skip to main content
Skip header Section
Spread spectrum communications handbook (revised ed.)July 1994
Publisher:
  • McGraw-Hill, Inc.
  • Professional Book Group 11 West 19th Street New York, NY
  • United States
ISBN:978-0-07-057629-2
Published:01 July 1994
Pages:
1228
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Amihood B and Cohen A (2024). Covertly Controlling a Linear System, IEEE Transactions on Information Forensics and Security, 19, (2651-2663), Online publication date: 1-Jan-2024.
  2. Wang C, Li Z, Zheng T, Ng D and Al-Dhahir N (2023). Intelligent Reflecting Surface-Aided Full-Duplex Covert Communications: Information Freshness Optimization, IEEE Transactions on Wireless Communications, 22:5, (3246-3263), Online publication date: 1-May-2023.
  3. Arghavani A, Dey S and Ahlén A (2023). Covert Outage Minimization in the Presence of Multiple Wardens, IEEE Transactions on Signal Processing, 71, (686-700), Online publication date: 1-Jan-2023.
  4. Ma S, Zhang Y, Sheng H, Li H, Shi J, Yang L, Wu Y, Al-Dhahir N and Li S (2022). Optimal Probabilistic Constellation Shaping for Covert Communications, IEEE Transactions on Information Forensics and Security, 17, (3165-3178), Online publication date: 1-Jan-2022.
  5. Gómez A, Gómez-Pérez D and Tirkel A Generalised GMW Sequences 2021 IEEE International Symposium on Information Theory (ISIT), (1806-1811)
  6. Guo F, Liu L, Wang A and Wen Q (2019). Practical covert quantum key distribution with decoy-state method, Quantum Information Processing, 18:4, (1-18), Online publication date: 1-Apr-2019.
  7. Watson W, Couto D and Beaudeau J Low Probability of Exploitation Waveform Design Using Barankin Bound Formulation MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM), (1-6)
  8. Soltani R, Goeckel D, Towsley D and Houmansadr A Fundamental Limits of Covert Bit Insertion in Packets 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1065-1072)
  9. Gao Y, Xiao Y, Wu M, Xiao M and Shao J (2018). Game Theory-Based Anti-Jamming Strategies for Frequency Hopping Wireless Communications, IEEE Transactions on Wireless Communications, 17:8, (5314-5326), Online publication date: 1-Aug-2018.
  10. ACM
    Lakshminarayana S, Karachiwala J, Chang S, Revadigar G, Kumar S, Yau D and Hu Y Signal Jamming Attacks Against Communication-Based Train Control Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (160-171)
  11. ACM
    Giustiniano D, Schalch M, Liechti M and Lenders V Interference Suppression in Bandwidth Hopping Spread Spectrum Communications Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (134-143)
  12. Boztaş S, Özbudak F and Tekin E (2018). Generalized nonbinary sequences with perfect autocorrelation, flexible alphabets and new periods, Cryptography and Communications, 10:3, (509-517), Online publication date: 1-May-2018.
  13. Faix M, Mazer E, Laurent R, Abdallah M, Le Hy R and Lobo J (2017). Cognitive Computation, International Journal of Software Science and Computational Intelligence, 9:3, (37-58), Online publication date: 1-Jul-2017.
  14. ACM
    Ben- Adar Bessos M, Birnbach S, Herzberg A and Martinovic I Exposing Transmitters in Mobile Multi-Agent Games Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, (125-136)
  15. Garlapati S, Kuruganti T, Buehrer M, Reed J, Garlapati S, Kuruganti T, Buehrer M and Reed J (2016). SMAC, IEEE/ACM Transactions on Networking, 24:5, (2648-2662), Online publication date: 1-Oct-2016.
  16. Chang S, Hu Y and Laurenti N (2016). SimpleMAC, IEEE/ACM Transactions on Networking, 24:2, (1095-1108), Online publication date: 1-Apr-2016.
  17. ACM
    Liechti M, Lenders V and Giustiniano D Jamming mitigation by randomized bandwidth hopping Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, (1-13)
  18. Li L, An J, Wang Z and Li X (2015). Under-sampling spectrum-sparse signals based on active aliasing for low probability detection, Security and Communication Networks, 8:18, (4087-4097), Online publication date: 1-Dec-2015.
  19. ACM
    Chang S, Hu Y, Chiang J and Chang S Redundancy offset narrow spectrum Proceedings of the 11th ACM international symposium on Mobility management and wireless access, (51-58)
  20. ACM
    Das S, Mukherjee R, Kundu R and Vasilakos T Multi-user detection in multi-carrier CDMA wireless broadband system using a binary adaptive differential evolution algorithm Proceedings of the 15th annual conference on Genetic and evolutionary computation, (1245-1252)
  21. Richa A, Scheideler C, Schmid S and Zhang J (2013). Competitive throughput in multi-hop wireless networks despite adaptive jamming, Distributed Computing, 26:3, (159-171), Online publication date: 1-Jun-2013.
  22. ACM
    Vo-Huu T, Blass E and Noubir G Counter-jamming using mixed mechanical and software interference cancellation Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, (31-42)
  23. ACM
    Chang S, Hu Y and Laurenti N SimpleMAC Proceedings of the 18th annual international conference on Mobile computing and networking, (77-88)
  24. Chung J and Yang K Low-Hit-Zone frequency-hopping sequence sets with new parameters Proceedings of the 7th international conference on Sequences and Their Applications, (202-211)
  25. Zhou Z, Tang X, Yang Y and Parampalli U On the aperiodic hamming correlation of frequency-hopping sequences from norm functions Proceedings of the 7th international conference on Sequences and Their Applications, (148-158)
  26. ACM
    Firouzbakht K, Noubir G and Salehi M On the capacity of rate-adaptive packetized wireless communication links under jamming Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, (3-14)
  27. Zhang Z and Zhang M Pulse amplitude modulation time-hopping spread-spectrum based on balance gold sequences Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II, (108-115)
  28. ACM
    Liu S, Lazos L and Krunz M Thwarting inside jamming attacks on wireless broadcast communications Proceedings of the fourth ACM conference on Wireless network security, (29-40)
  29. Zheng L, Ge W and Qiu H (2010). Master synchronization in physical-layer communications of wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, 2010, (1-9), Online publication date: 1-Apr-2010.
  30. Liu Y, Ning P, Dai H and Liu A Randomized differential DSSS Proceedings of the 29th conference on Information communications, (695-703)
  31. Chung J, Han Y and Yang K (2009). New classes of optimal frequency-hopping sequences by interleaving techniques, IEEE Transactions on Information Theory, 55:12, (5783-5791), Online publication date: 1-Dec-2009.
  32. Kim J, Wang C and Orra M Performance analysis of SDPSK and 1-bit differential GMSK modems for FFH-FDMA satellite communications under jamming Proceedings of the 28th IEEE conference on Global telecommunications, (2120-2125)
  33. Kim Y, Li X and Won S A new design of multi-path searcher in for W-CDMA mobile station with multi-antenna Proceedings of the 15th Asia-Pacific conference on Communications, (607-610)
  34. Todorovic B and Orlic V (2009). Direct sequence spread spectrum scheme for an unmanned aerial vehicle PPM control signal protection, IEEE Communications Letters, 13:10, (727-729), Online publication date: 1-Oct-2009.
  35. Ye Y, Wen-bo M and Yi-qian L Chirp-like jammer excision in DSSS communication systems using EMD based radon wigner distribution Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (2126-2129)
  36. Han Y and Yang K (2009). On the Sidel'nikov sequences as frequency-hopping sequences, IEEE Transactions on Information Theory, 55:9, (4279-4285), Online publication date: 1-Sep-2009.
  37. Cha B and Kuo C (2009). Robust MC-CDMA-based fingerprinting against time-varying collusion attacks, IEEE Transactions on Information Forensics and Security, 4:3, (302-317), Online publication date: 1-Sep-2009.
  38. Huang K, Lau V and Chen Y (2009). Spectrum sharing between cellular and mobile ad hoc networks, IEEE Journal on Selected Areas in Communications, 27:7, (1256-1267), Online publication date: 1-Sep-2009.
  39. Benedetto F and Giunta G (2009). A self-synchronizing method for asynchronous code acquisition in band-limited spread spectrum communications, IEEE Transactions on Communications, 57:8, (2410-2419), Online publication date: 1-Aug-2009.
  40. Huang K, Lau V and Chen Y Spectrum sharing between cellular and mobile ad hoc networks Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (121-130)
  41. Hassan A, Hassan A and Hussian A Perfromance evaluation of two signatures' codes linear decorrelator detector for CDMA systems in Nakagami fading channel Proceedings of the Sixth international conference on Wireless and Optical Communications Networks, (199-206)
  42. Hassan A, Hassan A and Hussian A New approach for designing CDMA linear decorrelator detector Proceedings of the Sixth international conference on Wireless and Optical Communications Networks, (40-46)
  43. Hassan A, Hassan A and Hussian A Two signatures' codes linear decorrelator detector for CDMA systems Proceedings of the 2009 conference on Wireless Telecommunications Symposium, (32-38)
  44. Aloul F and El-Tarhuni M PN code acquisition using Boolean satisfiability techniques Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (632-637)
  45. ACM
    Lazos L, Liu S and Krunz M Mitigating control-channel jamming attacks in multi-channel ad hoc networks Proceedings of the second ACM conference on Wireless network security, (169-180)
  46. Tsouri G and Wulich D (2009). Securing OFDM over wireless time-varying channels using subcarrier overloading with joint signal constellations, EURASIP Journal on Wireless Communications and Networking, 2009, (1-18), Online publication date: 1-Mar-2009.
  47. Cheng H, Ma M and Jiao B (2009). On the design of comb spectrum code for multiple access scheme, IEEE Transactions on Communications, 57:3, (754-763), Online publication date: 1-Mar-2009.
  48. Nagaraj S, Khan S, Schlegel C and Burnashev M (2009). Differential preamble detection in packet-based wireless networks, IEEE Transactions on Wireless Communications, 8:2, (599-607), Online publication date: 1-Feb-2009.
  49. Zhu D and Natarajan B (2009). Residue number system arithmetic assisted coded frequency-hopped OFDMA, EURASIP Journal on Wireless Communications and Networking, 2009, (1-11), Online publication date: 1-Jan-2009.
  50. Won S and Hanzo L (2009). Initial acquisition performance of the multiple receive antenna assisted DS-UWB downlink using search space reduction and iterative code phase estimation, IEEE Transactions on Wireless Communications, 8:1, (386-395), Online publication date: 1-Jan-2009.
  51. Javadi S and Pourang P Improving low voltage distribution line carrier communication systems for transferring data by applying efficient modulation techniques Proceedings of the 7th conference on Circuits, systems, electronics, control and signal processing, (289-296)
  52. Landolsi M and Hussain G (2008). Pulse shaping in non-coherent DLL tracking of CDMA signals, WSEAS TRANSACTIONS on COMMUNICATIONS, 7:12, (1246-1252), Online publication date: 1-Dec-2008.
  53. Udaya P and Boztaş S On Partial Correlations of Various Z4 Sequence Families Proceedings of the 5th international conference on Sequences and Their Applications, (332-344)
  54. ACM
    Awerbuch B, Richa A and Scheideler C A jamming-resistant MAC protocol for single-hop wireless networks Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, (45-54)
  55. Bhuiyan M, Lohan E and Renfors M (2008). Code tracking algorithms for mitigating multipath effects in fading channels for satellite-based positioning, EURASIP Journal on Advances in Signal Processing, 2008, (1-17), Online publication date: 1-Jan-2008.
  56. Wang Q, Liu X, Chen W, Sha L and Caccamo M (2007). Building Robust Wireless LAN for Industrial Control with the DSSS-CDMA Cell Phone Network Paradigm, IEEE Transactions on Mobile Computing, 6:6, (706-719), Online publication date: 1-Jun-2007.
  57. Yoon S and Song H Existence of modular sonar sequences of twin-prime product length Proceedings of the 2007 international conference on Sequences, subsequences, and consequences, (184-191)
  58. Xin Liu , Noubir G, Sundaram R and San Tan SPREAD Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (2536-2540)
  59. Moungnoul P, Nonthaputha T and Junnapiya S Performance improvement of MC-FH-CDMA system using multi linear chirp technique Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks, (44-48)
  60. Xiaodai Dong , Li Jin , Orlik P and Rongrong Zhang Performance of A New Transmitted Reference Pulse Cluster System for UWB Communications Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (1609-1614)
  61. Chen Z, Li S and Dong B Asynchronous multiuser performance analysis of differential frequency hopping system over Rayleigh-fading channel Proceedings of the 2006 IEEE conference on Military communications, (1178-1183)
  62. Zhang T, Tian Z, Chen Q, Lin X and Zhou Z Use APEX neural networks to extract the PN sequence in lower SNR DS-SS signals Proceedings of the 2006 international conference on Intelligent computing: Part II, (1252-1257)
  63. Tsaur L and Lee D (2006). Closed-loop architecture and protocols for rapid dynamic spreading gain adaptation in CDMA networks, IEEE/ACM Transactions on Networking, 14:4, (821-834), Online publication date: 1-Aug-2006.
  64. Yeung O and Chugg K (2006). An Iterative Algorithm and Low Complexity Hardware Architecture for Fast Acquisition of Long PN Codes in UWB Systems, Journal of VLSI Signal Processing Systems, 43:1, (25-42), Online publication date: 1-Apr-2006.
  65. Lohan E, Lakhzouri A and Renfors M (2006). Feedforward delay estimators in adverse multipath propagation for Galileo and modernized GPS signals, EURASIP Journal on Advances in Signal Processing, 2006, (157-157), Online publication date: 1-Jan-2006.
  66. Lee Y, Kang H, Lee M and Kim T A study on the effect of interference on time hopping binary PPM impulse radio system Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II, (665-674)
  67. Inácio J, Gerald J and Ortigueira M (2005). New PN even balanced sequences for spread-spectrum systems, EURASIP Journal on Wireless Communications and Networking, 2005:3, (447-458), Online publication date: 1-Aug-2005.
  68. Hong Y and Song H Frequency/Time hopping sequences with large linear complexities Proceedings of the 2005 international conference on Coding and Cryptography, (386-396)
  69. Scholtz R, Pozar D and Namgoong W (2005). Ultra-wideband radio, EURASIP Journal on Advances in Signal Processing, 2005, (252-272), Online publication date: 1-Jan-2005.
  70. Chen J, Lv T and Zheng H (2005). Joint cross-layer design for wireless QoS content delivery, EURASIP Journal on Advances in Signal Processing, 2005, (167-182), Online publication date: 1-Jan-2005.
  71. Jang J, Kim S, No J and Chung H New constructions of quaternary hadamard matrices Proceedings of the Third international conference on Sequences and Their Applications, (361-372)
  72. Klapper A (2004). Distributional properties of d-FCSR sequences, Journal of Complexity, 20:2-3, (305-317), Online publication date: 1-Apr-2004.
  73. McGuffin B Jammed FH-FSK performance in Rayleigh and Nakagami-m fading Proceedings of the 2003 IEEE conference on Military communications - Volume II, (1077-1082)
  74. Wyckoff P, Young R and McGregor D Scale time offset robust modulation Proceedings of the 2003 IEEE conference on Military communications - Volume I, (330-335)
  75. ACM
    Cetintemel U, Flinders A and Sun Y Power-efficient data dissemination in wireless sensor networks Proceedings of the 3rd ACM international workshop on Data engineering for wireless and mobile access, (1-8)
  76. Subramanian S, Shpak D and Antoniou A (2000). Performance of a Multiple-Antenna Multiple-Equalizer System for a CDMA Indoor Wireless System, Wireless Personal Communications: An International Journal, 15:2, (97-123), Online publication date: 1-Nov-2000.
  77. Bender W, Butera W, Gruhl D, Hwang R, Paiz F and Pogreb S (2000). Applications for data hiding, IBM Systems Journal, 39:3-4, (547-568), Online publication date: 1-Jul-2000.
  78. Spangenberg S, Scott I, Mclaughlin S, Povey G, Cruickshank D and Grant P (2000). An FFT-Based Approach for Fast Acquisition in Spread Spectrum Communication Systems, Wireless Personal Communications: An International Journal, 13:1-2, (27-55), Online publication date: 1-May-2000.
  79. ACM
    Deng C and Chien C A low energy architecture for fast PN acquisition Proceedings of the 1999 international symposium on Low power electronics and design, (42-47)
  80. Povey G (1998). Spread Spectrum PN Code Acquisition Using Hybrid Correlator Architectures, Wireless Personal Communications: An International Journal, 8:2, (151-164), Online publication date: 1-Sep-1998.
  81. Firmanto W and Gulliver T (1998). Code Combining of Reed–Muller Codes in an Indoor Wireless Environment, Wireless Personal Communications: An International Journal, 6:3, (359-373), Online publication date: 1-Mar-1998.
  82. Cheah K and Li K (1998). On the Capacity Enhancement of a Cellular CDMA Channel with Asymmetrical Bandwidth Allocation, Wireless Personal Communications: An International Journal, 6:1-2, (197-209), Online publication date: 1-Jan-1998.
  83. ACM
    Shepard T (1996). A channel access scheme for large dense packet radio networks, ACM SIGCOMM Computer Communication Review, 26:4, (219-230), Online publication date: 1-Oct-1996.
  84. ACM
    Shepard T A channel access scheme for large dense packet radio networks Conference proceedings on Applications, technologies, architectures, and protocols for computer communications, (219-230)
Contributors
  • Jet Propulsion Laboratory
  • University of California, Los Angeles
  • USC Viterbi School of Engineering
  • Jet Propulsion Laboratory

Recommendations