|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 544 publication records. Showing 544 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Khaled Masmoudi, Mureed Hussain, Hossam Afifi, Dominique Seret |
Short paper: Tri-party TLS Adaptation for Trust Delegation in Home Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Tassos Dimitriou |
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yu Liu, Yang Li 0057, Hong Man |
Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Y. Dong, H. W. Go, Ai Fen Sui, Victor O. K. Li, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | David Llewellyn-Jones, Madjid Merabti, Qi Shi 0001, Bob Askwith |
Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Thomas E. Daniels, Mani Mina, Steve Russell |
Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and Assurance. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Li Zhou, Jinfeng Ni, Chinya V. Ravishankar |
Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | A. Karygiannis, Aggelos Kiayias, Yiannis Tsiounis |
A Solution for Wireless Privacy and Payments based on E-cash. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jyh-How Huang, Jason Buckingham, Richard Han 0001 |
A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jing Deng 0002, Carl Hartung, Richard Han 0001, Shivakant Mishra |
A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Danfeng Yao, Roberto Tamassia, Seth Proctor |
On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Caimu Tang, Anthony T. Chronopoulos, Cauligi S. Raghavendra |
Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Baik Hoh, Marco Gruteser |
Protecting Location Privacy Through Path Confusion. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sachin Garg, Navjot Singh 0001, Timothy K. Tsai |
Short Paper: Schemes for Enhancing the Denial-of-Service Tolerance of SRTP. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Tuomas Aura, Michael Roe |
Reducing Reauthentication Delay in Wireless Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ziv Kfir, Avishai Wool |
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jukka Ylitalo, Patrik Salmela, Hannes Tschofenig |
SPINAT: Integrating IPsec into Overlay Routing. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Venkatesan Balakrishnan, Vijay Varadharajan |
Short Paper: Fellowship in Mobile Ad hoc Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ophir Levy, Avishai Wool |
Uniform Framework for Cryptanalysis of the Bluetooth E₀ Cipher. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yongguang Zhang, Yi-an Huang, Wenke Lee |
An Extensible Environment for Evaluating Secure MANET. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Timothy W. van der Horst, Kent E. Seamons |
Short Paper: Thor - The Hybrid Online Repository. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Quercia, Stephen Hailes |
MOTET: Mobile Transactions using Electronic Tickets. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Issa M. Khalil, Saurabh Bagchi, Cristina Nita-Rotaru |
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Di Pietro, Stefano Chessa, Piero Maestrini |
Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Vagner J. do Sacramento Rodrigues, Markus Endler, Fernando N. Nascimento |
A Privacy Service for Context-aware Mobile Computing. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ioannis Pavlosoglou, Mark S. Leeson, Roger J. Green |
Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Wassim Itani, Ayman I. Kayssi, Ali Chehab |
Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yen-Chieh Ouyang, Chung-Hua Chu |
Short Paper: A Secure Interworking Scheme for UMTS-WLAN. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Baruch Awerbuch, Reza Curtmola, David Holmer, Herbert Rubens, Cristina Nita-Rotaru |
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hahnsang Kim, Kang G. Shin, Walid Dabbous |
Improving Cross-domain Authentication overWireless Local Area Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Katrin Hoeper, Guang Gong |
Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Di Pietro, Antonio Durante, Luigi V. Mancini, Vishwas Patil |
Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | David Sánchez Sánchez, Heribert Baldus |
A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Urs Hengartner, Peter Steenkiste |
Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Gerhard P. Hancke 0002, Markus G. Kuhn |
An RFID Distance Bounding Protocol. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia |
Securing Topology Maintenance Protocols for Sensor Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Dhananjay S. Phatak |
Spread-Identity mechanisms for DOS resilience and Security. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Nicholas Bambos |
Short Paper: Dynamic Risk Mitigation for 'Self-defending' Network Security. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | H. Ragab Hassan, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal |
An Efficient Key Management Algorithm for Hierarchical Group Communication. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Schlott, Frank Kargl, Michael Weber 0001 |
Short paper: Random IDs for preserving location privacy. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ari Juels, David Molnar, David A. Wagner 0001 |
Security and Privacy Issues in E-passports. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jing Deng 0002, Richard Han 0001, Shivakant Mishra |
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sandro Grech, Pasi Eronen |
Implications of Unlicensed Mobile Access (UMA) for GSM security. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Svetlana Radosavac, Karl Seamon, John S. Baras |
Short Paper: bufSTAT - a tool for early detection and classification of buffer overflow attacks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #544 of 544 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6] |
|