Efficient uncoordinated FHSS anti-jamming communication
暂无分享,去创建一个
[1] Andreas N. Philippou,et al. Success run statistics defined on an urn model , 2007, Advances in Applied Probability.
[2] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[3] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[4] Vincent Rijmen,et al. ECRYPT yearly report on algorithms and keysizes , 2009 .
[5] Panagiotis Papadimitratos,et al. Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.
[6] Josh Benaloh,et al. One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.
[7] Srdjan Capkun,et al. Jamming-resistant Broadcast Communication without Shared Keys , 2009, USENIX Security Symposium.
[8] Rachid Guerraoui,et al. Secure communication over radio channels , 2008, PODC '08.
[9] Guevara Noubir,et al. Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.
[10] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..
[11] P. Maymounkov. Online codes , 2002 .
[12] Josef Pieprzyk,et al. Broadcast anti-jamming systems , 1999, IEEE International Conference on Networks. ICON '99 Proceedings (Cat. No.PR00243).
[13] L.C. Baird,et al. Keyless Jam Resistance , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.
[14] Stephen G. Wilson,et al. Digital Modulation and Coding , 1995 .
[15] Srdjan Capkun,et al. Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[16] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[17] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[18] Birgit Pfitzmann,et al. Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.
[19] Yih-Chun Hu,et al. Dynamic Jamming Mitigation for Wireless Broadcast Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[20] Michael Luby,et al. LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[21] Lan Nguyen,et al. Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.
[22] Daniel A. Spielman,et al. Practical loss-resilient codes , 1997, STOC '97.
[23] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[24] Adrian Perrig,et al. Distillation Codes and Applications to DoS Resistant Multicast Authentication , 2004, NDSS.
[25] David L Adamy,et al. Ew 101: A First Course in Electronic Warfare , 2001 .
[26] Matthew Green,et al. Practical Short Signature Batch Verification , 2009, CT-RSA.
[27] Srdjan Capkun,et al. Jamming-resistant Broadcast Communication without Shared Keys; ; ETH Zurich D-INFK Technical Report; , 2008 .
[28] Radha Poovendran,et al. A coding-theoretic approach for efficient message verification over insecure channels , 2009, WiSec '09.
[29] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).