Chaos based constellation scrambling in OFDM systems: Security & interleaving issues
暂无分享,去创建一个
Varun Jeoti | Muhammad Asif Khan | Rana Shahid Manzoor | Mohammad Asim | M. Asim | V. Jeoti | M. A. Khan | R. S. Manzoor
[1] A T Karygiannis,et al. Wireless Network Security: 802.11, Bluetooth and Handheld Devices , 2002 .
[2] Yara B. Luis,et al. PROPERTIES OF A CLASS OF PERMUTATIONS OVER FINITE FIELDS AND APPLICATIONS TO TURBO CODES , 2004 .
[3] A. Baranovsky,et al. DESIGN OF ONE-DIMENSIONAL CHAOTIC MAPS WITH PRESCRIBED STATISTICAL PROPERTIES , 1995 .
[4] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[5] William A. Arbaugh,et al. YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .
[6] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[7] Dietmar Saupe,et al. Chaos and fractals - new frontiers of science , 1992 .
[8] William E. Ryan. A Turbo Code Tutorial , 1997 .
[9] V. Jeoti,et al. Hybrid chaotic image encryption scheme based on S-box and ciphertext feedback , 2007, 2007 International Conference on Intelligent and Advanced Systems.
[10] Kimmo Hiltunen,et al. WLAN Attacks and Risks , 2004 .
[11] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[12] William A. Arbaugh,et al. Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..
[13] Yi Pan,et al. Vulnerabilities and security enhancements for the IEEE 802.11 WLANs , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..