Physical layer security-from theory to practice

M Mitev, TM Pham, A Chorti… - IEEE BITS the …, 2023 - ieeexplore.ieee.org
In this article we present the evolutionary journey of physical layer security (PLS), starting
from its theoretical foundations in wiretap coding and secret key generation followed by to …

A physical layer, zero-round-trip-time, multifactor authentication protocol

M Mitev, M Shakiba-Herfeh, A Chorti, M Reed… - IEEE …, 2022 - ieeexplore.ieee.org
Lightweight physical layer security schemes that have recently attracted a lot of attention
include physical unclonable functions (PUFs), RF fingerprinting/proximity based …

A review on wireless network security

S Sharma, R Mishra, K Singh - … 2013, Greader Noida, India, January 11 …, 2013 - Springer
Computer network is very essential part of our life by which we can share the information via
different technologies such as wired or wireless. Generally the wireless is mostly adopted …

A survey of android malware characterisitics and mitigation techniques

VN Cooper, H Shahriar… - 2014 11th International …, 2014 - ieeexplore.ieee.org
As mobile applications are being developed at a faster pace, the security aspect of is being
neglected. A solid understanding of the characteristics of malware is the first step to …

[PDF][PDF] Analysis and literature review of IEEE 802.1 x (Authentication) protocols

U Kumar, P Kumar, S Gambhir - International journal of …, 2014 - researchgate.net
This paper gives us detailed study of some of the commonly used EAP authentication
protocol. But before understanding these authentication methods we have to understand …

Mobile cloud computing: security analysis

AH Gamlo, N Zhang, O Bamasag - 2017 5th IEEE International …, 2017 - ieeexplore.ieee.org
This paper provides a comprehensive security analysis of Mobile Cloud Computing (M2C). It
first describes two Cloud Computing (CC) scenarios. The first scenario describes one Cloud …

[PDF][PDF] Performance analysis of signaling cost on EAP-TLS authentication protocol based on cryptography

R Narmadha, S Malarkan, C Ramesh - International Journal of Computer …, 2011 - Citeseer
With the wide applications of wireless communication in the air inter-face, needs secure
connections, efficient decryption and strong authentication mechanisms. In general …

[引用][C] Security Analysis for IEEE 802.11 Standard

GKR Pal - 2018 - National Institute of Technology …

[引用][C] R. Narmadha Dr. S. Malarkan

C Ramesh - 2011