


default search action
1. WISEC 2008: Alexandria, VA, USA
- Virgil D. Gligor, Jean-Pierre Hubaux, Radha Poovendran:

Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM 2008, ISBN 978-1-59593-814-5 - Ari Juels:

RFID security: in the shoulder and on the loading dock. 1
Authentication in wireless networks
- Qi Dong, Donggang Liu, Peng Ning:

Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. 2-12 - Christoph Krauß

, Markus Schneider, Claudia Eckert:
Defending against false-endorsement-based dos attacks in wireless sensor networks. 13-23 - Andrew Harding, Timothy W. van der Horst, Kent E. Seamons

:
Wireless authentication using remote passwords. 24-29 - Benedikt Driessen, Axel Poschmann, Christof Paar:

Comparison of innovative signature algorithms for WSNs. 30-35
Device identification and privacy
- Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm

, Christian Wegmann, Jens B. Schmitt:
Wireless client puzzles in IEEE 802.11 networks: security by wireless. 36-45 - Desmond Loh Chin Choong, Chia Yuan Cho, Chung Pheng Tan, Ri Seng Lee:

Identifying unique devices through wireless fingerprinting. 46-55 - Sergey Bratus, Cory Cornelius, David Kotz

, Daniel Peebles:
Active behavioral fingerprinting of wireless devices. 56-61 - Zhiguo Wan, Kui Ren

, Bart Preneel
:
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. 62-67
Sensor network security
- Keith B. Frikken, Joseph A. Dougherty IV:

An efficient integrity-preserving scheme for hierarchical sensor aggregation. 68-76 - Yi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar, Guohong Cao:

Towards event source unobservability with minimum network traffic in sensor networks. 77-88 - Jing Dong, Kurt Erik Ackermann, Brett Bavar, Cristina Nita-Rotaru:

Mitigating attacks against virtual coordinate based routing in wireless sensor networks. 89-99
Key management
- Dennis K. Nilsson, Tanya G. Roosta, Ulf Lindqvist

, Alfonso Valdes:
Key management and secure software updates in wireless process control environments. 100-108 - Youssef Hanna, Hridesh Rajan

, Wensheng Zhang:
Slede: a domain-specific verification framework for sensor network security protocol implementations. 109-118 - Jiang Wu, Douglas R. Stinson:

Minimum node degree and kappa-connectivity for key predistribution schemes and distributed sensor networks. 119-124 - Cynthia Kuo, Ahren Studer, Adrian Perrig:

Mind your manners: socially appropriate wireless key establishment for groups. 125-130
RFID and embedded sensors
- Michael J. Ocean, Azer Bestavros

:
Wireless and physical security via embedded sensor networks. 131-139 - Boyeon Song, Chris J. Mitchell

:
RFID authentication protocol for low-cost tags. 140-147 - Chiu C. Tan, Haodong Wang, Sheng Zhong, Qun Li

:
Body sensor network security: an identity-based cryptography approach. 148-153 - Leonardo A. Martucci, Markulf Kohlweiss

, Christer Andersson, Andriy Panchenko:
Self-certified Sybil-free pseudonyms. 154-159
Panel
- Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback:

RFID security and privacy: long-term research or short-term tinkering? 160
Multi-hop applications and mal-packets
- Jens-Matthias Bohli, Alban Hessler, Osman Ugus, Dirk Westhoff:

A secure and resilient WSN roadside architecture for intelligent transport systems. 161-171 - Qijun Gu, Rizwan Noorani:

Towards self-propagate mal-packets in sensor networks. 172-182 - Hailun Tan, Sanjay K. Jha

, Diethelm Ostry, John Zic, Vijay Sivaraman:
Secure multi-hop network programming with multiple one-way key chains. 183-193
Defensive techniques
- Gerhard P. Hancke

, Markus G. Kuhn
:
Attacks on time-of-flight distance bounding channels. 194-202 - Wenyuan Xu, Wade Trappe, Yanyong Zhang:

Anti-jamming timing channels for wireless networks. 203-213 - Mauro Conti

, Roberto Di Pietro
, Luigi V. Mancini
, Alessandro Mei
:
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. 214-219 - Volker Roth, Wolfgang Polak, Eleanor Gilbert Rieffel, Thea Turner:

Simple and effective defense against evil twin access points. 220-235

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














