Wireless channel-based message authentication
暂无分享,去创建一个
Christian Waldschmidt | Frank Slomka | Frank Kargl | Steffen Moser | Ala'a Al-Momani | C. Waldschmidt | F. Kargl | F. Slomka | Steffen Moser | Ala'a Al-Momani
[1] Frank Kargl,et al. Misbehavior detection in vehicular ad-hoc networks , 2013 .
[2] Ashish Vulimiri. Misbehavior Detection in Vehicular Ad Hoc Networks , 2009 .
[3] Daniel Maier,et al. Deterministic models of the physical layer through signal simulation , 2015, SimuTools.
[4] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[5] J.-P. Hubaux,et al. Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.
[6] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[7] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[8] Sorin A. Huss,et al. Integrating Secure Beamforming into Car-to-X Architectures , 2011 .
[9] Tamer A. ElBatt,et al. MIMO VANETs: Research challenges and opportunities , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[10] Robert J. Piechocki,et al. Spatial Diversity for IEEE 802.11p Post-Crash Message Dissemination in a Highway Environment , 2010, 2010 IEEE 71st Vehicular Technology Conference.
[11] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.
[12] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[13] Frank Slomka,et al. MIMO-enabling PHY layer enhancement for vehicular ad-hoc networks , 2015, 2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[14] Matthias Hollick,et al. How did you get here? PHY-layer path signatures , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[15] Sorin A. Huss,et al. Verifying Mobility Data under Privacy Considerations in Car-to-X Communication , 2010 .
[16] Elmar Schoch,et al. On the efficiency of secure beaconing in VANETs , 2010, WiSec '10.
[17] Panagiotis Papadimitratos,et al. SEVECOM - Secure Vehicle Communication , 2006 .
[18] Frank Slomka,et al. An approach for the integration of smart antennas in the design and simulation of vehicular ad-hoc networks , 2012, The First International Conference on Future Generation Communication Technologies.
[19] Mary Ann Ingram,et al. Medium access control in ad hoc networks with MIMO links: optimization considerations and algorithms , 2004, IEEE Transactions on Mobile Computing.