Timing information in wireless communications and optimal location verification frameworks
暂无分享,去创建一个
[1] Robert A. Malaney. Nuisance Parameters and Location Accuracy in Log-Normal Fading Models , 2007, IEEE Transactions on Wireless Communications.
[2] E. S. Pearson,et al. On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .
[3] Christian Steffes,et al. Determining Times Of Arrival Of Transponder Signals In A. Sensor Network Using Gps Time Synchronization , 2011, GI-Jahrestagung.
[4] Srdjan Capkun,et al. Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.
[5] Fredrik Tufvesson,et al. Measurement based Shadow Fading Model for Vehicle-to-Vehicle Network Simulations , 2012, ArXiv.
[6] Robert A. Malaney. A location enabled wireless security system , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[7] Shihao Yan,et al. Optimal Information-Theoretic Wireless Location Verification , 2012, IEEE Transactions on Vehicular Technology.
[8] Alvin S. Lim,et al. TOA Ranging Using Real Time Application Interface (RTAI) in IEEE 802.11 Networks , 2011, GreeNets.
[9] Zafer Sahinoglu,et al. The Cramer-Rao bounds of hybrid TOA/RSS and TDOA/RSS location estimation schemes , 2004, IEEE Communications Letters.
[10] Robert A. Malaney. Wireless Intrusion Detection Using Tracking Verification , 2007, 2007 IEEE International Conference on Communications.
[11] Shihao Yan,et al. Location Verification Systems in Emerging Wireless Networks , 2013, ArXiv.
[12] Robert A. Malaney. Securing Wi-Fi networks with position verification: extended version , 2007, Int. J. Secur. Networks.
[13] E. S. Pearson,et al. On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .
[14] Richard P. Martin,et al. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.
[15] Azzedine Boukerche,et al. A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET , 2012, IEEE Transactions on Vehicular Technology.
[16] Alfred O. Hero,et al. Relative location estimation in wireless sensor networks , 2003, IEEE Trans. Signal Process..
[17] R. Michael Buehrer,et al. Handbook of Position Location: Theory, Practice and Advances , 2011 .
[18] Yu Zhang,et al. Evaluation of Localization Attacks on Power-Modulated Challenge–Response Systems , 2008, IEEE Transactions on Information Forensics and Security.
[19] Shihao Yan,et al. Signal strength based wireless Location Verification under spatially correlated shadowing , 2014, 2014 IEEE International Conference on Communications (ICC).
[20] Enrica Zola,et al. Software based measurement of round trip time observables for location in IEEE 802.11 networks , 2013, Proceedings of the 12th International Conference on Telecommunications.
[21] Mikhail Nesterenko,et al. Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.
[22] Shihao Yan,et al. An information theoretic Location Verification System for wireless networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).