Fingerprinting by Design: Embedding and Authentication
暂无分享,去创建一个
[1] Srdjan Capkun,et al. Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[2] Jan P. Allebach,et al. A survey of forensic characterization methods for physical devices , 2006, Digit. Investig..
[3] Brian M. Sadler,et al. MIMO Authentication via Deliberate Fingerprinting at the Physical Layer , 2011, IEEE Transactions on Information Forensics and Security.
[4] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[5] H. Vincent Poor,et al. Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.
[6] Georgios B. Giannakis,et al. Basis expansion models and diversity techniques for blind identification and equalization of time-varying channels , 1998, Proc. IEEE.
[7] Gunjan Verma,et al. A MATLAB Library for Rapid Prototyping of Wireless Communications Algorithms with the Universal Software Radio Peripheral (USRP) Radio Family , 2013 .
[8] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[9] Ueli Maurer,et al. Unbreakable Keys from Random Noise , 2007 .
[10] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[11] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[12] Yuguang Fang,et al. Scalable and deterministic key agreement for large scale networks , 2007, IEEE Transactions on Wireless Communications.
[13] Edward J. Delp,et al. Texture based attacks on intrinsic signature based printer identification , 2010, Electronic Imaging.
[14] Srinivas Devadas,et al. Security Based on Physical Unclonability and Disorder , 2012 .
[15] John S. Baras,et al. Authentication of fingerprint scanners , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[16] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[17] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[18] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[19] Mikael Coldrey,et al. Training-Based MIMO Systems—Part I: Performance Comparison , 2007, IEEE Transactions on Signal Processing.
[20] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[21] Ueli Maurer,et al. Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.
[22] Emre Telatar,et al. Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..
[23] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[24] Edward J. Delp,et al. Scanner Identification Using Feature-Based Processing and Analysis , 2009, IEEE Transactions on Information Forensics and Security.
[25] Arun Ross,et al. An introduction to biometrics , 2008, ICPR 2008.
[26] Mani Mina,et al. Physical-Layer Identification of Wired Ethernet Devices , 2012, IEEE Transactions on Information Forensics and Security.
[27] S. Venkatesan,et al. Capacity of a Gaussian MIMO channel with nonzero mean , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[28] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[29] Shi Jin,et al. Near-optimal power allocation for MIMO channels with mean or covariance feedback , 2010, IEEE Transactions on Communications.
[30] John S. Baras,et al. Multicarrier authentication at the physical layer , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[31] Ralph P. Grimaldi,et al. Discrete and Combinatorial Mathematics: An Applied Introduction , 1998 .