The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WISEC"( http://dblp.L3S.de/Venues/WISEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/wisec

Publication years (Num. hits)
2008 (29) 2009 (29) 2010 (23) 2011 (21) 2012 (20) 2013 (27) 2014 (27) 2015 (35) 2016 (33) 2017 (41) 2018 (41) 2019 (61) 2020 (31) 2021 (46) 2022 (40) 2023 (35)
Publication types (Num. hits)
inproceedings(523) proceedings(16)
Venues (Conferences, Journals, ...)
WISEC(539)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 218 occurrences of 138 keywords

Results
Found 539 publication records. Showing 539 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Saurabh Chakradeo, Bradley Reaves, Patrick Traynor, William Enck MAST: triage for market-scale mobile malware analysis. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benjamin Henne, Christian Szongott, Matthew Smith 0001 SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Oscar García Morchon, Sye Loong Keoh, Sandeep S. Kumar, Pedro Moreno-Sanchez, Francisco Vidal-Meca, Jan Henrik Ziegeldorf Securing the IP-based internet of things with HIP and DTLS. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Haoyu Li 0003, Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu 0010 Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marc Fischlin, Cristina Onete Subtle kinks in distance-bounding: an analysis of prominent protocols. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shrikant Adhikarla, Min Suk Kang, Patrick Tague Selfish manipulation of cooperative cellular communications via channel fabrication. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rens W. van der Heijden, Stefan Dietzel, Frank Kargl SeDyA: secure dynamic aggregation in VANETs. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Teng Wu, Guang Gong The weakness of integrity protection for LTE. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Levente Buttyán, Ahmad-Reza Sadeghi, Marco Gruteser (eds.) Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013 Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  BibTeX  RDF
1Frank Kargl, Arik Friedman, Roksana Boreli Differential privacy in intelligent transportation systems. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Can Yildiz A pilot study on the security of pattern screen-lock methods and soft side channel attacks. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lu Shi, Jiawei Yuan, Shucheng Yu, Ming Li 0003 ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jens Hermans, Roel Peeters, Cristina Onete Efficient, secure, private distance bounding without key updates. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yantian Hou, Ming Li 0003, Joshua D. Guttman Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christine Hennebert, Hicham Hossayni, Cédric Lauradoux Entropy harvesting from physical sensors. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Attila Altay Yavuz ETA: efficient and tiny and authentication for heterogeneous wireless systems. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Md. Endadul Hoque, Hyojeong Lee, Rahul Potharaju, Charles Edwin Killian, Cristina Nita-Rotaru Adversarial testing of wireless routing implementations. Search on Bibsonomy WISEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Di Ma, Anudath K. Prasad, Nitesh Saxena, Tuo Xiang Location-aware and safer cards: enhancing RFID security and privacy via location sensing. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Koorosh Firouzbakht, Guevara Noubir, Masoud Salehi On the capacity of rate-adaptive packetized wireless communication links under jamming. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tadayoshi Kohno Security for cyber-physical systems: case studies with medical devices, robots, and automobiles. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael C. Grace, Wu Zhou 0001, Xuxian Jiang, Ahmad-Reza Sadeghi Unsafe exposure analysis of mobile in-app advertisements. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aanjhan Ranganathan, Boris Danev, Aurélien Francillon, Srdjan Capkun Physical-layer attacks on chirp-based ranging systems. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andrew Newell, Reza Curtmola, Cristina Nita-Rotaru Entropy attacks and countermeasures in wireless network coding. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuanyuan Zeng, Kang G. Shin, Xin Hu 0001 Design of SMS commanded-and-controlled and P2P-structured mobile botnets. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhi Xu 0004, Kun Bai, Sencun Zhu TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Edward W. Felten Toward a healthy wireless privacy ecosystem. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Steffen Schulz 0001, Ahmad-Reza Sadeghi, Maria Zhdanova, Hossen Asiful Mustafa, Wenyuan Xu 0001, Vijay Varadharajan Tetherway: a framework for tethering camouflage. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Raghav Bhaskar, Ragesh Jaiswal, Sidharth Telang Congestion lower bounds for secure in-network aggregation. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry Zero reconciliation secret key generation for body-worn health monitoring devices. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lu Shi, Ming Li 0003, Shucheng Yu, Jiawei Yuan BANA: body area network authentication exploiting channel characteristics. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sheng Wei 0001, Miodrag Potkonjak Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva CHECKER: on-site checking in RFID-based supply chains. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marwan Krunz, Loukas Lazos, Roberto Di Pietro, Wade Trappe (eds.) Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012 Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  BibTeX  RDF
1Tao Shu, Marwan Krunz Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu DroidChecker: analyzing android applications for capability leak. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gildas Avoine, Iwen Coisel, Tania Martin A privacy-restoring mechanism for offline RFID systems. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chang-Han Jong, Virgil D. Gligor Private communication detection: a stochastic approach. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Emiliano De Cristofaro, Claudio Soriente Short paper: PEPSI - privacy-enhanced participatory sensing infrastructure. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dieter Gollmann, Dirk Westhoff, Gene Tsudik, N. Asokan (eds.) Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011 Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  BibTeX  RDF
1Isabelle Hang, Markus Ullmann, Christian Wieschebrink Short paper: a new identity-based DH key-agreement protocol for wireless sensor networks based on the Arazi-Qi scheme. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hsu-Chun Hsiao, Ahren Studer, Rituik Dubey, Elaine Shi, Adrian Perrig Efficient and secure threshold-based event validation for VANETs. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Fan Zhang 0019, Wenbo He, Xue Liu 0001, Patrick G. Bridges Inferring users' online activities through traffic analysis. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede The communication and computation cost of wireless security: extended abstract. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Robert D. Miller, Wade Trappe Short paper: ACE: authenticating the channel estimation process in wireless communication systems. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bisheng Liu, Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu Short paper: a practical view of "mixing" identities in vehicular networks. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gildas Avoine, Cédric Lauradoux, Benjamin Martin 0002 How secret-sharing can defeat terrorist fraud. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Patrick McHardy, Andreas Schuler, Erik Tews Interactive decryption of DECT phone calls. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xi Tan, Kapil M. Borle, Wenliang Du, Biao Chen 0001 Cryptographic link signatures for spectrum usage authentication in cognitive radio. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Phil Fazio, Keren Tan, Jihwang Yeo, David Kotz Short paper: the NetSANI framework for analysis and fine-tuning of network trace sanitization. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Steffen Schulz 0001, Ahmad-Reza Sadeghi, Christian Wachsmann Short paper: lightweight remote attestation using physical functions. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hossen Asiful Mustafa, Xin Zhang 0003, Zhenhua Liu 0005, Wenyuan Xu, Adrian Perrig Short paper: Jamming-resilient multipath routing leveraging availability-based correlation. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hristo Bojinov, Dan Boneh, Rich Cannings, Iliyan Malchev Address space randomization for mobile devices. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jonathan Voris, Nitesh Saxena, Tzipora Halevi Accelerometers and randomness: perfect together. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Roberto Di Pietro, Nino Vincenzo Verde Epidemic data survivability in unattended wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sisi Liu, Loukas Lazos, Marwan Krunz Thwarting inside jamming attacks on wireless broadcast communications. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Matthias Wilhelm 0001, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders Short paper: reactive jamming in wireless networks: how realistic is the threat? Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Guevara Noubir, Rajmohan Rajaraman, Bo Sheng, Bishal Thapa On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Md. Sohail Ahmad, Shashank Tadakamadla Short paper: security evaluation of IEEE 802.11w specification. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1T. J. O'Connor, Benjamin Sangster honeyM: a framework for implementing virtual honeyclients for mobile devices. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF mobile device security, gps, bluetooth, wifi, information assurance, wireless security
1Andrew M. Odlyzko Providing security with insecure systems. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF insecure system, security
1Robert D. Miller, Wade Trappe Subverting MIMO wireless systems by jamming the channel estimation procedure. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF denial of service, jamming, mimo
1Ahren Studer, Adrian Perrig Mobile user location-specific encryption (MULE): using your office as your password. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF key derivation, laptop theft, location based access, security
1Qi Mi, John A. Stankovic, Radu Stoleru Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wireless sensor networks, key distribution, secure localization
1Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede Low-cost untraceable authentication protocols for RFID. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF search protocol, tracking attack, privacy, elliptic curve cryptography, authentication protocol, rfid
1Zhenhua Liu 0005, Wenyuan Xu Zeroing-in on network metric minima for sink location determination. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF sink location privacy, sensor networks
1Qijun Gu Efficient code diversification for network reprogramming in sensor networks. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF code diversity, code security, deluge, tinyos, network reprogramming
1Maxim Raya, Reza Shokri, Jean-Pierre Hubaux On the tradeoff between trust and privacy in wireless ad hoc networks. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF privacy, trust, game theory
1Yasunobu Nohara, Sozo Inoue A secure and scalable identification for hash-based RFID systems using updatable pre-computation. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF d-left hash table, hash-chain scheme, rfid, unlinkability
1Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo Automating the injection of believable decoys to detect snooping. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF decoys, honeyflow, honeytoken, trap-based defense, deception, traffic generation
1Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim M. El Defrawy Attacks on physical-layer identification. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF identification, attacks, wireless security, physical layer
1Elmar Schoch, Frank Kargl On the efficiency of secure beaconing in VANETs. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, efficiency, vehicular ad hoc networks (vanets)
1Liang Xie 0002, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu pBMDS: a behavior-based malware detection system for cellphone devices. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF behavior learning, cellphone malware, system call
1Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, David Kotz On the reliability of wireless fingerprinting using clock skews. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF fake access point, mac address spoofing, wireless, ieee 802.11, fingerprinting, clock skew, timestamp
1Matthias Wilhelm 0001, Ivan Martinovic, Jens B. Schmitt Secret keys from entangled sensor motes: implementation and analysis. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wsns, key generation
1Manuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux, Jean-Yves Le Boudec Effectiveness of distance-decreasing attacks against impulse radio ranging. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF ieee 802.15.4a, physical layer attack, secure ranging, ultra wideband, ranging, relay attack, distance bounding, impulse radio
1Jinsub Kim, Dan Sterne, Rommie L. Hardy, Roshan K. Thomas, Lang Tong Timing-based localization of in-band wormhole tunnels in MANETs. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF in-band wormhole attack, wormhole tunnel localization, timing analysis, network intrusion detection
1Nilothpal Talukder, Sheikh Iqbal Ahamed Preventing multi-query attack in location-based services. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF adaptive nearest neighborhood cloaking (annc), reciprocity condition, location privacy
1Yanjun Zuo RFID survivability quantification and attack modeling. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF modeling, survivability, rfid, quantification, adversary
1Hao Chen 0095 Efficient compromising resilient authentication schemes for large scale wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF code and function based authentication schemes, polynomial based authentication scheme, wireless sensor netowork
1Florian Kerschbaum, Nina Oertel, Leonardo Weiss Ferreira Chaves Privacy-preserving computation of benchmarks on item-level data using RFID. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF supply chain metrics, secure multi-party computation, rfid
1Susanne Wetzel, Cristina Nita-Rotaru, Frank Stajano (eds.) Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010 Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  BibTeX  RDF
1Kun Sun 0001, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan Securing network access in wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, sensor networks, elliptic curve cryptography
1Morten Tranberg Hansen Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cc2420 security, group key distribution, sensor network security
1Christopher Ferguson, Qijun Gu, Hongchi Shi Self-healing control flow protection in sensor applications. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sensor application, access control, self healing, tinyos, control flow
1Erik Tews, Martin Beck Practical attacks against WEP and WPA. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, 802.11, rc4, wep, wlan, wpa, tkip
1Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF code dissemination protocols, sensor network security, broadcast authentication, code distribution
1William Kozma, Loukas Lazos REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF routing, ad hoc networks, bloom filter, misbehavior
1Petr Svenda, Lukás Sekanina, Václav Matyás Evolutionary design of secrecy amplification protocols for wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secrecy amplification protocols, wireless sensor networks, evolutionary algorithms, key establishment
1Piotr Szczechowiak, Anton Kargl, Michael Scott, Martin Collier On the application of pairing based cryptography to wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, implementation, security protocols, pairing-based cryptography
1Yossef Oren, Martin Feldhofer A low-resource public-key identification scheme for RFID tags and sensor nodes. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF rabin encryption, rfid technology, public-key encryption, hardware implementation
1Osman Ugus, Dirk Westhoff, Jens-Matthias Bohli A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure code image update, wireless sensor networks, one-time signature, data authentication
1Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, Jean-Pierre Hubaux A practical secure neighbor verification protocol for wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure neighbor verification, wireless sensor networks
1Ivan Martinovic, Paul Pichota, Jens B. Schmitt Jamming for good: a fresh approach to authentic communication in WSNs. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, authentication, jamming
1Sevil Sen, John Andrew Clark A grammatical evolution approach to intrusion detection on mobile ad hoc networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, mobile ad hoc networks, artificial intelligence, intrusion detection, grammatical evolution
1Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia 0001, Dong Xuan, Jin Teng Stealthy video capturer: a new video-based spyware in 3G smartphones. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 3g smartphones, security, privacy, spyware
1Emiliano De Cristofaro, Jens-Matthias Bohli, Dirk Westhoff FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure aggregation, security, wireless sensor networks, fuzzy control, resilience
1Joseph K. Liu, Joonsang Baek, Jianying Zhou 0001 Certificate-based sequential aggregate signature. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptography, digital signature
1Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, Michael Roe Privacy-preserving 802.11 access-point discovery. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access-point discovery, privacy, ieee 802.11, wlan
1David A. Basin, Srdjan Capkun, Wenke Lee (eds.) Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009 Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  BibTeX  RDF
1Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu Secure and precise location verification using distance bounding and simultaneous multilateration. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distance bounding, multilateration, location verification
Displaying result #401 - #500 of 539 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license