Securing wireless systems via lower layer enforcements
- 28 September 2006
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 21 references indexed in Scilit:
- Propagation Models for Short-Range Wireless Channels With Predictable Path GeometriesIEEE Transactions on Communications, 2005
- Security flaws in 802.11 data link protocolsCommunications of the ACM, 2003
- Security problems in 802.11-based networksCommunications of the ACM, 2003
- Secret-key agreement over unauthenticated public channels-part I: definitions and a completeness resultIEEE Transactions on Information Theory, 2003
- Single-user channel estimation and equalizationIEEE Signal Processing Magazine, 2000
- Unconventional cryptographic keying variable managementIEEE Transactions on Communications, 1995
- Quantum cryptographyACM SIGACT News, 1986
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- Broadcast channels with confidential messagesIEEE Transactions on Information Theory, 1978
- Delay Doppler characteristics of multipath propagation at 910 MHz in a suburban mobile radio environmentIEEE Transactions on Antennas and Propagation, 1972