


Остановите войну!
for scientists:


default search action
2. WISEC 2009: Zurich, Switzerland
- David A. Basin, Srdjan Capkun, Wenke Lee:
Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009. ACM 2009, ISBN 978-1-60558-460-7
Sensor Network Security (I)
- Piotr Szczechowiak, Anton Kargl, Michael Scott, Martin Collier
:
On the application of pairing based cryptography to wireless sensor networks. 1-12 - Morten Tranberg Hansen:
Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks. 13-20 - Joseph K. Liu
, Joonsang Baek
, Jianying Zhou
:
Certificate-based sequential aggregate signature. 21-28 - Osman Ugus, Dirk Westhoff, Jens-Matthias Bohli:
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme. 29-40
RFID security
- Florian Kerschbaum, Alessandro Sorniotti:
RFID-based supply chain partner authentication and key agreement. 41-50 - Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng
:
Attacks and improvements to an RIFD mutual authentication protocol and its extensions. 51-58 - Yossef Oren
, Martin Feldhofer:
A low-resource public-key identification scheme for RFID tags and sensor nodes. 59-68
Attacks
- Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia
, Dong Xuan, Jin Teng:
Stealthy video capturer: a new video-based spyware in 3G smartphones. 69-78 - Erik Tews, Martin Beck:
Practical attacks against WEP and WPA. 79-86
Ad hoc networks
- Jared Cordasco, Susanne Wetzel:
An attacker model for MANET routing security. 87-94 - Sevil Sen
, John Andrew Clark:
A grammatical evolution approach to intrusion detection on mobile ad hoc networks. 95-102 - William Kozma, Loukas Lazos:
REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. 103-110
WiFi and mesh network security
- Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. 111-122 - Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, Michael Roe:
Privacy-preserving 802.11 access-point discovery. 123-130 - Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan:
Link-layer protection in 802.11i WLANS with dummy authentication. 131-138 - Guanhua Yan, Stephan J. Eidenbenz
, Bo Sun:
Mobi-watchdog: you can steal, but you can't run! 139-150
Jamming/anti-jamming
- David Slater, Patrick Tague
, Radha Poovendran, Brian J. Matt:
A coding-theoretic approach for efficient message verification over insecure channels. 151-160 - Ivan Martinovic, Paul Pichota, Jens B. Schmitt:
Jamming for good: a fresh approach to authentic communication in WSNs. 161-168 - Loukas Lazos, Sisi Liu, Marwan Krunz:
Mitigating control-channel jamming attacks in multi-channel ad hoc networks. 169-180
Secure localization and time synchronization
- Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu:
Secure and precise location verification using distance bounding and simultaneous multilateration. 181-192 - Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos
, Jean-Pierre Hubaux:
A practical secure neighbor verification protocol for wireless sensor networks. 193-200 - Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, Jinhui Xu:
Towards a theory for securing time synchronization in wireless sensor networks. 201-212
Sensor network security II
- Christopher Ferguson, Qijun Gu, Hongchi Shi:
Self-healing control flow protection in sensor applications. 213-224 - Petr Svenda
, Lukás Sekanina, Václav Matyás:
Evolutionary design of secrecy amplification protocols for wireless sensor networks. 225-236 - Roberto Di Pietro
, Claudio Soriente, Angelo Spognardi
, Gene Tsudik:
Collaborative authentication in unattended WSNs. 237-244 - Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha
:
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. 245-252 - Emiliano De Cristofaro, Jens-Matthias Bohli, Dirk Westhoff:
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks. 253-260 - Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan:
Securing network access in wireless sensor networks. 261-268

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.