


default search action
2. WISEC 2009: Zurich, Switzerland
- David A. Basin, Srdjan Capkun, Wenke Lee:

Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009. ACM 2009, ISBN 978-1-60558-460-7
Sensor Network Security (I)
- Piotr Szczechowiak

, Anton Kargl, Michael Scott, Martin Collier
:
On the application of pairing based cryptography to wireless sensor networks. 1-12 - Morten Tranberg Hansen:

Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks. 13-20 - Joseph K. Liu

, Joonsang Baek
, Jianying Zhou
:
Certificate-based sequential aggregate signature. 21-28 - Osman Ugus, Dirk Westhoff, Jens-Matthias Bohli:

A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme. 29-40
RFID security
- Florian Kerschbaum, Alessandro Sorniotti:

RFID-based supply chain partner authentication and key agreement. 41-50 - Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng

:
Attacks and improvements to an RIFD mutual authentication protocol and its extensions. 51-58 - Yossef Oren

, Martin Feldhofer:
A low-resource public-key identification scheme for RFID tags and sensor nodes. 59-68
Attacks
- Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia

, Dong Xuan, Jin Teng:
Stealthy video capturer: a new video-based spyware in 3G smartphones. 69-78 - Erik Tews, Martin Beck:

Practical attacks against WEP and WPA. 79-86
Ad hoc networks
- Jared Cordasco, Susanne Wetzel:

An attacker model for MANET routing security. 87-94 - Sevil Sen

, John Andrew Clark:
A grammatical evolution approach to intrusion detection on mobile ad hoc networks. 95-102 - William Kozma

, Loukas Lazos:
REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. 103-110
WiFi and mesh network security
- Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:

Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. 111-122 - Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, Michael Roe:

Privacy-preserving 802.11 access-point discovery. 123-130 - Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan:

Link-layer protection in 802.11i WLANS with dummy authentication. 131-138 - Guanhua Yan, Stephan J. Eidenbenz

, Bo Sun:
Mobi-watchdog: you can steal, but you can't run! 139-150
Jamming/anti-jamming
- David Slater, Patrick Tague

, Radha Poovendran
, Brian J. Matt:
A coding-theoretic approach for efficient message verification over insecure channels. 151-160 - Ivan Martinovic, Paul Pichota, Jens B. Schmitt:

Jamming for good: a fresh approach to authentic communication in WSNs. 161-168 - Loukas Lazos, Sisi Liu, Marwan Krunz:

Mitigating control-channel jamming attacks in multi-channel ad hoc networks. 169-180
Secure localization and time synchronization
- Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu:

Secure and precise location verification using distance bounding and simultaneous multilateration. 181-192 - Reza Shokri

, Marcin Poturalski, Gael Ravot, Panos Papadimitratos
, Jean-Pierre Hubaux:
A practical secure neighbor verification protocol for wireless sensor networks. 193-200 - Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, Jinhui Xu:

Towards a theory for securing time synchronization in wireless sensor networks. 201-212
Sensor network security II
- Christopher Ferguson, Qijun Gu, Hongchi Shi:

Self-healing control flow protection in sensor applications. 213-224 - Petr Svenda

, Lukás Sekanina, Václav Matyás:
Evolutionary design of secrecy amplification protocols for wireless sensor networks. 225-236 - Roberto Di Pietro

, Claudio Soriente
, Angelo Spognardi
, Gene Tsudik:
Collaborative authentication in unattended WSNs. 237-244 - Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha

:
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. 245-252 - Emiliano De Cristofaro, Jens-Matthias Bohli, Dirk Westhoff:

FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks. 253-260 - Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan:

Securing network access in wireless sensor networks. 261-268

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














