Device fingerprinting in wireless networks: Challenges and opportunities

Q Xu, R Zheng, W Saad, Z Han - … Communications Surveys & …, 2015 - ieeexplore.ieee.org
Node forgery or impersonation, in which legitimate cryptographic credentials are captured
by an adversary, constitutes one major security threat facing wireless networks. The fact that …

Device Fingerprinting in Wireless Networks: Challenges and Opportunities

Q Xu, R Zheng, W Saad, Z Han - 2015 - uh-ir.tdl.org
Node forgery or impersonation, in which legitimate cryptographic credentials are captured
by an adversary, constitutes one major security threat facing wireless networks. The fact that …

Device Fingerprinting in Wireless Networks: Challenges and Opportunities

Q Xu, R Zheng, W Saad, Z Han - arXiv preprint arXiv:1501.01367, 2015 - arxiv.org
Node forgery or impersonation, in which legitimate cryptographic credentials are captured
by an adversary, constitutes one major security threat facing wireless networks. The fact that …

Device Fingerprinting in Wireless Networks: Challenges and Opportunities

Q Xu, R Zheng, W Saad, Z Han - IEEE Communications Surveys & …, 2016 - dl.acm.org
Node forgery or impersonation, in which legitimate cryptographic credentials are captured
by an adversary, constitutes one major security threat facing wireless networks. The fact that …

Device Fingerprinting in Wireless Networks: Challenges and Opportunities

Q Xu, R Zheng, W Saad, Z Han - arXiv e-prints, 2015 - ui.adsabs.harvard.edu
Node forgery or impersonation, in which legitimate cryptographic credentials are captured
by an adversary, constitutes one major security threat facing wireless networks. The fact that …

[PDF][PDF] Device Fingerprinting in Wireless Networks: Challenges and Opportunities

Q Xu, R Zheng, W Saad, Z Han - arXiv preprint arXiv:1501.01367, 2015 - researchgate.net
Node forgery or impersonation, in which legitimate cryptographic credentials are captured
by an adversary, constitutes one major security threat facing wireless networks. The fact that …

Device fingerprinting in wireless networks: Challenges and opportunities

Q Xu, R Zheng, W Saad, Z Han - … Surveys and Tutorials, 2016 - khu.elsevierpure.com
Node forgery or impersonation, in which legitimate cryptographic credentials are captured
by an adversary, constitutes one major security threat facing wireless networks. The fact that …

[引用][C] Device Fingerprinting in Wireless Networks: Challenges and Opportunities

Q Xu, R Zheng, W Saad, Z Han - IEEE Communications Surveys & …, 2016 - cir.nii.ac.jp
Device Fingerprinting in Wireless Networks: Challenges and Opportunities | CiNii Research
CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 論文・データを …

[PDF][PDF] Device Fingerprinting in Wireless Networks: Challenges and Opportunities

Q Xu, R Zheng, W Saad, Z Han - arXiv preprint arXiv:1501.01367, 2015 - academia.edu
Node forgery or impersonation, in which legitimate cryptographic credentials are captured
by an adversary, constitutes one major security threat facing wireless networks. The fact that …

[PDF][PDF] Device Fingerprinting in Wireless Networks: Challenges and Opportunities

Q Xu, R Zheng, W Saad, Z Han - arXiv preprint arXiv:1501.01367, 2015 - researchgate.net
Node forgery or impersonation, in which legitimate cryptographic credentials are captured
by an adversary, constitutes one major security threat facing wireless networks. The fact that …