Tracing Malicious Relays in Cooperative Wireless Communications
暂无分享,去创建一个
Min Wu | Yinian Mao | Min Wu | Yinian Mao
[1] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[2] Gregory E. Bottomley,et al. Jakes fading model revisited , 1993 .
[3] H. Vincent Poor,et al. An introduction to signal detection and estimation (2nd ed.) , 1994 .
[4] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[7] Siavash M. Alamouti,et al. A simple transmit diversity technique for wireless communications , 1998, IEEE J. Sel. Areas Commun..
[8] A. Robert Calderbank,et al. Space-Time block codes from orthogonal designs , 1999, IEEE Trans. Inf. Theory.
[9] Ye Li. Pilot-symbol-aided channel estimation for OFDM in wireless systems , 1999, 1999 IEEE 49th Vehicular Technology Conference (Cat. No.99CH36363).
[10] Arnold Neumaier,et al. Introduction to Numerical Analysis , 2001 .
[11] T. Ekman. Analysis of the LS estimation error on a Rayleigh fading channel , 2001, IEEE VTS 53rd Vehicular Technology Conference, Spring 2001. Proceedings (Cat. No.01CH37202).
[12] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[13] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[14] Elza Erkip,et al. User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..
[15] Elza Erkip,et al. User cooperation diversity. Part II. Implementation aspects and performance analysis , 2003, IEEE Trans. Commun..
[16] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[17] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[18] Gregory W. Wornell,et al. Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks , 2003, IEEE Trans. Inf. Theory.
[19] Guevara Noubir,et al. On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility , 2004, WWIC.
[20] Aria Nosratinia,et al. Coded cooperation in wireless communications: space-time transmission and iterative decoding , 2004, IEEE Transactions on Signal Processing.
[21] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[22] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[23] Virgil D. Gligor,et al. Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion) , 2004, Security Protocols Workshop.
[24] Aria Nosratinia,et al. Cooperative communication in wireless networks , 2004, IEEE Communications Magazine.
[25] Marc Moonen,et al. Gaussian maximum-likelihood channel estimation with short training sequences , 2005, IEEE Transactions on Wireless Communications.
[26] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[27] K. J. Ray Liu,et al. Attack-resistant cooperation stimulation in autonomous ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[28] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[29] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[30] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..
[31] Aria Nosratinia,et al. Diversity through coded cooperation , 2006, IEEE Transactions on Wireless Communications.
[32] Min Wu,et al. Security Issues in Cooperative Communications: Tracing Adversarial Relays , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.