Author:
Riahi Manesh Mohsen,Kaabouch Naima
Funder
North Dakota Established Program
ND EPSCoR
National Science Foundation
Subject
Information Systems and Management,Computer Science Applications,Safety, Risk, Reliability and Quality,Modeling and Simulation
Reference73 articles.
1. O. Baud, N. Honore and O. Taupin, Radar/ADS-B data fusion architecture for experimentation purposes, Proceedings of the Ninth International Conference on Information Fusion, 2006.
2. S. Brands and D. Chaum, Distance-bounding protocols, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, pp. 344–359, 1993.
3. H. Carvalho, W. Heinzelman, A. Murphy and C. Coelho, A general data fusion architecture, Proceedings of the Sixth International Conference on Information Fusion, vol. 2, pp. 1465–1472, 2003.
4. J. Chiang, J. Haas and Y. Hu, Secure and precise location verification using distance bounding and simultaneous multilateration, Proceedings of the Second ACM Conference on Wireless Security, pp. 181–192, 2009.
5. J. Clulow, G. Hancke, M. Kuhn and T. Moore, So near and yet so far: Distance-bounding attacks in wireless networks, Proceedings of the Third European Conference on Security and Privacy in Ad-Hoc Sensor Networks, pp. 83–97, 2006.
Cited by
80 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献