A Physical-Layer Message Encryption and Authentication Scheme
暂无分享,去创建一个
[1] Xianbin Wang,et al. Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization , 2016, IEEE Transactions on Wireless Communications.
[2] Yu Liu,et al. The CRC–NTMAC for Noisy Message Authentication , 2005, IEEE Transactions on Information Forensics and Security.
[3] Nguyen Dinh Thuc,et al. A Privacy Preserving Message Authentication Code , 2015, 2015 5th International Conference on IT Convergence and Security (ICITCS).
[4] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[5] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[6] Aydin Sezgin,et al. Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.
[7] Jin Cao,et al. A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.
[8] Vandana Mohindru,et al. Performance analysis of message authentication algorithms in wireless sensor networks , 2017, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC).
[9] H. Vincent Poor,et al. Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.
[10] Jing Yang,et al. A physical-layer authentication scheme based on hash method , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).
[11] Cong Ling,et al. Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security , 2015, IEEE Transactions on Information Forensics and Security.