Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints. Ali, S., T., Sivaraman, V., Ostry, D., Tsudik, G., & Jha, S. Information Forensics and Security, IEEE Transactions on, 9(12):2193-2204, 12, 2014. Website bibtex @article{
title = {Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints},
type = {article},
year = {2014},
identifiers = {[object Object]},
keywords = {provenance,security,wearable},
pages = {2193-2204},
volume = {9},
websites = {http://dx.doi.org/10.1109/TIFS.2014.2357998},
month = {12},
id = {9c6faf08-4661-361c-9745-f1c637e623de},
created = {2018-07-12T21:32:00.563Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:32:00.563Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {ali:provenancebodyworn},
source_type = {article},
private_publication = {false},
bibtype = {article},
author = {Ali, S T and Sivaraman, V and Ostry, D and Tsudik, G and Jha, S},
journal = {Information Forensics and Security, IEEE Transactions on},
number = {12}
}
Downloads: 0
{"_id":"zdPcsftFSWBBQinRM","bibbaseid":"ali-sivaraman-ostry-tsudik-jha-securingfirsthopdataprovenanceforbodyworndevicesusingwirelesslinkfingerprints-2014","downloads":0,"creationDate":"2019-02-15T15:15:00.490Z","title":"Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints","author_short":["Ali, S., T.","Sivaraman, V.","Ostry, D.","Tsudik, G.","Jha, S."],"year":2014,"bibtype":"article","biburl":null,"bibdata":{"title":"Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints","type":"article","year":"2014","identifiers":"[object Object]","keywords":"provenance,security,wearable","pages":"2193-2204","volume":"9","websites":"http://dx.doi.org/10.1109/TIFS.2014.2357998","month":"12","id":"9c6faf08-4661-361c-9745-f1c637e623de","created":"2018-07-12T21:32:00.563Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:32:00.563Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"ali:provenancebodyworn","source_type":"article","private_publication":false,"bibtype":"article","author":"Ali, S T and Sivaraman, V and Ostry, D and Tsudik, G and Jha, S","journal":"Information Forensics and Security, IEEE Transactions on","number":"12","bibtex":"@article{\n title = {Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints},\n type = {article},\n year = {2014},\n identifiers = {[object Object]},\n keywords = {provenance,security,wearable},\n pages = {2193-2204},\n volume = {9},\n websites = {http://dx.doi.org/10.1109/TIFS.2014.2357998},\n month = {12},\n id = {9c6faf08-4661-361c-9745-f1c637e623de},\n created = {2018-07-12T21:32:00.563Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:32:00.563Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {ali:provenancebodyworn},\n source_type = {article},\n private_publication = {false},\n bibtype = {article},\n author = {Ali, S T and Sivaraman, V and Ostry, D and Tsudik, G and Jha, S},\n journal = {Information Forensics and Security, IEEE Transactions on},\n number = {12}\n}","author_short":["Ali, S., T.","Sivaraman, V.","Ostry, D.","Tsudik, G.","Jha, S."],"urls":{"Website":"http://dx.doi.org/10.1109/TIFS.2014.2357998"},"bibbaseid":"ali-sivaraman-ostry-tsudik-jha-securingfirsthopdataprovenanceforbodyworndevicesusingwirelesslinkfingerprints-2014","role":"author","keyword":["provenance","security","wearable"],"downloads":0},"search_terms":["securing","first","hop","data","provenance","bodyworn","devices","using","wireless","link","fingerprints","ali","sivaraman","ostry","tsudik","jha"],"keywords":["provenance","security","wearable"],"authorIDs":[]}