Preventing Overshadowing Attacks in Self-Jamming Audio Channels
暂无分享,去创建一个
[1] Gerhard P. Hancke,et al. Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization , 2016, Comput. Networks.
[2] Radha Poovendran,et al. A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power , 2013, RFIDSec Asia.
[3] Claudio Soriente,et al. Using audio in secure device pairing , 2009, Int. J. Secur. Networks.
[4] B. J. Silva,et al. Machine-to-Machine: Possible applications in industrial networks , 2013, 2013 IEEE International Conference on Industrial Technology (ICIT).
[5] Claudio Soriente,et al. HAPADEP: Human-Assisted Pure Audio Device Pairing , 2008, ISC.
[6] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[7] Rong Jin,et al. SecNFC: Securing inductively-coupled Near Field Communication at physical layer , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[8] Srdjan Capkun,et al. On Limitations of Friendly Jamming for Confidentiality , 2013, 2013 IEEE Symposium on Security and Privacy.
[9] Jingyi Zhang,et al. Industrial Cyberphysical Systems: Realizing Cloud-Based Big Data Infrastructures , 2018, IEEE Industrial Electronics Magazine.
[10] Kevin Fu,et al. They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.
[11] Gerhard P. Hancke,et al. Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks , 2016, RFIDSec.
[12] J. Robert Stuart,et al. Noise: Methods for Estimating Detectability and Threshold , 1994 .
[13] Srdjan Capkun,et al. Physical-layer integrity for wireless messages , 2016, Comput. Networks.
[14] Matthias Hollick,et al. Lockpicking physical layer key exchange: weak adversary models invite the thief , 2015, WISEC.
[15] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[16] Peng Ning,et al. No time to demodulate - fast physical layer verification of friendly jamming , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[17] Ramarathnam Venkatesan,et al. Dhwani: secure peer-to-peer acoustic NFC , 2013, SIGCOMM.
[18] Olivier Savry,et al. A cross layer approach to preserve privacy in RFID ISO/IEC 15693 systems , 2012, 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA).
[19] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[20] Srdjan Capkun,et al. Investigation of Signal and Message Manipulations on the Wireless Channel , 2011, ESORICS.
[21] Tadayoshi Kohno,et al. Securing RFIDs by Randomizing the Modulation and Channel , 2015, NSDI.
[22] Si Chen,et al. ${\ssr{PriWhisper}}$ : Enabling Keyless Secure Acoustic Communication for Smartphones , 2014, IEEE Internet of Things Journal.