no. 3, pp. 24–32, May 2007.
-
J. Commun.
, vol.2
, Issue.3
, pp. 24-32
-
-
Li, X.1
Hwu, J.2
-
6
-
-
44849094850
-
Secure MIMO communications in a system with equal numbers of transmit and receive antennas
-
May
-
H. Kim and J. D. Villasenor, ‘‘Secure MIMO communications in a system with equal numbers of transmit and receive antennas,’’ IEEE Commun. Lett., vol. 12, no. 5, pp. 386–388, May, 2008.
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.5
, pp. 386-388
-
-
Kim, H.1
Villasenor, J.D.2
-
7
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
Mar. 1993
-
U. Maurer, ‘‘Secret key agreement by public discussion from common information,’’ IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733–742, Mar. 1993.
-
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
9
-
-
0027629488
-
Common randomness in information theory and cryptography, part I: Secret sharing
-
July
-
I. Csiszar and P. Narayan, ‘‘Common randomness in information theory and cryptography, part I: Secret sharing,’’ IEEE Trans. Inf. Theory, vol. 39, pp. 1121–1132, July 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 1121-1132
-
-
Csiszar, I.1
Narayan, P.2
-
10
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
Aug. 2007
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. McLaughlin, and J.-M. Merolla, ‘‘Applications of LDPC codes to the wiretap channel,’’ IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933–2945, Aug. 2007.
-
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.4
Merolla, J.-M.5
-
11
-
-
45249104850
-
Wireless information theoretic security
-
June, 2008
-
M. Nloch, J. Barros and M. R. D. Rodrigues, ‘‘Wireless information theoretic security,’’ IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2515–2534, June, 2008.
-
IEEE Trans. Inform. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Nloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
-
12
-
-
33747886952
-
Secret key agreement from correlated source outputs using low density parity check matrices
-
July 2006
-
J. Muramatsu, ‘‘Secret key agreement from correlated source outputs using low density parity check matrices,’’ IEICE Trans. Fund. Elec. Comm. Comp., vol. 89, no. 7, pp. 2036–2046, July 2006.
-
IEICE Trans. Fund. Elec. Comm. Comp.
, vol.89
, Issue.7
, pp. 2036-2046
-
-
Muramatsu, J.1
-
13
-
-
44049106294
-
The relay channel with a wire-tapper
-
Baltimore, MD, Mar
-
M. Yuksel and E. Erkip, ‘‘The relay channel with a wire-tapper,’’ in Proceedings of 41st Annual Conference on Information Sciences and Systems, Baltimore, MD, Mar. 2007.
-
Proceedings of 41St Annual Conference on Information Sciences and Systems
, pp. 2007
-
-
Yuksel, M.1
Erkip, E.2
-
14
-
-
45249101530
-
The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
June, 2008
-
E. Tekin and A. Yener, ‘‘The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming,’’ IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735–2751, June, 2008.
-
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
16
-
-
0027297425
-
Near Shannon limit error correcting coding and decoding: Turbo codes
-
C. Berrou, A. Glavieux, and P. Thitimajshima, ‘‘Near Shannon limit error correcting coding and decoding: Turbo codes,’’ in Proceedings of IEEE Int. Conf. Communications, Geneva, Switzerland, 1993, pp. 1064–1070.
-
(1993)
Proceedings of IEEE Int. Conf. Communications, Geneva, Switzerland
, pp. 1064-1070
-
-
Berrou, C.1
Glavieux, A.2
Thitimajshima, P.3
-
18
-
-
0033099611
-
Good error-correcting codes based on very sparse matrices
-
Mar. 1999
-
D. J. C. MacKay, ‘‘Good error-correcting codes based on very sparse matrices,’’ IEEE Trans. Inf. Theory, vol. 45, no. 3, pp. 399–431, Mar. 1999.
-
IEEE Trans. Inf. Theory
, vol.45
, Issue.3
, pp. 399-431
-
-
Mackay, D.J.C.1
-
19
-
-
4544245136
-
Exact thresholds and optimal codes for the binary-symmetric channel and gallager’s decoding algorithm A
-
Sep. 2004
-
L. Bazzi, T. J. Richardson and R. L. Urbanke, ‘‘Exact thresholds and optimal codes for the binary-symmetric channel and gallager’s decoding algorithm A,’’ IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 2010–2021, Sep. 2004.
-
IEEE Trans. Inf. Theory
, vol.50
, Issue.9
, pp. 2010-2021
-
-
Bazzi, L.1
Richardson, T.J.2
Urbanke, R.L.3
-
20
-
-
46249114443
-
Variable rate LDPC codes for wireless applications
-
Sept. 29–Oct. 1
-
B. Marco, C. Giovanni, and C. Franco, ‘‘Variable rate LDPC codes for wireless applications,’’ in Proceedings of Software in Telecommunications and Computer Networks International Conference on Sept. 29–Oct. 1, pp. 301–305, 2006.
-
(2006)
Proceedings of Software in Telecommunications and Computer Networks International Conference
, pp. 301-305
-
-
Marco, B.1
Giovanni, C.2
Franco, C.3
-
21
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
H. Mahdavifar and A. Vardy, ‘‘Achieving the secrecy capacity of wiretap channels using polar codes,’’ IEEE Trans. Inform. Theory, vol. 57, no. 10, pp. 6428–6443, 2011.
-
(2011)
IEEE Trans. Inform. Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
22
-
-
80051775152
-
Strong secrecy on the binary erasure wiretap channel using large-girth ldpc codes
-
A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, ‘‘Strong secrecy on the binary erasure wiretap channel using large-girth ldpc codes,’’ IEEE Trans. Inform. Forensics and Secur., vol. 6, no.3, pp. 585–594, 2011.
-
(2011)
IEEE Trans. Inform. Forensics and Secur.
, vol.6
, Issue.3
, pp. 585-594
-
-
Subramanian, A.1
Thangaraj, A.2
Bloch, M.3
McLaughlin, S.4
-
23
-
-
79958020005
-
Secret keys from channel noise
-
H. Ahmadi, R. Safavi-Naini, ‘‘Secret keys from channel noise,’’ Eurocry 2011, pp. 266–283, 2011.
-
(2011)
Eurocry 2011
, pp. 266-283
-
-
Ahmadi, H.1
Safavi-Naini, R.2
-
24
-
-
77953297543
-
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
-
K. Zeng and D. Wu, A. Chan and P. Mohapatra, ‘‘Exploiting multiple-antenna diversity for shared secret key generation in wireless networks,’’ IEEEINFOCOM 2010, pp. 1–9, 2010.
-
(2010)
IEEEINFOCOM 2010
, pp. 1-9
-
-
Zeng, K.1
Wu, D.2
Chan, A.3
Mohapatra, P.4
-
25
-
-
0034318173
-
Parallel concatenated gallager codes
-
H. Behairy, S.-C. Chang, ‘‘Parallel concatenated gallager codes,’’ Electron.Lett., vol. 36, no. 24, pp. 2025–2026, 2000.
-
(2000)
Electron.Lett.
, vol.36
, Issue.24
, pp. 2025-2026
-
-
Behairy, H.1
Chang, S.-C.2
-
26
-
-
74549130152
-
Build-in wiretap channel I with feedback and LDPC codes
-
Dec. 2009
-
H. Wen, G. Gong and P-H. Ho, ‘‘Build-in wiretap channel I with feedback and LDPC codes,’’ J. Commun. Netw., vol. 11, no. 6, pp. 538–643, Dec. 2009.
-
J. Commun. Netw.
, vol.11
, Issue.6
, pp. 538-643
-
-
Wen, H.1
Gong, G.2
Ho, P.-H.3
-
27
-
-
84861879514
-
On achieving unconditional secure communications over binary symmetric channels (BSC)
-
Hong Wen, Pin-Han Ho and Xiao-Hong Jiang, ‘‘On achieving unconditional secure communications over binary symmetric channels (BSC),’’ IEEE Wirel. Commun. Lett., vol. 1, no. 2, pp. 49–52, 2012.
-
(2012)
IEEE Wirel. Commun. Lett.
, vol.1
, Issue.2
, pp. 49-52
-
-
Wen, H.1
Ho, P.-H.2
Jiang, X.-H.3
-
29
-
-
0033881606
-
Secure information transmission for mobile radio
-
H. Koorapaty, A. A. Hassan, S. Chennakeshu, ‘‘Secure information transmission for mobile radio,’’ IEEE Trans. Wirel. Commun., vol. 2, no. 7, pp. 52–55, 2003.
-
(2003)
IEEE Trans. Wirel. Commun.
, vol.2
, Issue.7
, pp. 52-55
-
-
Koorapaty, H.1
Hassan, A.A.2
Chennakeshu, S.3
-
30
-
-
85045983815
-
A real orthogonal space-time coded UWB scheme for wireless secure communications,’’
-
Y. Zhang and H. Dai, ‘‘A real orthogonal space-time coded UWB scheme for wireless secure communications,’’ EURASIP J. Wirel Commun. Netw., vol. 6, no. 3, pp. 1–8, 2009.
-
(2009)
EURASIP J. Wirel Commun. Netw.
, vol.6
, Issue.3
, pp. 1-8
-
-
Zhang, Y.1
Dai, H.2
-
31
-
-
0038397761
-
Blind identification of FIR MIMO channels by decorrelation subchannels
-
Y. Hua, S. An and Y. Xiang, ‘‘Blind identification of FIR MIMO channels by decorrelation subchannels,’’ IEEE Trans. Signal Process., vol. 51, no. 5, pp. 1143–1155, 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.5
, pp. 1143-1155
-
-
Hua, Y.1
An, S.2
Xiang, Y.3
-
32
-
-
66949180834
-
A note on the secrecy capacity of the multiantenna wiretap channel
-
T. Liu, S. Shamai Shitz, ‘‘A note on the secrecy capacity of the multiantenna wiretap channel,’’ IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547–2553, 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai Shitz, S.2
-
33
-
-
38649135720
-
WG: A family of stream ciphers with designed randomness properties
-
Y. Nawaz and G. Gong, ‘‘WG: A family of stream ciphers with designed randomness properties,’’ Inf. Sci., vol. 178, no. 7, pp. 1903–1916, 2008.
-
(2008)
Inf. Sci.
, vol.178
, Issue.7
, pp. 1903-1916
-
-
Nawaz, Y.1
Gong, G.2
-
34
-
-
35248828626
-
Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt
-
Berlin: Springer
-
N. Courtois, ‘‘Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt’’, In Proceedings of ICISC 2002, LNCS: vol. 2587, Berlin: Springer, pp. 182–199, 2003.
-
(2003)
Proceedings of ICISC 2002, LNCS
, vol.2587
, pp. 182-199
-
-
Courtois, N.1
-
35
-
-
0032656952
-
Space time block codes from orthogonal designs
-
V. Tarokh, H. Jafarkhani, A. R. Calderbank, ‘‘Space time block codes from orthogonal designs,’’ IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 744–765, 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.5
, pp. 744-765
-
-
Tarokh, V.1
Jafarkhani, H.2
Calderbank, A.R.3
-
36
-
-
84863901332
-
Draft standard for information technology telecommunications and information exchange between systems local and metropolitan area networks specific requirements
-
802.11 Working Group of the 802 Committee
-
IEEE P802.11n, Draft standard for information technology telecommunications and information exchange between systems local and metropolitan area networks specific requirements, Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. 802.11 Working Group of the 802 Committee, 2009.
-
(2009)
Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
-
-
-
37
-
-
0032183752
-
A simple transmitter diversity scheme for wireless communications
-
S. M. Alamouti, ‘‘A simple transmitter diversity scheme for wireless communications,’’ IEEE Journal on Selected Areas in Communications, vol. 16, no.8, pp. 1451–1458, 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.8
, pp. 1451-1458
-
-
Alamouti, S.M.1
-
38
-
-
0032662468
-
Space-time codes for high data rate wireless communication: Performance criteria in the presence of channel estimation errors, mobility, and multiple paths
-
V. Tarokh, A. Naguib, N. Seshadri, A. R. Calderbank, ‘‘Space-time codes for high data rate wireless communication: performance criteria in the presence of channel estimation errors, mobility, and multiple paths,’’ IEEE Trans. Commun., vol. 17, no. 2, pp. 199–207, 1999.
-
(1999)
IEEE Trans. Commun.
, vol.17
, Issue.2
, pp. 199-207
-
-
Tarokh, V.1
Naguib, A.2
Seshadri, N.3
Calderbank, A.R.4
-
39
-
-
85045970431
-
Framework for MIMO cross-layer secure communication based on STBC
-
August 2011
-
H. Wen, G. Gong, S. Lv and P. Ho, ‘‘Framework for MIMO cross-layer secure communication based on STBC,’’ Telecommun. Syst. J., pp. 1–9, August 2011.
-
Telecommun. Syst. J.
, pp. 1-9
-
-
Wen, H.1
Gong, G.2
Lv, S.3
Ho, P.4
-
40
-
-
77956430509
-
A framework of physical layer technique assisted authentication for vehicular communication networks
-
H. Wen, P. Ho and G. Gong, ‘‘A framework of physical layer technique assisted authentication for vehicular communication networks,’’ Sci China Ser F-Inf Sci, vol. 53, no. 10, pp. 1996–2004, 2010.
-
(2010)
Sci China Ser F-Inf Sci
, vol.53
, Issue.10
, pp. 1996-2004
-
-
Wen, H.1
Ho, P.2
Gong, G.3
-
41
-
-
78650361034
-
Physical layer assisted authentication for distributed Ad-Hoc wireless sensor networks
-
H. Wen, P. Ho, C. Qi and G. Gong, ‘‘Physical layer assisted authentication for distributed Ad-Hoc wireless sensor networks,’’ IEEE Inf. Secur., vol. 4, issue 4, pp. 390–396, 2010.
-
(2010)
IEEE Inf. Secur.
, vol.4
, Issue.4
, pp. 390-396
-
-
Wen, H.1
Ho, P.2
Qi, C.3
Gong, G.4
-
42
-
-
79952851711
-
Physical layer technique to assist authentication based on PKI for vehicular xommunication networks
-
Feb. 2011
-
H. Wen, P. Ho, ‘‘Physical layer technique to assist authentication based on PKI for vehicular xommunication networks,’’ KSII Trans. Internet Inf. Syst.,’’ vol. 5, issue 5, pp. 440–456, Feb. 2011.
-
KSII Trans. Internet Inf. Syst.
, vol.5
, Issue.5
, pp. 440-456
-
-
Wen, H.1
Ho, P.2
-
43
-
-
84555202479
-
Lightweight and effective detection scheme for node clone attack in WSNs
-
Sept. 2011
-
H. Wen, J. Luo and L. Zhou, ‘‘Lightweight and effective detection scheme for node clone attack in WSNs,’’ IET Wireless Sensor Systems, vol. 1, no. 3, pp. 137–143, Sept. 2011.
-
IET Wireless Sensor Systems
, vol.1
, Issue.3
, pp. 137-143
-
-
Wen, H.1
Luo, J.2
Zhou, L.3
-
44
-
-
84861879514
-
On achieving unconditional secure communications over binary symmetric channels (BSC)
-
H. Wen, P. Ho and X. Jiang, ‘‘On achieving unconditional secure communications over binary symmetric channels (BSC),’’ IEEE Wirel. Commun. Lett., vol. 1, no. 2, pp.49–52, 2012.
-
(2012)
IEEE Wirel. Commun. Lett.
, vol.1
, Issue.2
, pp. 49-52
-
-
Wen, H.1
Ho, P.2
Jiang, X.3
-
45
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
July 2008
-
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, ‘‘Using the physical layer for wireless authentication in time-variant channels,’’ IEEE Trans. Wirel. Commun., vol. 7, issue 7, pp. 2571–2579, July 2008.
-
IEEE Trans. Wirel. Commun.
, vol.7
, Issue.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
46
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
24–28 June 2007
-
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, ‘‘Fingerprints in the ether: using the physical layer for wireless authentication,’’ in Proceedings of IEEE International Conference on Communications, pp. 4646–4651, 24–28 June 2007.
-
Proceedings of IEEE International Conference on Communications
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
47
-
-
51249120889
-
A physical-layer technique to enhance authentication for mobile terminals
-
19–23 May 2008
-
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, ‘‘A physical-layer technique to enhance authentication for mobile terminals,’’ in Proceedings of IEEE International Conference on Communications, pp. 1520–1524, 19–23 May 2008.
-
Proceedings of IEEE International Conference on Communications
, pp. 1520-1524
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
48
-
-
39449137863
-
Physical-layer authentication
-
Mar. 2008
-
P. L. Yu, J. S. Baras, B. M. Sadler, ‘‘Physical-layer authentication,’’ IEEE Trans. Inf. Forensics and Secur., vol. 3, no. 1, pp. 38–51, Mar. 2008.
-
IEEE Trans. Inf. Forensics and Secur.
, vol.3
, Issue.1
, pp. 38-51
-
-
Yu, P.L.1
Baras, J.S.2
Sadler, B.M.3
-
49
-
-
77955326733
-
Characterization of randomly time-variant linear channels,’’
-
P. A. Bello, ‘‘Characterization of randomly time-variant linear channels,’’ IEEE Trans. Comm. Syst., vol. 11, pp. 360–393, 1963.
-
(1963)
IEEE Trans. Comm. Syst.
, vol.11
, pp. 360-393
-
-
Bello, P.A.1
-
50
-
-
0032114467
-
OFDM xhannel estimation by singular value decomposition
-
July
-
O. Edfors, M. Sandell, J. J. van de Beek, S. K. Wilson, and P. O. Borjesson, ‘‘OFDM xhannel estimation by singular value decomposition,’’ IEEE Trans. Comm., vol. 46, no. 7, pp. 931–939, July 1998.
-
(1998)
IEEE Trans. Comm.
, vol.46
, Issue.7
, pp. 931-939
-
-
Edfors, O.1
Sandell, M.2
van De Beek, J.J.3
Wilson, S.K.4
Borjesson, P.O.5
-
51
-
-
0031381109
-
Pilot-symbol-aided channel estimation in time and frequency
-
Nov
-
P. Hoeher, S. Kaiser, and P. Robertson, ‘‘Pilot-symbol-aided channel estimation in time and frequency,’’ in Proceedings of IEEE Global Telecommunications, pp. 90–96, Nov. 1997.
-
(1997)
Proceedings of IEEE Global Telecommunications
, pp. 90-96
-
-
Hoeher, P.1
Kaiser, S.2
Robertson, P.3
-
52
-
-
0032118152
-
Robust channel estimation for OFDM systems with rapid dispersive fading channels
-
July 1998
-
Y. Li, L. J. Cimini, Jr. and N. R. Sollenberger, ‘‘Robust channel estimation for OFDM systems with rapid dispersive fading channels,’’ IEEE Trans. Commun., vol. 46, no. 7, pp. 902–915, July 1998.
-
IEEE Trans. Commun.
, vol.46
, Issue.7
, pp. 902-915
-
-
Li, Y.1
Cimini, L.J.2
Sollenberger, N.R.3
-
53
-
-
0036447354
-
A Study of channel estimation in OFDM systems
-
Vancouver, Canada, Sept
-
S. Coleri, M. Ergen, A. Puri, A. Bahai, ‘‘A Study of channel estimation in OFDM systems,’’ in Proceedings of IEEE VTC, vol. 2, pp. 894–898, Vancouver, Canada, Sept. 2002.
-
(2002)
Proceedings of IEEE VTC
, vol.2
, pp. 894-898
-
-
Coleri, S.1
Ergen, M.2
Puri, A.3
Bahai, A.4
-
54
-
-
15844391671
-
Research on an iterative algorithm of LS Channel estimation in MIMO OFDM systems
-
Mar. 2005
-
Y. Qiao, S. Yu, P. Su, and L. Zhang, ‘‘Research on an iterative algorithm of LS Channel estimation in MIMO OFDM systems,’’ IEEE Trans. Broadcast, vol. 51, no. 1, pp. 149–153, Mar. 2005.
-
IEEE Trans. Broadcast
, vol.51
, Issue.1
, pp. 149-153
-
-
Qiao, Y.1
Yu, S.2
Su, P.3
Zhang, L.4
-
55
-
-
0000090155
-
Sequential tests of statistical hypotheses
-
June 1945
-
A. Wald, ‘‘Sequential tests of statistical hypotheses,’’ Ann. Math. Stat. 16 (2): 117–186, June 1945.
-
Ann. Math. Stat
, vol.16
, Issue.2
, pp. 117-186
-
-
Wald, A.1
-
56
-
-
85045967004
-
-
‘‘Dedicated Short Range Communications (DSRC),’’ [Online] Available: http://grouper.ieee.org/groups/scc32/dsrc/index2007.html.
-
-
-
-
57
-
-
85045961445
-
IEEE P802.11p: Draft standard for information technology telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications
-
Jun. 2009
-
Task Group p, ‘‘IEEE P802.11p: Draft standard for information technology telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications,’’ IEEE Computer Society, Jun. 2009.
-
IEEE Computer Society
-
-
-
58
-
-
3042594839
-
The security and privacy of smart vehicles
-
J.P. Hubaux, ‘‘The security and privacy of smart vehicles,’’ IEEE Secur. Priv., vol. 2, pp. 49–55, 2004.
-
(2004)
IEEE Secur. Priv.
, vol.2
, pp. 49-55
-
-
Hubaux, J.P.1
-
59
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. P. Hubaux, ‘‘Securing vehicular ad hoc networks,’’ J. Comput. Secur., vol. 15, no. 1, pp. 39–68, 2007.
-
(2007)
J. Comput. Secur.
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.P.2
-
61
-
-
33745950446
-
AAA in vehicular communication on highways with Ad Hoc networking support: A proposed architecture
-
H. Moustafa, G. Bourdon, and Y. Gourhant, ‘‘AAA in vehicular communication on highways with Ad Hoc networking support: a proposed architecture,’’ in Proceedings of ACM workshop on Vehicular ad hoc networks, pp. 79–80, 2005.
-
(2005)
Proceedings of ACM Workshop on Vehicular Ad Hoc Networks
, pp. 79-80
-
-
Moustafa, H.1
Bourdon, G.2
Gourhant, Y.3
-
62
-
-
51449098979
-
Pin-Han Ho, and X. Shen, ‘‘An efficient identity-based batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, Pin-Han Ho, and X. Shen, ‘‘An efficient identity-based batch verification scheme for vehicular sensor networks,’’ in Proceedings of IEEE INFOCOM, pp. 246–250, 2008.
-
(2008)
Proceedings of IEEE INFOCOM
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
-
63
-
-
58149123333
-
TSVC: Timed efficient and secure vehicular communications with privacy preserving
-
X. Lin, X. Sun, X. Wang, C. Zhang, Pin-Han Ho, X. Shen, ‘‘TSVC: timed efficient and secure vehicular communications with privacy preserving,’’ IEEE Trans. Wirel. Commun., vol. 7, no. 12, pp. 4987–4998, 2009.
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.7
, Issue.12
, pp. 4987-4998
-
-
Lin, X.1
Sun, X.2
Wang, X.3
Zhang, C.4
Pin-Han Ho, X.S.5
-
64
-
-
51249100419
-
R. Lu and P. H. Ho, ‘‘RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks
-
May 19–23, 2008
-
C. Zhang, X. Lin, R. Lu and P. H. Ho, ‘‘RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks,’’ in Proceedings of ICC’08, pp. 1451–1457, May 19–23, 2008.
-
Proceedings of ICC’08
, pp. 1451-1457
-
-
Zhang, C.1
Lin, X.2
-
65
-
-
0034771605
-
SPINS: Security protocols for sensor netowrks
-
Rome, Italy
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, ‘‘SPINS: security protocols for sensor netowrks,’’ in Proceedings of the 7th annual international conference on Mobile computing and networking, July 2001, Rome, Italy, p. 189–199.
-
Proceedings of the 7Th Annual International Conference on Mobile Computing and Networking, July 2001
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
66
-
-
85000276942
-
‘Multilevel lTESLA: Broadcast authentication for distributed sensor networks
-
Nov
-
Donggang Liu and Peng Ning, ‘‘Multilevel lTESLA: broadcast authentication for distributed sensor networks,’’ ACM Trans. Embed. Comput. Syst., vol. 3, no. 3, Nov. 2004, pp. 800–836.
-
(2004)
ACM Trans. Embed. Comput. Syst
, vol.3
, Issue.3
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
67
-
-
33845926634
-
An RSSI-based scheme for Sybil attack detection in wireless sensor networks
-
M. Demirbas, Youngwhan Song, ‘‘An RSSI-based scheme for Sybil attack detection in wireless sensor networks,’’ in Proceedings of WoWMoM 2006, pp. 566–570, 2006.
-
(2006)
Proceedings of Wowmom 2006
, pp. 566-570
-
-
Demirbas, M.1
Song, Y.2
-
68
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman, ‘‘A method for obtaining digital signatures and public-key cryptosystems,’’ Commun. ACM, vol. 21, no. 2, 1978, pp. 120–126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
69
-
-
0003508564
-
-
Federal Register 56. FIPS PUB 186, Aug. 1991
-
U. S. National Institute of Standards and Technology (NIST), Digital Signature Standard (DSS), Federal Register 56. FIPS PUB 186, Aug. 1991.
-
Digital Signature Standard (DSS)
-
-
-
70
-
-
0004300781
-
-
Federal Information Processing Standards Publication 81 (FIPS PUB 81)
-
U. S. National Institute of Standards and Technology (NIST). DES Model of Operation. Federal Information Processing Standards Publication 81 (FIPS PUB 81).
-
DES Model of Operation
-
-
-
71
-
-
0003700417
-
Kerberos authentication and authorization system
-
S. P. Miller, C. Neuman, J. I. Schiller, and J. H. Saltzer, ‘‘Kerberos authentication and authorization system,’’ In Project Athena Technical Plan, page section E.2.1, 1987.
-
(1987)
Project Athena Technical Plan, Page Section E.2.1
-
-
Miller, S.P.1
Neuman, C.2
Schiller, J.I.3
Saltzer, J.H.4
-
73
-
-
85045966806
-
-
Wireless InSite software, http://www.remcom.com/wirelessinsite/.
-
-
-
-
76
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
B. Parno, A. Perrig, and V. Gligor, ‘‘Distributed detection of node replication attacks in sensor networks,’’ in Proceedings of the IEEE Symposium on Security and Privacy, pp. 49–63, 2005.
-
(2005)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
79
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, ‘‘Location-based compromise-tolerant security mechanisms for wireless sensor networks,’’ IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 247–260, 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
80
-
-
36249025569
-
On the detection of clones in sensor networks using random key predistribution
-
R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. T. Kandemir, ‘‘On the detection of clones in sensor networks using random key predistribution,’’ IEEE Trans. Syst., Man, and Cybern., Part C: Applications and Reviews, vol. 37, no. 6, pp. 1246–1258, 2007.
-
(2007)
IEEE Trans. Syst., Man, and Cybern., Part C: Applications and Reviews
, vol.37
, Issue.6
, pp. 1246-1258
-
-
Brooks, R.1
Govindaraju, P.Y.2
Pirretti, M.3
Vijaykrishnan, N.4
Kandemir, M.T.5
-
82
-
-
84878664200
-
DHT-based detection of node clone in wireless sensor networks
-
Sept. 23–25, 2009, Niagara Falls, Ontario, Canada, LNICST 28
-
Zhijun Li and Guang Gong, ‘‘DHT-based detection of node clone in wireless sensor networks,’’ in Proceedings of First International Conference on Ad Hoc Networks (ADHOCNETS 2009), Sept. 23–25, 2009, Niagara Falls, Ontario, Canada, LNICST 28, pp. 240–255.
-
Proceedings of First International Conference on Ad Hoc Networks (ADHOCNETS 2009)
, pp. 240-255
-
-
Li, Z.1
Gong, G.2
-
83
-
-
74249096583
-
Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks
-
Oct. 12–15, 2009, Macau SAR, P.R.C
-
Zhijun Li and Guang Gong, ‘‘Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks,’’ in Proceedings of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS ’09), Oct. 12–15, 2009, Macau SAR, P.R.C, pp. 1030–1035.
-
Proceedings of IEEE 6Th International Conference on Mobile Adhoc and Sensor Systems (MASS ’09)
, pp. 1030-1035
-
-
Li, Z.1
Gong, G.2
-
85
-
-
51349133236
-
Detecting 802.11 Mac layer spoofing using received signal strength
-
Apr. 2008
-
Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, ‘‘Detecting 802.11 Mac layer spoofing using received signal strength,’’ In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Apr. 2008.
-
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM)
-
-
Sheng, Y.1
Tan, K.2
Chen, G.3
Kotz, D.4
Campbell, A.5
-
87
-
-
40049095300
-
Geographical location-based scheme for Sybil attacks detection in wireless sensor networks
-
Jan
-
Zhang Jian-Ming, Yu Qun and Wang Liang-Min, ‘‘Geographical location-based scheme for Sybil attacks detection in wireless sensor networks,’’ J. Syst. Simul., vol. 20, no. 1, pp. 259–263, Jan. 2008.
-
(2008)
J. Syst. Simul.
, vol.20
, Issue.1
, pp. 259-263
-
-
Jian-Ming, Z.1
Yu, Q.2
Wang, L.-M.3
-
88
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D. Song, A. Perrig, ‘‘The Sybil attack in sensor networks: analysis & defenses,’’ In Proceedings of third International Symposium on Information Processing in Sensor Networks, IPSN 2004, pp. 259–268, 2004.
-
(2004)
Proceedings of Third International Symposium on Information Processing in Sensor Networks, IPSN
, vol.2004
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
91
-
-
67650652296
-
Detecting Sybil attacks in wireless and sensor networks using cluster analysis
-
Jie Yang, Yingying Chen, W. Trappe, ‘‘Detecting Sybil attacks in wireless and sensor networks using cluster analysis,’’ In Proceedings of 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2008, pp. 834–839, 2008.
-
(2008)
Proceedings of 5Th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2008
, pp. 834-839
-
-
Yang, J.1
Chen, Y.2
Trappe, W.3
-
92
-
-
85045960257
-
Method of detecting the Sybil attack based on ranging in wireless sensor network
-
Ren Xiu-li, Yang Wei, ‘‘Method of detecting the Sybil attack based on ranging in wireless sensor network,’’ in Proceedings of WiCom ’09, pp. 1–4, 2009.
-
(2009)
Proceedings of Wicom ’09
, pp. 1-4
-
-
Yang Wei, R.X.-L.1
|