Wade Trappe
Wade Trappe
Professor, Electrical and Computer Engineering, WINLAB, Rutgers University
Bestätigte E-Mail-Adresse bei winlab.rutgers.edu
Zitiert von
Zitiert von
The feasibility of launching and detecting jamming attacks in wireless networks
W Xu, W Trappe, Y Zhang, T Wood
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
Introduction to cryptography with coding theory
W Trappe
Pearson Education India, 2006
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
S Mathur, W Trappe, N Mandayam, C Ye, A Reznik
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
Enhancing source-location privacy in sensor network routing
P Kamat, Y Zhang, W Trappe, C Ozturk
25th IEEE international conference on distributed computing systems (ICDCS …, 2005
Jamming sensor networks: attack and defense strategies
W Xu, K Ma, W Trappe, Y Zhang
IEEE network 20 (3), 41-47, 2006
Robust statistical methods for securing wireless localization in sensor networks
Z Li, W Trappe, Y Zhang, B Nath
IPSN 2005. Fourth International Symposium on Information Processing in …, 2005
Anti-collusion fingerprinting for multimedia
W Trappe, M Wu, ZJ Wang, KJR Liu
IEEE Transactions on Signal Processing 51 (4), 1069-1087, 2003
Detecting and localizing wireless spoofing attacks
Y Chen, W Trappe, RP Martin
2007 4th Annual IEEE Communications Society Conference on sensor, mesh and …, 2007
Source-location privacy in energy-constrained sensor network routing
C Ozturk, Y Zhang, W Trappe
Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor …, 2004
Parknet: drive-by sensing of road-side parking statistics
S Mathur, T Jin, N Kasturirangan, J Chandrasekaran, W Xue, M Gruteser, ...
Proceedings of the 8th international conference on Mobile systems …, 2010
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
I Rouf, RD Miller, HA Mustafa, T Taylor, S Oh, W Xu, M Gruteser, ...
USENIX Security Symposium 10, 2010
Channel surfing and spatial retreats: defenses against wireless denial of service
W Xu, T Wood, W Trappe, Y Zhang
Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004
Information-theoretically secret key generation for fading wireless channels
C Ye, S Mathur, A Reznik, Y Shah, W Trappe, NB Mandayam
IEEE Transactions on Information Forensics and Security 5 (2), 240-254, 2010
Using the physical layer for wireless authentication in time-variant channels
L Xiao, LJ Greenstein, NB Mandayam, W Trappe
IEEE Transactions on Wireless Communications 7 (7), 2571-2579, 2008
Collusion-resistant fingerprinting for multimedia
M Wu, W Trappe, ZJ Wang, KJR Liu
IEEE Signal Processing Magazine 21 (2), 15-27, 2004
Securing wireless communications at the physical layer
R Liu
Springer, 2010
Fingerprints in the ether: Using the physical layer for wireless authentication
L Xiao, L Greenstein, N Mandayam, W Trappe
2007 IEEE International conference on communications, 4646-4651, 2007
Channel surfing: defending wireless sensor networks from interference
W Xu, W Trappe, Y Zhang
2007 6th International Symposium on Information Processing in Sensor …, 2007
SCPL: Indoor device-free multi-subject counting and localization using radio signal strength
C Xu, B Firner, RS Moore, Y Zhang, W Trappe, R Howard, F Zhang, N An
Proceedings of the 12th international conference on Information Processing …, 2013
Securing wireless systems via lower layer enforcements
Z Li, W Xu, R Miller, W Trappe
Proceedings of the 5th ACM workshop on Wireless security, 33-42, 2006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20