The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WISEC"( http://dblp.L3S.de/Venues/WISEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/wisec

Publication years (Num. hits)
2008 (29) 2009 (29) 2010 (23) 2011 (21) 2012 (20) 2013 (27) 2014 (27) 2015 (35) 2016 (33) 2017 (41) 2018 (41) 2019 (61) 2020 (31) 2021 (46) 2022 (40) 2023 (35)
Publication types (Num. hits)
inproceedings(523) proceedings(16)
Venues (Conferences, Journals, ...)
WISEC(539)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 218 occurrences of 138 keywords

Results
Found 539 publication records. Showing 539 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1David Slater, Patrick Tague, Radha Poovendran, Brian J. Matt A coding-theoretic approach for efficient message verification over insecure channels. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF insecure channels, insertion attacks, message verification, jamming
1Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, Jinhui Xu 0001 Towards a theory for securing time synchronization in wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, approximation algorithms, time synchronization
1Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng Attacks and improvements to an RIFD mutual authentication protocol and its extensions. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, privacy, authentication, rfid
1Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik Collaborative authentication in unattended WSNs. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, authentication, mobile adversary
1Jing Dong 0006, Reza Curtmola, Cristina Nita-Rotaru Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network coding security, security, network coding, wireless network security, pollution attacks
1Florian Kerschbaum, Alessandro Sorniotti RFID-based supply chain partner authentication and key agreement. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF proof of possession, authentication, supply chain, key agreement, rfid
1Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan Link-layer protection in 802.11i WLANS with dummy authentication. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dummy authentication, security, wlan, open access
1Loukas Lazos, Sisi Liu, Marwan Krunz Mitigating control-channel jamming attacks in multi-channel ad hoc networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ad hoc networks, denial of service, multi channel, jamming, control channel
1Jared Cordasco, Susanne Wetzel An attacker model for MANET routing security. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, routing, ad-hoc, manet, attacker model
1Guanhua Yan, Stephan J. Eidenbenz, Bo Sun 0001 Mobi-watchdog: you can steal, but you can't run! Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hhmm, mobility, wireless networks, anomaly detection
1Cynthia Kuo, Ahren Studer, Adrian Perrig Mind your manners: socially appropriate wireless key establishment for groups. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Leonardo A. Martucci, Markulf Kohlweiss, Christer Andersson, Andriy Panchenko 0001 Self-certified Sybil-free pseudonyms. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, identities, sybil attack
1Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm 0001, Christian Wegmann, Jens B. Schmitt Wireless client puzzles in IEEE 802.11 networks: security by wireless. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF denial-of-service (DoS), wireless security, impersonation attacks, client puzzles
1Jing Dong 0006, Kurt Erik Ackermann, Brett Bavar, Cristina Nita-Rotaru Mitigating attacks against virtual coordinate based routing in wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF beacon vector routing, secure beacon vector routing, sensor network routing, virtual coordinate system, security, routing
1Yi Yang 0002, Min Shao, Sencun Zhu, Bhuvan Urgaonkar, Guohong Cao Towards event source unobservability with minimum network traffic in sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF event unobservability, global observer, minimum traffic, sensor network privacy, proxy
1Keith B. Frikken, Joseph A. Dougherty IV An efficient integrity-preserving scheme for hierarchical sensor aggregation. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure aggregation, sensor networks, integrity
1Michael J. Ocean, Azer Bestavros Wireless and physical security via embedded sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor networks, intrusion detection, wireless, physical security
1Volker Roth 0002, Wolfgang Polak, Eleanor Gilbert Rieffel, Thea Turner Simple and effective defense against evil twin access points. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF evil twin, usable security, wireless security, device pairing
1Gerhard P. Hancke 0002, Markus G. Kuhn Attacks on time-of-flight distance bounding channels. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data modulation, distance-bounding protocols, location-based authentication, round-trip time measurement, speed of light, RFID, wireless communication, radio channels, low-latency communication
1Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF node capture attack detection, node revocation, efficiency, resilience, distributed protocol, wireless sensor network security
1Dennis K. Nilsson, Tanya G. Roosta, Ulf Lindqvist, Alfonso Valdes Key management and secure software updates in wireless process control environments. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key management, wireless sensor nodes, process control systems, software updates, rekeying
1Chiu C. Tan 0001, Haodong Wang, Sheng Zhong 0002, Qun Li 0001 Body sensor network security: an identity-based cryptography approach. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, body sensor networks, identity-based cryptography
1Qi Dong 0001, Donggang Liu, Peng Ning Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, sensor networks, broadcast authentication, DoS attacks
1Virgil D. Gligor, Jean-Pierre Hubaux, Radha Poovendran (eds.) Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008 Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  BibTeX  RDF
1Desmond Loh Chin Choong, Chia Yuan Cho, Chung Pheng Tan, Ri Seng Lee Identifying unique devices through wireless fingerprinting. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF spoof detection, wireless fingerprinting
1Boyeon Song, Chris J. Mitchell RFID authentication protocol for low-cost tags. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF rfid authentication protocol, security, privacy
1Ari Juels RFID security: in the shoulder and on the loading dock. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Qijun Gu, Rizwan Noorani Towards self-propagate mal-packets in sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mal-packet, sensor worm, buffer overflow, control flow
1Zhiguo Wan, Kui Ren 0001, Bart Preneel A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF roaming protocols, privacy, mobile networks
1Jiang Wu 0001, Douglas R. Stinson Minimum node degree and kappa-connectivity for key predistribution schemes and distributed sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ?-connectivity, sensor networks, key predistribution
1Sergey Bratus, Cory Cornelius, David Kotz, Daniel Peebles Active behavioral fingerprinting of wireless devices. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fingerprinting, 802.11, link layer
1Jens-Matthias Bohli, Alban Hessler, Osman Ugus, Dirk Westhoff A secure and resilient WSN roadside architecture for intelligent transport systems. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, wireless sensor networks, vehicular ad-hoc networks
1Benedikt Driessen, Axel Poschmann, Christof Paar Comparison of innovative signature algorithms for WSNs. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Andrew Harding, Timothy W. van der Horst, Kent E. Seamons Wireless authentication using remote passwords. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SAW, decentralized wireless authentication, SRP
1Christoph Krauß, Markus Schneider 0002, Claudia Eckert 0001 Defending against false-endorsement-based dos attacks in wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, wireless sensor network, node compromise, denial-of-service attacks, report generation
1Youssef Hanna, Hridesh Rajan, Wensheng Zhang 0001 Slede: a domain-specific verification framework for sensor network security protocol implementations. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intruder generation, sensor networks, model checking, security protocols
1Hailun Tan, Sanjay K. Jha, Diethelm Ostry, John Zic, Vijay Sivaraman Secure multi-hop network programming with multiple one-way key chains. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network programming protocols, sensor network security, broadcast authentication, code distribution
1Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang Anti-jamming timing channels for wireless networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF jamming, timing channel, radio interference
1Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback RFID security and privacy: long-term research or short-term tinkering? Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #539 of 539 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license