Sciweavers

7 search results - page 2 / 2
» Secure Location Verification - A Security Analysis of GPS Si...
Sort
View
TIFS
2008
145views more  TIFS 2008»
13 years 5 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
JSAC
2008
199views more  JSAC 2008»
13 years 5 months ago
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in li...
Ruiliang Chen, Jung Min Park, Jeffrey H. Reed