%PDF-1.4
%
1 0 obj
<>stream
application/pdfAuthors, as per new IEEE copyright agreement2013 IEEE 26th Computer Security Foundations Symposium;2013; ; ;10.1109/CSF.2013.19signal integritytrust frameworkGNSSspoofing detectionA Trust Framework for Evaluating GNSS Signal IntegrityXihui ChenGabriele LenziniMiguel MartinsSjouke MauwJun Pang
2013 IEEE 26th Computer Security Foundations Symposium179 June 201310.1109/CSF.2013.19192
endstream
endobj
2 0 obj
<>stream
xUS{LSW?;,.`j
s
*_A[h)W%RŠ:s2@T8%>p:Mw:9}<$(tlKlV;SBDRD,e=r){<|^ |1I)jɶ6RdBWisDu:K1\x(3[m%.Y̶ZburFlr3Z[Tʗʸ0.&**:B\bR.s_!4%*:fqHQ
DӐ
@U4%*$j%:eB\8280'։"v^Ű2(L1Q|ݗ>jW;/7>CzjO4p!5wWtTѻ5']-F
#TMl@tgRp M+f
ՠd]lj|q|ugG<$adN|^+}U3s!%iDu{I #oK[B1`[ՑsL}^2~5 Ob`6f@7P߷'ݹk*7Fr
Զ]p=97j8]ʔ|Kf7=Ce7heDG㓩2=$Z%'K2iȄCH%%xk+&6>tƤF/\>6^~i
QO@-D?I{EfkQ$0K.PIOvfGky8dH1'bb8{eM3H{JLz1?u^QDŽ5쵾Irf?|MJᲛ)7D /iC27ht-oz5ފ? KIv>"ؑc5mu.<ȀT{@Bv0«uz>;NETO@{ú~`;{e^7ee^v9j?"gQW4}^ZaJE8@8E霠cq(xwjh<^~oPޝ33|6 %!35'4G[2ݜo;~$bOXQpohЉ!p)lf753W\3j`Y
endstream
endobj
3 0 obj
[777.8 694.4 666.7 750 722.2 777.8 722.2 777.8 722.2 583.3 555.6 555.6 833.3 833.3 277.8 305.6 500 500 500 500 500 750 444.4 500 722.2 777.8 500 902.8 1013.9 777.8 277.8 277.8 500 833.3 500 833.3 777.8 277.8 388.9 388.9 500 777.8 277.8 333.3 277.8 500 500 500 500 500 500 500 500 500 500 500 277.8 277.8 277.8 777.8 472.2 472.2 777.8 750 708.3 722.2 763.9 680.6 652.8 784.7 750 361.1 513.9 777.8 625 916.7 750 777.8 680.6 777.8 736.1 555.6 722.2 750 750 1027.8 750 750 611.1 277.8 500 277.8 500 277.8 277.8 500 555.6 444.4 555.6 444.4 305.6 500 555.6 277.8 305.6 527.8 277.8 833.3 555.6]
endobj
4 0 obj
<>>>/Font<>>>
endobj
5 0 obj
<>
endobj
7 0 obj
<>
endobj
6 0 obj
<>stream
x]Kk bÒ>!C40:
1:Ѓә ڗV+ه3Cl'zfE R WLܲ,wqj`X]Cw+장@$:G}ߺt-CΚ$wܾ !V>e|"$rY
0_JAܹEH*oU:/ɇ|"/srA$Wk̓>ܺvi9Ź08xwxk,UAY
endstream
endobj
9 0 obj
<>
endobj
10 0 obj
<>stream
x+ |
endstream
endobj
11 0 obj
<>stream
xڍtT\. Jw
ЍtKJ030!
" ҍ)-?ݻֽk֚8هYK[n QÐ @NCH |llzP#/Mpab+@#Q<Ӏ n ? $$|@߁p@h T0+>C/Ê ~; A@0iqBhvC"xy=<