An information theoretic approach to RF fingerprinting
暂无分享,去创建一个
[1] Gustavus J. Simmons,et al. Authentication Theory/Coding Theory , 1985, CRYPTO.
[2] Srdjan Capkun,et al. Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[3] Neri Merhav,et al. On the error exponent and capacity games of private watermarking systems , 2003, IEEE Trans. Inf. Theory.
[4] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[5] Emre Telatar,et al. Multi-access communications with decision feedback decoding , 1992 .
[6] Ueli Maurer,et al. Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.
[7] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .
[8] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[9] Hugo Krawczyk,et al. UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.
[10] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.
[11] H. Vincent Poor,et al. Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.
[12] Prakash Narayan,et al. Reliable Communication Under Channel Uncertainty , 1998, IEEE Trans. Inf. Theory.
[13] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[14] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels II: the simulatability condition , 2003, IEEE Trans. Inf. Theory.