The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WISEC"( http://dblp.L3S.de/Venues/WISEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/wisec

Publication years (Num. hits)
2008 (29) 2009 (29) 2010 (23) 2011 (21) 2012 (20) 2013 (27) 2014 (27) 2015 (35) 2016 (33) 2017 (41) 2018 (41) 2019 (61) 2020 (31) 2021 (46) 2022 (40) 2023 (35)
Publication types (Num. hits)
inproceedings(523) proceedings(16)
Venues (Conferences, Journals, ...)
WISEC(539)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 218 occurrences of 138 keywords

Results
Found 539 publication records. Showing 539 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jean-Pierre Hubaux The Ultimate Frontier for Privacy and Security: Medicine. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hasan Faik Alan, Jasleen Kaur 0001 Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic? Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wenrui Diao, Xiangyu Liu, Zhou Li 0001, Kehuan Zhang Evading Android Runtime Analysis Through Detecting Programmed Interactions. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthias Schulz 0001, Daniel Wegemer, Matthias Hollick DEMO: Using NexMon, the C-based WiFi firmware modification framework. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthias Schulz 0001, Adrian Loch, Matthias Hollick DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthias Schäfer 0002, Patrick Leu, Vincent Lenders, Jens B. Schmitt Secure Motion Verification using the Doppler Effect. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Célestin Matte, Mathieu Cunche, Franck Rousseau, Mathy Vanhoef Defeating MAC Address Randomization Through Timing Attacks. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Triet Dang Vo-Huu, Tien Dang Vo-Huu, Guevara Noubir Interleaving Jamming in Wi-Fi Networks. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christian T. Zenger, Jan Zimmer, Mario Pietersz, Benedikt Driessen, Christof Paar Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade 0001, Cristina Onete, Jean-Marc Robert 0001 A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wei Chen 0023, David Aspinall 0001, Andrew D. Gordon 0001, Charles Sutton, Igor Muttik More Semantics More Robust: Improving Android Malware Classifiers. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tien Dang Vo-Huu, Triet Dang Vo-Huu, Guevara Noubir Fingerprinting Wi-Fi Devices Using Software Defined Radios. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hans-Joachim Hof, Gudrun Socher POSTER: Security Design Patterns With Good Usability. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vijay Sivaraman, Dominic Chan, Dylan Earl, Roksana Boreli Smart-Phones Attacking Smart-Homes. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bradley Reaves, Logan Blue, Dave Tian, Patrick Traynor, Kevin R. B. Butler Detecting SMS Spam in the Age of Legitimate Bulk Messaging. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1S. Abhishek Anand, Nitesh Saxena Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ahmad Ibrahim 0002, Ahmad-Reza Sadeghi, Gene Tsudik, Shaza Zeitouni DARPA: Device Attestation Resilient to Physical Attacks. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Raphael Spreitzer, Simone Griesmayr, Thomas Korak, Stefan Mangard Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pieter Robyns, Bram Bonné, Peter Quax, Wim Lamotte POSTER: Assessing the Impact of 802.11 Vulnerabilities using Wicability. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yao Zheng, Matthias Schulz 0001, Wenjing Lou, Y. Thomas Hou 0001, Matthias Hollick Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kibum Choi, Yunmok Son, Juhwan Noh, Hocheol Shin, Jaeyeong Choi, Yongdae Kim Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ghada Dessouky, Ahmad-Reza Sadeghi POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim 0002, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter POSTER: Toward a Secure and Scalable Attestation. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthias Schulz 0001, Patrick Klapper, Matthias Hollick, Erik Tews, Stefan Katzenbeisser 0001 Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lucky Onwuzurike, Emiliano De Cristofaro POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aisha I. Ali-Gombe, Golden G. Richard III, Irfan Ahmed 0001, Vassil Roussev Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthias Hollick, Panos Papadimitratos, William Enck (eds.) Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WISEC 2016, Darmstadt, Germany, July 18-22, 2016 Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Prakash Shrestha, Manar Mohamed, Nitesh Saxena Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dan Ping, Xin Sun, Bing Mao TextLogger: inferring longer inputs on touch screen using motion sensors. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Förster, Frank Kargl, Hans Löhr A framework for evaluating pseudonym strategies in vehicular ad-hoc networks. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel Steinmetzer, Matthias Schulz 0001, Matthias Hollick Lockpicking physical layer key exchange: weak adversary models invite the thief. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel T. Wagner, Daniel R. Thomas, Alastair R. Beresford, Andrew C. Rice Device analyzer: a privacy-aware platform to support research on the Android ecosystem. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Meiko Jensen Applying the protection goals for privacy engineering to mobile devices. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mahmudur Rahman, Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar Liveness verifications for citizen journalism videos. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Roberto Di Pietro, Gabriele Oligeri Freedom of speech: thwarting jammers via a probabilistic approach. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marcin Nagy, Thanh Bui, Emiliano De Cristofaro, N. Asokan, Jörg Ott, Ahmad-Reza Sadeghi How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mingshen Sun, Mengmeng Li, John C. S. Lui DroidEagle: seamless detection of visually similar Android apps. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Max Maass, Uwe Müller, Tom Schons, Daniel Wegemer, Matthias Schulz 0001 NFCGate: an NFC relay application for Android. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wanqing You, Kai Qian, Minzhe Guo, Prabir Bhattacharya, Ying Qian, Lixin Tao A hybrid approach for mobile security threat analysis. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pieter Robyns, Peter Quax, Wim Lamotte Injection attacks on 802.11n MAC frame aggregation. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bruce DeBruhl, Sean Weerakkody, Bruno Sinopoli, Patrick Tague Is your commute driving you crazy?: a study of misbehavior in vehicular platoons. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhen Xie, Sencun Zhu AppWatcher: unveiling the underground market of trading mobile app reviews. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Célestin Matte, Jagdish Prasad Achara, Mathieu Cunche Device-to-identity linking attack using targeted wi-fi geolocation spoofing. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin 0001, Deqing Zou, Robert H. Deng CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sadegh Farhang, Yezekael Hayel, Quanyan Zhu Physical layer location privacy issue in wireless small cell networks. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nils Ole Tippenhauer, Heinrich Luecken, Marc Kuhn, Srdjan Capkun UWB rapid-bit-exchange system for distance bounding. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Suranga Seneviratne, Harini Kolamunna, Aruna Seneviratne A measurement study of tracking in paid mobile applications. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Matthias Schäfer 0002, Daniel S. Berger, Vincent Lenders, Jens B. Schmitt Security by mobility in location and track verification. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Guqian Dai, Jigang Ge, Minghang Cai, Daoqian Xu, Wenjia Li SVM-based malware detection for Android applications. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lucky Onwuzurike, Emiliano De Cristofaro Danger is my middle name: experimenting with SSL vulnerabilities in Android apps. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xingmin Cui, Jingxuan Wang, Lucas Chi Kwong Hui, Zhongwei Xie, Tian Zeng, Siu-Ming Yiu WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yajin Zhou, Lei Wu 0012, Zhi Wang 0004, Xuxian Jiang Harvesting developer credentials in Android apps. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xin Chen, Sencun Zhu DroidJust: automated functionality-aware privacy leakage analysis for Android applications. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marcin Nagy, Thanh Bui, Swapnil Udar, N. Asokan, Jörg Ott SpotShare and nearbyPeople: applications of the Social PaL framework. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Elena Pagnin, Anjia Yang, Gerhard P. Hancke 0002, Aikaterini Mitrokotsa HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015 Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  BibTeX  RDF
1Sebastian Brenza, Andre Pawlowski, Christina Pöpper A practical investigation of identity theft vulnerabilities in Eduroam. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Karim Emara, Wolfgang Woerndl, Johann H. Schlichter CAPS: context-aware privacy scheme for VANET safety applications. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pradeep Podiyan, Sergey Butakov, Pavol Zavarsky Study of compliance of Android location APIs with Geopriv. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Julien Freudiger How talkative is your mobile device?: an experimental study of Wi-Fi probe requests. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stylianos Gisdakis, Thanassis Giannetsos, Panos Papadimitratos SHIELD: a data verification framework for participatory sensing systems. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Denzil Ferreira, Vassilis Kostakos, Alastair R. Beresford, Janne Lindqvist, Anind K. Dey Securacy: an empirical investigation of Android applications' network usage, privacy and security. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Roberto Gallo, Patricia Hongo, Ricardo Dahab, Luiz C. Navarro, Henrique Kawakami, Kaio Galvão, Glauco Barroso Junquera, Luander Ribeiro Security and system architecture: comparison of Android customizations. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jagdish Prasad Achara, Mathieu Cunche, Vincent Roca, Aurélien Francillon Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wenhui Hu, Damien Octeau, Patrick D. McDaniel, Peng Liu 0005 Duet: library integrity verification for android applications. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bruce DeBruhl, Christian Kroer, Anupam Datta, Tuomas Sandholm, Patrick Tague Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pieter Robyns, Bram Bonné, Peter Quax, Wim Lamotte Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Barrera 0003, Daniel McCarney, Jeremy Clark, Paul C. van Oorschot Baton: certificate agility for android's decentralized signing infrastructure. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ira Ray Jenkins, Rebecca Shapiro, Sergey Bratus, Travis Goodspeed, Ryan Speers, David Dowd Short paper: speaking the local dialect: exploiting differences between ieee 802.15.4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stylianos Gisdakis, Thanassis Giannetsos, Panos Papadimitratos SPPEAR: security & privacy-preserving architecture for participatory-sensing applications. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andrei Costin, Aurélien Francillon Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-design. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hanif Rahbari, Marwan Krunz Friendly CryptoJam: a mechanism for securing physical-layer attributes. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhen Xie, Sencun Zhu GroupTie: toward hidden collusion group discovery in app stores. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Gabriele Costa 0001, Alessio Merlo, Luca Verderame Enabling BYOD through secure meta-market. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Luke Hutton, Tristan Henderson, Apu Kapadia Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Frederik Möllers, Sebastian Seitz, Andreas Hellmann, Christoph Sorge Short paper: extrapolation and prediction of user behaviour from wireless home automation communication. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Adwait Nadkarni, Vasant Tendulkar, William Enck NativeWrap: ad hoc smartphone application creation for end users. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fangfang Zhang 0005, Heqing Huang, Sencun Zhu, Dinghao Wu, Peng Liu 0005 ViewDroid: towards obfuscation-resilient mobile application repackaging detection. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Herrmann 0003, Alfredo Rial, Claudia Díaz, Bart Preneel Practical privacy-preserving location-sharing based services with aggregate statistics. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sashank Narain, Amirali Sanatinia, Guevara Noubir Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gergely Ács, Andrew P. Martin, Ivan Martinovic, Claude Castelluccia, Patrick Traynor (eds.) 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014 Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  BibTeX  RDF
1Jun Han 0001, Yue-Hsun Lin, Adrian Perrig, Fan Bai 0002 Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Arijit Banerjee, Dustin Maas, Maurizio Bocca, Neal Patwari, Sneha Kumar Kasera Violating privacy through walls by passive monitoring of radio windows. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nicholas Kolokotronis, Alexandros Katsiotis, Nicholas Kalouptsidis Short paper: attacking and defending lightweight PHY security schemes for wireless communications. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mengtao Sun, Gang Tan NativeGuard: protecting android applications from third-party native libraries. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun, David A. Basin Short paper: detection of GPS spoofing attacks in power grids. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jiaqi Tan, Utsav Drolia, Rolando Martins, Rajeev Gandhi, Priya Narasimhan Short paper: CHIPS: content-based heuristics for improving photo privacy for smartphones. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniel S. Berger, Francesco Gringoli, Nicolò Facchi, Ivan Martinovic, Jens B. Schmitt Gaining insight on friendly jamming in a real-world IEEE 802.11 network. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ibrahim Ethem Bagci, Utz Roedig, Matthias Schulz 0001, Matthias Hollick Short paper: gathering tamper evidence in wi-fi networks based on channel state information. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1N. Asokan On mobile malware infections. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Triet Vo Huu, Erik-Oliver Blass, Guevara Noubir Counter-jamming using mixed mechanical and software interference cancellation. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Panagiotis Rizomiliotis, Stefanos Gritzalis Revisiting lightweight authentication protocols based on hard learning problems. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alejandro Proaño, Loukas Lazos Perfect contextual information privacy in WSNs undercolluding eavesdroppers. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Domenico Giustiniano, Vincent Lenders, Jens B. Schmitt, Michael Spuhler, Matthias Wilhelm 0001 Detection of reactive jamming in DSSS-based wireless networks. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ethmane El Moustaine, Maryline Laurent GPS+: a back-end coupons identification for low-cost RFID. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tim Stöber, Mario Frank 0001, Jens B. Schmitt, Ivan Martinovic Who do you sync you are?: smartphone fingerprinting via application behaviour. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marek Klonowski, Michal Koza Countermeasures against sybil attacks in WSN based on proofs-of-work. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1René Hummen, Jens Hiller, Hanno Wirtz, Martin Henze, Hossein Shafagh, Klaus Wehrle 6LoWPAN fragmentation attacks and mitigation mechanisms. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sheng Wei 0001, Jong Hoon Ahnn, Miodrag Potkonjak Energy attacks and defense techniques for wireless systems. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gökay Saldamli, Richard Chow, Hongxia Jin, Bart P. Knijnenburg Private proximity testing with an untrusted server. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 539 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license