[1]
|
Zeng, K., Govindan, K. and Mohapatra, P. (2010) Non-Cryptographic Authentication and Identification in Wireless Networks. IEEE Wireless Communications, 17, 56-62. http://dx.doi.org/10.1109/MWC.2010.5601959
|
[2]
|
Xiao, L., Greenstern, L., Mandayam, N. and Trappe, W. (2008) MIMO-Assisted Channel-Based Authentication in Wireless Networks. IEEE Conference on Information Sciences and Systems (CISS), 642-646.
|
[3]
|
He, F., Man, H., Kivanc, D. and McNair, B. (2009) EPSON: Enhanced Physical Security in OFDM Networks. IEEE International Conference on Communications (ICC), 14-18 June 2009, Dresden, 1-5.
|
[4]
|
Tugnait, J.K. and Kim, H. (2010) A Channel-Based Hypothesis Testing Approach to Enhance User Authentication in Wireless Networks. IEEE International Conference on Communication Systems and Networks (COMSNETS), 1-9.
|
[5]
|
Rosati, S., Corazza, G.E. and Coralli, A.V. (2009) OFDM Channel Estimation with Optimal Threshold-Based Selection of CIR Samples. Proceedings of IEEE Global Telecommunication Conference (GLOBE-COM), 1-7.
|
[6]
|
Nair, S., Abraham, S. and Al Ibrahim, O. (2011) Security Architecture for Resource-Limited Environments. International Wireless Communications and Mobile Computing Conference (IWCMC), 412-417,
|
[7]
|
Goergen, N., Charles Clancy, T. and Newman, T.R. (2010) Physical Layer Authentication Watermarks through Synthetic Channel Emulation. IEEE Symposium on New Frontiers in Dynamic Spectrum, 6-9 April 2010, Singapore, 1-7.
|
[8]
|
Touch, J., Mankin, A. and Bonica, R. (2009) The TCP Authentication Option. draft-ietf-tcpm-tcp-auth-opt-05.
|
[9]
|
Zalewski, M. (2012) The Tangled Web: A Guide to Securing Modern Web Applications. No Starch Press, San Francisco.
|
[10]
|
Zalewski, M. (2005) Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks. No Starch Press, San Francisco.
|
[11]
|
Venkatraman, L. and Agrawal, D.P. (2000) A Novel Authentication Scheme for ad hoc Networks. Wireless Communications and Networking Conference, 23-28 September 2000, Chicago, 1268-1273.
|
[12]
|
Xiao, L., Greenstein, L., Mandayam, N. and Trappe, W. (2008) A Physical-Layer Technique to Enhance Authentication for Mobile Terminals. IEEE International Conference on Communications (ICC), 19-23 May 2008, Beijing, 1520-1524.
|
[13]
|
Xiao, L., Greenstein, L., Mandayam, N. and Trappe, W. (2007) Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. IEEE International Conference on Communication, 24-28 June 2007, Glasgow, 4646-4651.
|
[14]
|
Cain, J., Clark, G. and Geist, J. (1979) Punctured Convolutional Codes of Rate (n-1)/n and Simplified Maximum Likelihood Decoding. IEEE Transactions on Information Theory, January 1979, 97-100.
|