Poster: mimicry attacks against wireless link signature
暂无分享,去创建一个
[1] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.
[2] Rupul Safaya. A Multipath Channel Estimation Algorithm using a Kalman filter , .
[3] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[4] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[5] Srdjan Capkun,et al. Proximity-based access control for implantable medical devices , 2009, CCS.
[6] K. Shanmugan,et al. Random Signals: Detection, Estimation and Data Analysis , 1988 .
[7] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[8] Sneha Kumar Kasera,et al. Advancing wireless link signatures for location distinction , 2008, MobiCom '08.
[9] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.