[1] Zeng, K., Govindan, K. and Mohapatra, P. (2010) Non-Cryptographic Authentication and Identification in Wireless Networks. IEEE Wireless Communications, 17, 56-62.
http://dx.doi.org/10.1109/MWC.2010.5601959
[2] Xiao, L., Greenstern, L., Mandayam, N. and Trappe, W. (2008) MIMO-Assisted Channel-Based Authentication in Wireless Networks. IEEE Conference on Information Sciences and Systems (CISS), 642-646.
[3] He, F., Man, H., Kivanc, D. and McNair, B. (2009) EPSON: Enhanced Physical Security in OFDM Networks. IEEE International Conference on Communications (ICC), 14-18 June 2009, Dresden, 1-5.
[4] Tugnait, J.K. and Kim, H. (2010) A Channel-Based Hypothesis Testing Approach to Enhance User Authentication in Wireless Networks. IEEE International Conference on Communication Systems and Networks (COMSNETS), 1-9.
[5] Rosati, S., Corazza, G.E. and Coralli, A.V. (2009) OFDM Channel Estimation with Optimal Threshold-Based Selection of CIR Samples. Proceedings of IEEE Global Telecommunication Conference (GLOBE-COM), 1-7.
[6] Nair, S., Abraham, S. and Al Ibrahim, O. (2011) Security Architecture for Resource-Limited Environments. International Wireless Communications and Mobile Computing Conference (IWCMC), 412-417,
[7] Goergen, N., Charles Clancy, T. and Newman, T.R. (2010) Physical Layer Authentication Watermarks through Synthetic Channel Emulation. IEEE Symposium on New Frontiers in Dynamic Spectrum, 6-9 April 2010, Singapore, 1-7.
[8] Touch, J., Mankin, A. and Bonica, R. (2009) The TCP Authentication Option. draft-ietf-tcpm-tcp-auth-opt-05.
[9] Zalewski, M. (2012) The Tangled Web: A Guide to Securing Modern Web Applications. No Starch Press, San Francisco.
[10] Zalewski, M. (2005) Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks. No Starch Press, San Francisco.
[11] Venkatraman, L. and Agrawal, D.P. (2000) A Novel Authentication Scheme for ad hoc Networks. Wireless Communications and Networking Conference, 23-28 September 2000, Chicago, 1268-1273.
[12] Xiao, L., Greenstein, L., Mandayam, N. and Trappe, W. (2008) A Physical-Layer Technique to Enhance Authentication for Mobile Terminals. IEEE International Conference on Communications (ICC), 19-23 May 2008, Beijing, 1520-1524.
[13] Xiao, L., Greenstein, L., Mandayam, N. and Trappe, W. (2007) Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. IEEE International Conference on Communication, 24-28 June 2007, Glasgow, 4646-4651.
[14] Cain, J., Clark, G. and Geist, J. (1979) Punctured Convolutional Codes of Rate (n-1)/n and Simplified Maximum Likelihood Decoding. IEEE Transactions on Information Theory, January 1979, 97-100.