暂无分享,去创建一个
Panagiotis Papadimitratos | John-Olof Nilsson | Peter Händel | Satyam Dwivedi | P. Händel | Panos Papadimitratos | S. Dwivedi | John-Olof Nilsson
[1] S. Kay. Fundamentals of statistical signal processing: estimation theory , 1993 .
[2] Panagiotis Papadimitratos,et al. Pairwise Secret Key Agreement based on Location-derived Common Randomness , 2015, ArXiv.
[3] Mudhakar Srivatsa,et al. Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary , 2012, IEEE/ACM Transactions on Networking.
[4] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[5] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[6] Peng Ning,et al. Secure and resilient clock synchronization in wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[7] Srdjan Capkun,et al. UWB rapid-bit-exchange system for distance bounding , 2015, WISEC.
[8] Henk Wymeersch,et al. Traffic Coordination at Road Intersections: Autonomous Decision-Making Algorithms Using Model-Based Heuristics , 2017, IEEE Intelligent Transportation Systems Magazine.
[9] Christina Fragouli,et al. A mobile world of security - The model , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[10] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[11] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[12] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[13] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[14] Srdjan Capkun,et al. Realization of RF Distance Bounding , 2010, USENIX Security Symposium.
[15] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[16] Steven Kay,et al. Fundamentals Of Statistical Signal Processing , 2001 .
[17] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[18] Pramod K. Varshney,et al. Distributed inference in the presence of eavesdroppers: a survey , 2015, IEEE Communications Magazine.
[19] Walid Saad,et al. Device Fingerprinting in Wireless Networks: Challenges and Opportunities , 2015, IEEE Communications Surveys & Tutorials.
[20] Alessio De Angelis,et al. Cooperative Decentralized Localization Using Scheduled Wireless Transmissions , 2013, IEEE Communications Letters.
[21] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2008, IEEE Transactions on Mobile Computing.
[22] James Gross,et al. PHY layer authentication via drifting oscillators , 2014, 2014 IEEE Global Communications Conference.
[23] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[24] Michael A. Jensen,et al. Improved Radiometric Identification of Wireless Devices Using MIMO Transmission , 2011, IEEE Transactions on Information Forensics and Security.
[25] Sae Woo Nam,et al. Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors , 2007, 0706.0397.
[26] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[27] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[28] Alessio De Angelis,et al. Joint Ranging and Clock Parameter Estimation by Wireless Round Trip Time Measurements , 2015, IEEE Journal on Selected Areas in Communications.
[29] Xianbin Wang,et al. Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.
[30] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[31] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[32] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[33] Petre Stoica,et al. Scalable and Passive Wireless Network Clock Synchronization in LOS Environments , 2017, IEEE Transactions on Wireless Communications.
[34] G. Gaderer,et al. Traps and pitfalls in secure clock synchronization , 2007, 2007 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.
[35] Panganamala Ramana Kumar,et al. Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks , 2009, IEEE INFOCOM 2009.
[36] Srdjan Capkun,et al. Secure neighborhood discovery: a fundamental element for mobile ad hoc networking , 2008, IEEE Communications Magazine.
[37] Alessio De Angelis,et al. Characterization of a Flexible UWB Sensor for Indoor Localization , 2013, IEEE Transactions on Instrumentation and Measurement.
[38] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[39] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[40] Akbar Rahman,et al. Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[41] Aydin Sezgin,et al. Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.
[42] Panagiotis Papadimitratos,et al. Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .
[43] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[44] Deog-Kyoon Jeong,et al. Practical considerations in the design and implementation of time synchronization systems using IEEE 1588 , 2009, IEEE Communications Magazine.