Secrecy beyond encryption: obfuscating transmission signatures in wireless communications
暂无分享,去创建一个
[1] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[2] Srinivasan Seshan,et al. Improving wireless privacy with an identifier-free link layer protocol , 2008, MobiSys '08.
[3] Loukas Lazos,et al. Swift Jamming Attack on Frequency Offset Estimation: The Achilles’ Heel of OFDM Systems , 2016, IEEE Transactions on Mobile Computing.
[4] Loukas Lazos,et al. Security vulnerability and countermeasures of frequency offset correction in 802.11a systems , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[5] Marwan Krunz,et al. Friendly CryptoJam: a mechanism for securing physical-layer attributes , 2014, WiSec '14.
[6] Srdjan Capkun,et al. On Limitations of Friendly Jamming for Confidentiality , 2013, 2013 IEEE Symposium on Security and Privacy.
[7] Kevin Fu,et al. They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.
[8] Matthias Hollick,et al. Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems , 2014, NDSS.
[9] Nagarajan Kandasamy,et al. A real-time and protocol-aware reactive jamming framework built on software-defined radios , 2014, SRIF@SIGCOMM.
[10] Fan Zhang,et al. Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing , 2014, IEEE Transactions on Wireless Communications.
[11] Fan Zhang,et al. Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping , 2011, 2011 31st International Conference on Distributed Computing Systems.
[12] Christoph Neumann,et al. An Empirical Study of Passive 802.11 Device Fingerprinting , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[13] Kevin W. Sowerby,et al. Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers , 2014, J. Comput. Syst. Sci..
[14] Fan Zhang,et al. Inferring users' online activities through traffic analysis , 2011, WiSec '11.
[15] Ivan Martinovic,et al. Who do you sync you are?: smartphone fingerprinting via application behaviour , 2013, WiSec '13.
[16] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[17] Rui Wang,et al. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow , 2010, 2010 IEEE Symposium on Security and Privacy.