Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Saurabh Chakradeo, Bradley Reaves, Patrick Traynor, William Enck |
MAST: triage for market-scale mobile malware analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 13-24, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Henne, Christian Szongott, Matthew Smith 0001 |
SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 95-106, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Oscar García Morchon, Sye Loong Keoh, Sandeep S. Kumar, Pedro Moreno-Sanchez, Francisco Vidal-Meca, Jan Henrik Ziegeldorf |
Securing the IP-based internet of things with HIP and DTLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 119-124, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Haoyu Li 0003, Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu 0010 |
Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 25-30, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin, Cristina Onete |
Subtle kinks in distance-bounding: an analysis of prominent protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 195-206, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shrikant Adhikarla, Min Suk Kang, Patrick Tague |
Selfish manipulation of cooperative cellular communications via channel fabrication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 49-54, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rens W. van der Heijden, Stefan Dietzel, Frank Kargl |
SeDyA: secure dynamic aggregation in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 131-142, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Teng Wu, Guang Gong |
The weakness of integrity protection for LTE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 79-88, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Levente Buttyán, Ahmad-Reza Sadeghi, Marco Gruteser (eds.) |
Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013 ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![ACM, 978-1-4503-1998-0 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Frank Kargl, Arik Friedman, Roksana Boreli |
Differential privacy in intelligent transportation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 107-112, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Can Yildiz |
A pilot study on the security of pattern screen-lock methods and soft side channel attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 1-6, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lu Shi, Jiawei Yuan, Shucheng Yu, Ming Li 0003 |
ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 155-166, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jens Hermans, Roel Peeters, Cristina Onete |
Efficient, secure, private distance bounding without key updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 207-218, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yantian Hou, Ming Li 0003, Joshua D. Guttman |
Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 167-178, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christine Hennebert, Hicham Hossayni, Cédric Lauradoux |
Entropy harvesting from physical sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 149-154, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Attila Altay Yavuz |
ETA: efficient and tiny and authentication for heterogeneous wireless systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 67-72, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Md. Endadul Hoque, Hyojeong Lee, Rahul Potharaju, Charles Edwin Killian, Cristina Nita-Rotaru |
Adversarial testing of wireless routing implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013, pp. 143-148, 2013, ACM, 978-1-4503-1998-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Di Ma, Anudath K. Prasad, Nitesh Saxena, Tuo Xiang |
Location-aware and safer cards: enhancing RFID security and privacy via location sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 51-62, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Koorosh Firouzbakht, Guevara Noubir, Masoud Salehi |
On the capacity of rate-adaptive packetized wireless communication links under jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 3-14, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tadayoshi Kohno |
Security for cyber-physical systems: case studies with medical devices, robots, and automobiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 99-100, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael C. Grace, Wu Zhou 0001, Xuxian Jiang, Ahmad-Reza Sadeghi |
Unsafe exposure analysis of mobile in-app advertisements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 101-112, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Aanjhan Ranganathan, Boris Danev, Aurélien Francillon, Srdjan Capkun |
Physical-layer attacks on chirp-based ranging systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 15-26, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Newell, Reza Curtmola, Cristina Nita-Rotaru |
Entropy attacks and countermeasures in wireless network coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 185-196, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuanyuan Zeng, Kang G. Shin, Xin Hu 0001 |
Design of SMS commanded-and-controlled and P2P-structured mobile botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 137-148, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Xu 0004, Kun Bai, Sencun Zhu |
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 113-124, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Edward W. Felten |
Toward a healthy wireless privacy ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 1-2, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Steffen Schulz 0001, Ahmad-Reza Sadeghi, Maria Zhdanova, Hossen Asiful Mustafa, Wenyuan Xu 0001, Vijay Varadharajan |
Tetherway: a framework for tethering camouflage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 149-160, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Raghav Bhaskar, Ragesh Jaiswal, Sidharth Telang |
Congestion lower bounds for secure in-network aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 197-204, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry |
Zero reconciliation secret key generation for body-worn health monitoring devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 39-50, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lu Shi, Ming Li 0003, Shucheng Yu, Jiawei Yuan |
BANA: body area network authentication exploiting channel characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 27-38, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sheng Wei 0001, Miodrag Potkonjak |
Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 161-172, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva |
CHECKER: on-site checking in RFID-based supply chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 173-184, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marwan Krunz, Loukas Lazos, Roberto Di Pietro, Wade Trappe (eds.) |
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012 ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![ACM, 978-1-4503-1265-3 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Tao Shu, Marwan Krunz |
Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 87-98, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu |
DroidChecker: analyzing android applications for capability leak. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 125-136, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gildas Avoine, Iwen Coisel, Tania Martin |
A privacy-restoring mechanism for offline RFID systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 63-74, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chang-Han Jong, Virgil D. Gligor |
Private communication detection: a stochastic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 75-86, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Emiliano De Cristofaro, Claudio Soriente |
Short paper: PEPSI - privacy-enhanced participatory sensing infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 23-28, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dieter Gollmann, Dirk Westhoff, Gene Tsudik, N. Asokan (eds.) |
Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![ACM, 978-1-4503-0692-8 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Isabelle Hang, Markus Ullmann, Christian Wieschebrink |
Short paper: a new identity-based DH key-agreement protocol for wireless sensor networks based on the Arazi-Qi scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 139-144, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hsu-Chun Hsiao, Ahren Studer, Rituik Dubey, Elaine Shi, Adrian Perrig |
Efficient and secure threshold-based event validation for VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 163-174, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Fan Zhang 0019, Wenbo He, Xue Liu 0001, Patrick G. Bridges |
Inferring users' online activities through traffic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 59-70, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede |
The communication and computation cost of wireless security: extended abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 1-4, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Robert D. Miller, Wade Trappe |
Short paper: ACE: authenticating the channel estimation process in wireless communication systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 91-96, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bisheng Liu, Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu |
Short paper: a practical view of "mixing" identities in vehicular networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 157-162, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gildas Avoine, Cédric Lauradoux, Benjamin Martin 0002 |
How secret-sharing can defeat terrorist fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 145-156, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Patrick McHardy, Andreas Schuler, Erik Tews |
Interactive decryption of DECT phone calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 71-78, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xi Tan, Kapil M. Borle, Wenliang Du, Biao Chen 0001 |
Cryptographic link signatures for spectrum usage authentication in cognitive radio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 79-90, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Phil Fazio, Keren Tan, Jihwang Yeo, David Kotz |
Short paper: the NetSANI framework for analysis and fine-tuning of network trace sanitization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 5-10, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Steffen Schulz 0001, Ahmad-Reza Sadeghi, Christian Wachsmann |
Short paper: lightweight remote attestation using physical functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 109-114, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hossen Asiful Mustafa, Xin Zhang 0003, Zhenhua Liu 0005, Wenyuan Xu, Adrian Perrig |
Short paper: Jamming-resilient multipath routing leveraging availability-based correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 41-46, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hristo Bojinov, Dan Boneh, Rich Cannings, Iliyan Malchev |
Address space randomization for mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 127-138, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Voris, Nitesh Saxena, Tzipora Halevi |
Accelerometers and randomness: perfect together. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 115-126, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Di Pietro, Nino Vincenzo Verde |
Epidemic data survivability in unattended wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 11-22, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sisi Liu, Loukas Lazos, Marwan Krunz |
Thwarting inside jamming attacks on wireless broadcast communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 29-40, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Wilhelm 0001, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders |
Short paper: reactive jamming in wireless networks: how realistic is the threat? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 47-52, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Guevara Noubir, Rajmohan Rajaraman, Bo Sheng, Bishal Thapa |
On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 97-108, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Md. Sohail Ahmad, Shashank Tadakamadla |
Short paper: security evaluation of IEEE 802.11w specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 53-58, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | T. J. O'Connor, Benjamin Sangster |
honeyM: a framework for implementing virtual honeyclients for mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 129-138, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
mobile device security, gps, bluetooth, wifi, information assurance, wireless security |
1 | Andrew M. Odlyzko |
Providing security with insecure systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 87-88, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
insecure system, security |
1 | Robert D. Miller, Wade Trappe |
Subverting MIMO wireless systems by jamming the channel estimation procedure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 19-24, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
denial of service, jamming, mimo |
1 | Ahren Studer, Adrian Perrig |
Mobile user location-specific encryption (MULE): using your office as your password. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 151-162, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
key derivation, laptop theft, location based access, security |
1 | Qi Mi, John A. Stankovic, Radu Stoleru |
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 163-168, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
wireless sensor networks, key distribution, secure localization |
1 | Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede |
Low-cost untraceable authentication protocols for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 55-64, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
search protocol, tracking attack, privacy, elliptic curve cryptography, authentication protocol, rfid |
1 | Zhenhua Liu 0005, Wenyuan Xu |
Zeroing-in on network metric minima for sink location determination. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 99-104, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
sink location privacy, sensor networks |
1 | Qijun Gu |
Efficient code diversification for network reprogramming in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 145-150, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
code diversity, code security, deluge, tinyos, network reprogramming |
1 | Maxim Raya, Reza Shokri, Jean-Pierre Hubaux |
On the tradeoff between trust and privacy in wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 75-80, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, trust, game theory |
1 | Yasunobu Nohara, Sozo Inoue |
A secure and scalable identification for hash-based RFID systems using updatable pre-computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 65-74, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
d-left hash table, hash-chain scheme, rfid, unlinkability |
1 | Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo |
Automating the injection of believable decoys to detect snooping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 81-86, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
decoys, honeyflow, honeytoken, trap-based defense, deception, traffic generation |
1 | Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim M. El Defrawy |
Attacks on physical-layer identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 89-98, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
identification, attacks, wireless security, physical layer |
1 | Elmar Schoch, Frank Kargl |
On the efficiency of secure beaconing in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 111-116, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, efficiency, vehicular ad hoc networks (vanets) |
1 | Liang Xie 0002, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu |
pBMDS: a behavior-based malware detection system for cellphone devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 37-48, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
behavior learning, cellphone malware, system call |
1 | Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, David Kotz |
On the reliability of wireless fingerprinting using clock skews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 169-174, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
fake access point, mac address spoofing, wireless, ieee 802.11, fingerprinting, clock skew, timestamp |
1 | Matthias Wilhelm 0001, Ivan Martinovic, Jens B. Schmitt |
Secret keys from entangled sensor motes: implementation and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 139-144, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
wsns, key generation |
1 | Manuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux, Jean-Yves Le Boudec |
Effectiveness of distance-decreasing attacks against impulse radio ranging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 117-128, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
ieee 802.15.4a, physical layer attack, secure ranging, ultra wideband, ranging, relay attack, distance bounding, impulse radio |
1 | Jinsub Kim, Dan Sterne, Rommie L. Hardy, Roshan K. Thomas, Lang Tong |
Timing-based localization of in-band wormhole tunnels in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 1-12, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
in-band wormhole attack, wormhole tunnel localization, timing analysis, network intrusion detection |
1 | Nilothpal Talukder, Sheikh Iqbal Ahamed |
Preventing multi-query attack in location-based services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 25-36, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
adaptive nearest neighborhood cloaking (annc), reciprocity condition, location privacy |
1 | Yanjun Zuo |
RFID survivability quantification and attack modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 13-18, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
modeling, survivability, rfid, quantification, adversary |
1 | Hao Chen 0095 |
Efficient compromising resilient authentication schemes for large scale wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 49-54, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
code and function based authentication schemes, polynomial based authentication scheme, wireless sensor netowork |
1 | Florian Kerschbaum, Nina Oertel, Leonardo Weiss Ferreira Chaves |
Privacy-preserving computation of benchmarks on item-level data using RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 105-110, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
supply chain metrics, secure multi-party computation, rfid |
1 | Susanne Wetzel, Cristina Nita-Rotaru, Frank Stajano (eds.) |
Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![ACM, 978-1-60558-923-7 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Kun Sun 0001, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan |
Securing network access in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 261-268, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, sensor networks, elliptic curve cryptography |
1 | Morten Tranberg Hansen |
Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 13-20, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cc2420 security, group key distribution, sensor network security |
1 | Christopher Ferguson, Qijun Gu, Hongchi Shi |
Self-healing control flow protection in sensor applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 213-224, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
sensor application, access control, self healing, tinyos, control flow |
1 | Erik Tews, Martin Beck |
Practical attacks against WEP and WPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 79-86, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, 802.11, rc4, wep, wlan, wpa, tkip |
1 | Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha |
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 245-252, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
code dissemination protocols, sensor network security, broadcast authentication, code distribution |
1 | William Kozma, Loukas Lazos |
REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 103-110, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
routing, ad hoc networks, bloom filter, misbehavior |
1 | Petr Svenda, Lukás Sekanina, Václav Matyás |
Evolutionary design of secrecy amplification protocols for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 225-236, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
secrecy amplification protocols, wireless sensor networks, evolutionary algorithms, key establishment |
1 | Piotr Szczechowiak, Anton Kargl, Michael Scott, Martin Collier |
On the application of pairing based cryptography to wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 1-12, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, implementation, security protocols, pairing-based cryptography |
1 | Yossef Oren, Martin Feldhofer |
A low-resource public-key identification scheme for RFID tags and sensor nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 59-68, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
rabin encryption, rfid technology, public-key encryption, hardware implementation |
1 | Osman Ugus, Dirk Westhoff, Jens-Matthias Bohli |
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 29-40, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
secure code image update, wireless sensor networks, one-time signature, data authentication |
1 | Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, Jean-Pierre Hubaux |
A practical secure neighbor verification protocol for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 193-200, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
secure neighbor verification, wireless sensor networks |
1 | Ivan Martinovic, Paul Pichota, Jens B. Schmitt |
Jamming for good: a fresh approach to authentic communication in WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 161-168, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, authentication, jamming |
1 | Sevil Sen, John Andrew Clark |
A grammatical evolution approach to intrusion detection on mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 95-102, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, mobile ad hoc networks, artificial intelligence, intrusion detection, grammatical evolution |
1 | Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia 0001, Dong Xuan, Jin Teng |
Stealthy video capturer: a new video-based spyware in 3G smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 69-78, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
3g smartphones, security, privacy, spyware |
1 | Emiliano De Cristofaro, Jens-Matthias Bohli, Dirk Westhoff |
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 253-260, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
secure aggregation, security, wireless sensor networks, fuzzy control, resilience |
1 | Joseph K. Liu, Joonsang Baek, Jianying Zhou 0001 |
Certificate-based sequential aggregate signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 21-28, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptography, digital signature |
1 | Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, Michael Roe |
Privacy-preserving 802.11 access-point discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 123-130, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access-point discovery, privacy, ieee 802.11, wlan |
1 | David A. Basin, Srdjan Capkun, Wenke Lee (eds.) |
Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![ACM, 978-1-60558-460-7 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu |
Secure and precise location verification using distance bounding and simultaneous multilateration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 181-192, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
distance bounding, multilateration, location verification |