暂无分享,去创建一个
[1] Sriram Vishwanath,et al. Communication Through Jamming Over a Slotted ALOHA Channel , 2008, IEEE Transactions on Information Theory.
[2] Christian Scheideler,et al. A jamming-resistant MAC protocol for single-hop wireless networks , 2008, PODC '08.
[3] Christian Scheideler,et al. An Efficient and Fair MAC Protocol Robust to Reactive Interference , 2013, IEEE/ACM Transactions on Networking.
[4] Sisi Liu,et al. Thwarting Control-Channel Jamming Attacks from Inside Jammers , 2012, IEEE Transactions on Mobile Computing.
[5] Nam P. Nguyen,et al. A Trigger Identification Service for Defending Reactive Jammers in WSN , 2012, IEEE Transactions on Mobile Computing.
[6] Christina Fragouli,et al. Silence Based Communication for Sensor Networks , 2006, 2006 IEEE International Symposium on Information Theory.
[7] Roberto Di Pietro,et al. COKE Crypto-Less Over-the-Air Key Establishment , 2013, IEEE Transactions on Information Forensics and Security.
[8] Juan Soto. Randomness Testing of the Advanced Encryption Standard Candidate Algorithms , 1999 .
[9] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[10] Roberto Di Pietro,et al. Jamming mitigation in cognitive radio networks , 2013, IEEE Network.
[11] Srdjan Capkun,et al. Secure Time Synchronization in Sensor Networks , 2008, TSEC.
[12] Triet Vo Huu,et al. Counter-jamming using mixed mechanical and software interference cancellation , 2013, WiSec '13.
[13] Sisi Liu,et al. Thwarting inside jamming attacks on wireless broadcast communications , 2011, WiSec '11.
[14] Peng Ning,et al. BitTrickle: Defending against broadband and high-power reactive jamming attacks , 2012, 2012 Proceedings IEEE INFOCOM.
[15] Srdjan Capkun,et al. Anti-jamming broadcast communication using uncoordinated spread spectrum techniques , 2010, IEEE Journal on Selected Areas in Communications.
[16] Raghupathy Sivakumar,et al. Challenges: communication through silence in wireless sensor networks , 2005, MobiCom '05.
[17] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[18] Anthony Ephremides,et al. Covert channels in ad-hoc wireless networks , 2010, Ad Hoc Networks.
[19] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..
[20] S. Shafiee,et al. Capacity of multiple access channels with correlated jamming , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[21] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[22] William Stallings,et al. THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.
[23] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[24] Christina Fragouli,et al. Silence is golden and time is money: power-aware communication for sensor networks , 2005 .
[25] Rachid Guerraoui,et al. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks , 2009, Theor. Comput. Sci..
[26] Philippe Piret,et al. Bounds and constructions for binary asymmetric error-correcting codes , 1981, IEEE Trans. Inf. Theory.
[27] Ramjee Prasad,et al. Strategies for adaptive frequency hopping in the unlicensed bands , 2006, IEEE Wireless Communications.
[28] I. Reed,et al. Polynomial Codes Over Certain Finite Fields , 1960 .
[29] David J. Thuente,et al. Jamming Vulnerabilities of IEEE 802.11e , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[30] Ravi Sandhu,et al. ACM Transactions on Information and System Security: Editorial , 2005 .
[31] Dinko Begusic,et al. Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User , 2012, IEEE Transactions on Mobile Computing.
[32] Tao Jin,et al. Efficient Spread Spectrum Communication without Preshared Secrets , 2013, IEEE Transactions on Mobile Computing.
[33] Zhiguo Ding,et al. Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks , 2012, IEEE Transactions on Wireless Communications.
[34] L.C. Baird,et al. Keyless Jam Resistance , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.
[35] Srdjan Capkun,et al. Detection of reactive jamming in sensor networks , 2010, TOSN.
[36] Ali Hamieh,et al. POWJAM: A power reaction system against jamming attacks in wireless ad hoc networks , 2012, 2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS).