Proximity-based wireless access control through considerate jamming
暂无分享,去创建一个
[1] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[2] Rachelin Sujae. Packet Hiding Methods for Preventing Selective Jamming Attacks , 2013 .
[3] Srdjan Capkun,et al. Key Agreement in Peer-to-Peer Wireless Networks , 2006, Proceedings of the IEEE.
[4] Loukas Lazos,et al. Packet-Hiding Methods for Preventing Selective Jamming Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[5] Matthieu R. Bloch,et al. Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.
[6] M. Vavrda. Digital beamforming in wireless communications , 2004 .
[7] Bart Preneel,et al. Key Establishment Using Secure Distance Bounding Protocols , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[8] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[9] Heejo Lee,et al. Carving secure wi-fi zones with defensive jamming , 2012, ASIACCS '12.
[10] Ivan Martinovic,et al. Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.
[11] David Wetherall,et al. Predictable 802.11 packet delivery from wireless channel measurements , 2010, SIGCOMM '10.
[12] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[13] Alon Efrat,et al. Optimization Schemes for Protective Jamming , 2012, MobiHoc '12.
[14] Srinivasan Seshan,et al. Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries , 2009, Pervasive.
[15] O. Holland,et al. Implementation of dynamic switching between one-to-many download methods , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..