Publisher
Springer International Publishing
Reference12 articles.
1. Y. Liu, P. Ning, and H. Dai. Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In IEEE Symposium on Security and Privacy, pages 286–301. IEEE, 2010.
2. P. Kyritsi, D. C. Cox, R. A. Valenzuela, and P. W. Wolniansky. Correlation analysis based on MIMO channel measurements in an indoor environment. IEEE Journal on Selected areas in communications, 21 (5): 713–720, 2003.
3. M. Edman, A. Kiayias, and B. Yener. On passive inference attacks against physical-layer key extraction? In European Workshop on System Security, page 8. ACM, 2011.
4. X. He, H. Dai, W. Shen, P. Ning, and R. Dutta. Toward proper guard zones for link signature. IEEE Transactions on Wireless Communications, 15 (3): 2104–2117, 2016.
5. B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In ACM conference on Computer and communications security, pages 401–410. ACM, 2007.