Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding
暂无分享,去创建一个
[1] Dennis Goeckel,et al. Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.
[2] John S. Baras,et al. Fingerprinting by Design: Embedding and Authentication , 2016, Digital Fingerprinting.
[3] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[4] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[5] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[6] Rick S. Blum,et al. Authenticated side channel via physical layer fingerprinting , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[7] Alexander Barg,et al. Random codes: Minimum distances and error exponents , 2002, IEEE Trans. Inf. Theory.
[8] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[9] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .
[10] Lajos Hanzo,et al. Physical-layer authentication for wireless security enhancement: current challenges and future developments , 2016, IEEE Communications Magazine.
[11] Brian M. Sadler,et al. Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios , 2015, IEEE Access.
[12] H. Vincent Poor,et al. Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.
[13] Anant Sahai,et al. SNR Walls for Signal Detection , 2008, IEEE Journal of Selected Topics in Signal Processing.
[14] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[15] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[16] Brian M. Sadler,et al. Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.
[17] T. Tao,et al. On the singularity probability of random Bernoulli matrices , 2005, math/0501313.
[18] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[19] Walid Saad,et al. Device Fingerprinting in Wireless Networks: Challenges and Opportunities , 2015, IEEE Communications Surveys & Tutorials.
[20] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[21] W. Marsden. I and J , 2012 .
[22] Mary Ann Weitnauer,et al. Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.