MIO: Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation
暂无分享,去创建一个
Jin Zhang | Wei Lou | Tao Xiong | Hailun Tan | W. Lou | Hailun Tan | Tao Xiong | Jin Zhang
[1] Michael W. Hoffman,et al. Fully programmable, scalable chaos-based PN sequence generation , 2000 .
[2] Srikrishna Bhashyam,et al. Multiuser channel estimation and tracking for long-code CDMA systems , 2002, IEEE Trans. Commun..
[3] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[4] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[5] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] J.M. Gilbert,et al. An integrated 802.11a baseband and MAC processor , 2002, 2002 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.02CH37315).
[7] Gilles Van Assche,et al. Quantum cryptography and secret-key distillation , 2006 .
[8] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[9] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[10] Kevin Fu,et al. They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.
[11] Bijan G. Mobasseri,et al. Digital modulation classification using constellation shape , 2000, Signal Process..
[12] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[13] Steven M. Bellovin,et al. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.
[14] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[15] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[16] Ezio Biglieri,et al. Design of spread-spectrum sequences using chaotic dynamical systems and ergodic theory , 2001 .
[17] H. Vincent Poor,et al. Secure Nested Codes for Type II Wiretap Channels , 2007, 2007 IEEE Information Theory Workshop.
[18] Mohammad Iftekhar Husain,et al. CD-PHY: Physical layer security in wireless networks through constellation diversity , 2011, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[19] Douglas R. Stinson. Universal Hashing and Authentication Codes , 1991, CRYPTO.
[20] B. Ramkumar,et al. Automatic modulation classification for cognitive radios using cyclic feature detection , 2009, IEEE Circuits and Systems Magazine.
[21] Dina Katabi,et al. Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.
[22] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[23] Srdjan Capkun,et al. Investigation of Signal and Message Manipulations on the Wireless Channel , 2011, ESORICS.
[24] Dina Katabi,et al. Zigzag decoding: combating hidden terminals in wireless networks , 2008, SIGCOMM '08.
[25] Srihari Nelakuditi,et al. CSMA/CN: Carrier Sense Multiple Access With Collision Notification , 2012, IEEE/ACM Transactions on Networking.
[26] Jian Ren,et al. Physical layer built-in security analysis and enhancement of CDMA systems , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[27] Adam O'Neill,et al. Correlated-Input Secure Hash Functions , 2011, TCC.
[28] Hari Balakrishnan,et al. PPR: partial packet recovery for wireless networks , 2007, SIGCOMM '07.
[29] Paul G. Flikkema,et al. Wireless physical-layer security via transmit precoding over dispersive channels: optimum linear eavesdropping , 2002, MILCOM 2002. Proceedings.
[30] Petar Popovski,et al. Shout to Secure: Physical-Layer Wireless Security with Known Interference , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[31] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[32] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[33] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[34] Dong Chao,et al. Universal Software Radio Peripheral , 2010 .