Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("TRAPPE, Wade")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 21 of 21

  • Page / 1
Export

Selection :

  • and

Characterizing Indoor Wireless Channels via Ray Tracing Combined with Stochastic ModelingOZGE KAYA, Aliye; GREENSTEIN, Larry J; TRAPPE, Wade et al.IEEE transactions on wireless communications. 2009, Vol 8, Num 8, pp 4165-4175, issn 1536-1276, 11 p.Article

Key management for 3G MBMS securityWENYUAN XU; TRAPPE, Wade; PAUL, Saniov et al.IEEE Global Telecommunications Conference. 2004, pp 2276-2280, isbn 0-7803-8794-5, 5 p.Conference Paper

Achieving Secret Communication for Fast Rayleigh Fading ChannelsZANG LI; YATES, Roy; TRAPPE, Wade et al.IEEE transactions on wireless communications. 2010, Vol 9, Num 9, pp 2792-2799, issn 1536-1276, 8 p.Article

An IBC and Certificate Based Hybrid Approach to WiMAX SecurityRODOPER, Mete; TRAPPE, Wade; JUNG, Edward et al.Journal of communication and networks (Seoul. Print). 2009, Vol 11, Num 6, pp 615-625, issn 1229-2370, 11 p.Article

Using the Physical Layer for Wireless Authentication in Time-Variant ChannelsLIANG XIAO; GREENSTEIN, Larry J; MANDAYAM, Narayan B et al.IEEE transactions on wireless communications. 2008, Vol 7, Num 7, pp 2571-2579, issn 1536-1276, 9 p.Article

Channel-Based Spoofing Detection in Frequency-Selective Rayleigh ChannelsLIANG XIAO; GREENSTEIN, Larry J; MANDAYAM, Narayan B et al.IEEE transactions on wireless communications. 2009, Vol 8, Num 12, pp 5948-5956, issn 1536-1276, 9 p.Article

SPECIAL ISSUE ON SECURE WIRELESS NETWORKINGPERRIG, Adrian; TRAPPE, Wade; GLIGOR, Virgil et al.Journal of communication and networks (Seoul. Print). 2009, Vol 11, Num 6, issn 1229-2370, 114 p.Serial Issue

Predicting MIMO Performance in Urban Microcells Using Ray Tracing to Characterize the ChannelOZGE KAYA, Aliye; TRAPPE, Wade; GREENSTEIN, Larry J et al.IEEE transactions on wireless communications. 2012, Vol 11, Num 7, pp 2402-2411, issn 1536-1276, 10 p.Article

Detecting and Localizing Identity-Based Attacks in Wireless and Sensor NetworksYINGYING CHEN; JIE YANG; TRAPPE, Wade et al.IEEE transactions on vehicular technology. 2010, Vol 59, Num 5, pp 2418-2434, issn 0018-9545, 17 p.Article

Interworking of Self-organizing Hierarchical Ad Hoc Networks and the InternetLEE, Hyukjoon; SEUNG HYONG RHEE; RAYCHAUDHURI, Dipankar et al.Lecture notes in computer science. 2006, pp 930-937, issn 0302-9743, isbn 3-540-34379-2, 8 p.Conference Paper

Routing for Enhancing Source-Location Privacy in Wireless Sensor Networks of Multiple AssetsTSCHA, Yeonghwan.Journal of communication and networks (Seoul. Print). 2009, Vol 11, Num 6, pp 589-598, issn 1229-2370, 10 p.Article

Anti-collusion forensics of multimedia fingerprinting using orthogonal modulationWANG, Z. Jane; MIN WU; ZHAO, Hong Vicky et al.IEEE transactions on image processing. 2005, Vol 14, Num 6, pp 804-821, issn 1057-7149, 18 p.Article

The robustness of localization algorithms to signal strength attacks : A comparative studyYINGYING CHEN; KLEISOURIS, Konstantinos; XIAOYAN LI et al.Lecture notes in computer science. 2006, pp 546-563, issn 0302-9743, isbn 3-540-35227-9, 1Vol, 18 p.Conference Paper

Efficient Key Detection Method in the Correlation Electromagnetic Analysis Using Peak Selection AlgorithmYOU SUNG KANG; DOO HO CHOI; BYUNG HO CHUNG et al.Journal of communication and networks (Seoul. Print). 2009, Vol 11, Num 6, pp 556-563, issn 1229-2370, 8 p.Article

A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e NetworksLEE, Myoungrak; LEE, Taek; YOON, Byungsik et al.Journal of communication and networks (Seoul. Print). 2009, Vol 11, Num 6, pp 626-633, issn 1229-2370, 8 p.Article

Flexible, Extensible, and Efficient VANET AuthenticationSTUDER, Ahren; FAN BAI; BELLUR, Bhargav et al.Journal of communication and networks (Seoul. Print). 2009, Vol 11, Num 6, pp 574-588, issn 1229-2370, 15 p.Article

Formalizing the Design, Evaluation, and Analysis of Quality of Protection in Wireless NetworksLIM, Sun-Hee; YUN, Seunghwan; LIM, Jongin et al.Journal of communication and networks (Seoul. Print). 2009, Vol 11, Num 6, pp 634-644, issn 1229-2370, 11 p.Article

Application of Wavelet-Based RF Fingerprinting to Enhance Wireless Network SecurityKLEIN, Randall W; TEMPLE, Michael A; MENDENHALL, Michael J et al.Journal of communication and networks (Seoul. Print). 2009, Vol 11, Num 6, pp 544-555, issn 1229-2370, 12 p.Article

Redundancy Minimizing Techniques for Robust Transmission in Wireless NetworksKACEWICZ, Anna; WICKER, Stephen B.Journal of communication and networks (Seoul. Print). 2009, Vol 11, Num 6, pp 564-573, issn 1229-2370, 10 p.Article

An Energy-Efficient Access Control Scheme for Wireless Sensor Networks based on Elliptic Curve CryptographyXUAN HUNG LE; LEE, Sungyoung; BUTUN, Ismail et al.Journal of communication and networks (Seoul. Print). 2009, Vol 11, Num 6, pp 599-606, issn 1229-2370, 8 p.Article

Collusion resistant multimedia fingerprinting: A unified frameworkMIN WU; TRAPPE, Wade; WANG, Z. Jane et al.SPIE proceedings series. 2004, pp 748-759, isbn 0-8194-5209-2, 12 p.Conference Paper

  • Page / 1