157 papers found
Refreshing results…
The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices
The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints
Imaging time series for internet of things radio frequency fingerprinting
GNSS Receiver Identification Using Clock-Derived Metrics
Identification of Wireless Devices From Their Physical Layer Radio-Frequency Fingerprints:
Improving Internet of Things device certification with policy-based management
Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy
A wireless propagation analysis for the frequency of the pseudonym changes to support privacy in VANETs
Security and privacy issues for an IoT based smart home
Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns
An Experimental Evaluation of Low-Cost GNSS Jamming Sensors: Evaluation of Low-Cost GNSS Jamming Sensors
Mobile phone identification through the built-in magnetometers
A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components
An Analysis of the Privacy Threat in Vehicular Ad Hoc Networks due to Radio Frequency Fingerprinting
Report on a demonstrator for the fight against counterfeiting: Classification and verification of consumer electronic devices for fight against counterfeiting: the case study of the mobile phone
Proof of Concept (PoC) of the remote interrogation for the smart tachograph based on CEN-Dedicated Short Range Communications (DSRC)
Enforcers and brand owners’ empowerment in the fight against counterfeiting
Robust GNSS Services for Road Transportation: Analysis and studies to mitigate GNSS threats in the road transportation sector
Security certification and labelling in Internet of Things
GNSS Receiver Fingerprinting for Security-Enhanced Applications
Missing publications? Read more about our data sources.