An information theoretic Location Verification System for wireless networks
暂无分享,去创建一个
Shihao Yan | Robert A. Malaney | Ido Nevat | Gareth W. Peters | G. Peters | Shihao Yan | R. Malaney | Ido Nevat
[1] Robert A. Malaney,et al. Quantum Location Verification in Noisy Channels , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[2] Robert A. Malaney,et al. Location-dependent communications using quantum entanglement , 2010, 1003.0949.
[3] Robert A. Malaney. Nuisance Parameters and Location Accuracy in Log-Normal Fading Models , 2007, IEEE Transactions on Wireless Communications.
[4] Dan Wu,et al. A Node-to-Node Location Verification Method , 2010, IEEE Transactions on Industrial Electronics.
[5] Rafail Ostrovsky,et al. Position-Based Quantum Cryptography: Impossibility and Constructions , 2011, IACR Cryptol. ePrint Arch..
[6] Yu Zhang,et al. Evaluation of Localization Attacks on Power-Modulated Challenge–Response Systems , 2008, IEEE Transactions on Information Forensics and Security.
[7] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[8] Gongjun Yan,et al. Providing VANET security through active position detection , 2008, Comput. Commun..
[9] Guofei Gu,et al. Measuring intrusion detection capability: an information-theoretic approach , 2006, ASIACCS '06.
[10] Constantine Kotropoulos,et al. Gaussian Mixture Modeling by Exploiting the Mahalanobis Distance , 2008, IEEE Transactions on Signal Processing.
[11] Victor C. M. Leung,et al. Secure Location Verification for Vehicular Ad-Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[12] Bin Xiao,et al. Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.
[13] Mikhail Nesterenko,et al. Secure Location Verification Using Radio Broadcast , 2004, OPODIS.
[14] Rafail Ostrovsky,et al. Position-Based Quantum Cryptography: Impossibility and Constructions , 2014, SIAM J. Comput..
[15] Boris Skoric,et al. An Information-Theoretic Measure of Intrusion Detection Capability , 2005 .
[16] Mikhail Nesterenko,et al. Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.
[17] Maria Isabel Ribeiro,et al. Gaussian Probability Density Functions: Properties and Error Characterization , 2004 .
[18] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[19] Tim Leinmüller,et al. POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.
[20] Srdjan Capkun,et al. Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.
[21] Azzedine Boukerche,et al. A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET , 2012, IEEE Transactions on Vehicular Technology.
[22] Robert A. Malaney. Wireless Intrusion Detection Using Tracking Verification , 2007, 2007 IEEE International Conference on Communications.
[23] Richard P. Martin,et al. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.