Investigation of signal and message manipulations on the wireless channel
From MaRDI portal
Publication:3100897
Recommendations
- Signal-flow-based analysis of wireless security protocols
- Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications.
- Applied Cryptography and Network Security
- Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
- On Establishing and Fixing a Parallel Session Attack in a Security Protocol
Cited in
(1)
This page was built for publication: Investigation of signal and message manipulations on the wireless channel
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3100897)