Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks]
暂无分享,去创建一个
[1] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[2] Srinivasan Seshan,et al. 802.11 user fingerprinting , 2007, MobiCom '07.
[3] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[4] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[5] Jennifer C. Hou,et al. Proceedings of the 13th annual ACM international conference on Mobile computing and networking , 2007, MobiCom 2007.
[6] Jie Yang,et al. Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks , 2009, IEEE INFOCOM 2009.
[7] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[8] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2008, IEEE Transactions on Mobile Computing.
[9] Larry J. Greenstein,et al. A Physical-Layer Technique to Enhance Authentication for Mobile Terminals , 2008, 2008 IEEE International Conference on Communications.
[10] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[11] Tzi-cker Chiueh,et al. Sequence Number-Based MAC Address Spoof Detection , 2005, RAID.