Author of the publication

PHY-layer authentication using hierarchical modulation and duobinary signaling.

, , , and . ICNC, page 782-786. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PHY-layer authentication by introducing controlled inter symbol interference., , , and . CNS, page 10-18. IEEE, (2013)Physical layer authentication using controlled inter symbol interference., , , and . DySPAN, page 286. IEEE, (2012)Blind Transmitter Authentication for Spectrum Security and Enforcement., , and . ACM Conference on Computer and Communications Security, page 787-798. ACM, (2014)Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication., , , , and . ACM Conference on Computer and Communications Security, page 1334-1345. ACM, (2015)PHY-layer authentication using hierarchical modulation and duobinary signaling., , , and . ICNC, page 782-786. IEEE, (2014)Crowd-Sourced Authentication for Enforcement in Dynamic Spectrum Sharing., , , and . IEEE Trans. Cogn. Comm. & Networking, 5 (3): 625-636 (2019)Security and Enforcement in Spectrum Sharing., , , , , and . Proceedings of the IEEE, 102 (3): 270-281 (2014)PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement., , and . IEEE Trans. Information Forensics and Security, 11 (5): 1027-1038 (2016)Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System., , , , , , , and . AsiaCCS, page 567-574. ACM, (2018)Achievable Secrecy Sum-Rate in a Fading MAC-WT with Power Control and without CSI of Eavesdropper, , and . CoRR, (2011)