Investigation of signal and message manipulations on the wireless channel
DOI10.1007/978-3-642-23822-2_3zbMATH Open1481.94059OpenAlexW1874069312MaRDI QIDQ3100897FDOQ3100897
Authors: Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
Publication date: 22 November 2011
Published in: Computer Security – ESORICS 2011 (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/20.500.11850/354030
Recommendations
- Signal-flow-based analysis of wireless security protocols
- Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications.
- Applied Cryptography and Network Security
- Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
- On Establishing and Fixing a Parallel Session Attack in a Security Protocol
Signal theory (characterization, reconstruction, filtering, etc.) (94A12) Channel models (including quantum) in information and communication theory (94A40)
Cited In (1)
This page was built for publication: Investigation of signal and message manipulations on the wireless channel
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3100897)