PHYSICAL LAYER & TELECOMMUNICATIONS SECURITY KNOWLEDGE AREA ( DRAFT FOR COMMENT )
暂无分享,去创建一个
[1] Srdjan Capkun,et al. Security of Distance-Bounding , 2018, ACM Comput. Surv..
[2] Wenyuan Xu,et al. DolphinAttack: Inaudible Voice Commands , 2017, CCS.
[3] Srdjan Capkun,et al. Are We Really Close? Verifying Proximity in Wireless Systems , 2017, IEEE Security & Privacy.
[4] Wenyuan Xu,et al. WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[5] Aanjhan Ranganathan,et al. Physical-layer Techniques for Secure Proximity Verification and Localization , 2016 .
[6] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[7] Adi Shamir,et al. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis , 2014, CRYPTO.
[8] Wenyuan Xu,et al. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors , 2013, 2013 IEEE Symposium on Security and Privacy.
[9] Srdjan Capkun,et al. Physical-Layer Identification of Wireless Devices , 2011 .
[10] Ivan Martinovic,et al. A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.
[11] Sung-Ju Lee,et al. STROBE: Actively securing wireless communications using Zero-Forcing Beamforming , 2012, 2012 Proceedings IEEE INFOCOM.
[12] Kevin Fu,et al. They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.
[13] Christina Pöpper. On Secure Wireless Communication under Adversarial Interference , 2011 .
[14] Martin Welk,et al. Tempest in a Teapot: Compromising Reflections Revisited , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[15] Markus G. Kuhn,et al. So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks , 2006, ESAS.
[16] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[17] Markus G. Kuhn,et al. Compromising Emanations , 2002, Encyclopedia of Cryptography and Security.
[18] David L Adamy,et al. Ew 101: A First Course in Electronic Warfare , 2001 .