


Остановите войну!
for scientists:


default search action
5. WISEC 2012: Tucson, AZ, USA
- Marwan Krunz, Loukas Lazos, Roberto Di Pietro, Wade Trappe:
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012. ACM 2012, ISBN 978-1-4503-1265-3
Keynote address 1
- Edward W. Felten:
Toward a healthy wireless privacy ecosystem. 1-2
Physical layer security for wireless systems
- Koorosh Firouzbakht, Guevara Noubir, Masoud Salehi
:
On the capacity of rate-adaptive packetized wireless communication links under jamming. 3-14 - Aanjhan Ranganathan
, Boris Danev, Aurélien Francillon
, Srdjan Capkun:
Physical-layer attacks on chirp-based ranging systems. 15-26 - Lu Shi, Ming Li, Shucheng Yu
, Jiawei Yuan:
BANA: body area network authentication exploiting channel characteristics. 27-38 - Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Zero reconciliation secret key generation for body-worn health monitoring devices. 39-50
Privacy in wireless systems
- Di Ma
, Anudath K. Prasad, Nitesh Saxena, Tuo Xiang:
Location-aware and safer cards: enhancing RFID security and privacy via location sensing. 51-62 - Gildas Avoine, Iwen Coisel, Tania Martin:
A privacy-restoring mechanism for offline RFID systems. 63-74 - Chang-Han Jong, Virgil D. Gligor:
Private communication detection: a stochastic approach. 75-86 - Tao Shu, Marwan Krunz:
Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing. 87-98
Keynote address 2
- Tadayoshi Kohno:
Security for cyber-physical systems: case studies with medical devices, robots, and automobiles. 99-100
Mobile device and application security
- Michael C. Grace, Wu Zhou, Xuxian Jiang, Ahmad-Reza Sadeghi:
Unsafe exposure analysis of mobile in-app advertisements. 101-112 - Zhi Xu, Kun Bai, Sencun Zhu:
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. 113-124 - Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
DroidChecker: analyzing android applications for capability leak. 125-136 - Yuanyuan Zeng, Kang G. Shin, Xin Hu:
Design of SMS commanded-and-controlled and P2P-structured mobile botnets. 137-148 - Steffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova
, Hossen A. Mustafa
, Wenyuan Xu, Vijay Varadharajan
:
Tetherway: a framework for tethering camouflage. 149-160
Supply chain and manufacturing security
- Sheng Wei, Miodrag Potkonjak:
Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection. 161-172 - Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
:
CHECKER: on-site checking in RFID-based supply chains. 173-184
Foundations of wireless network security
- Andrew Newell, Reza Curtmola, Cristina Nita-Rotaru:
Entropy attacks and countermeasures in wireless network coding. 185-196 - Raghav Bhaskar, Ragesh Jaiswal, Sidharth Telang:
Congestion lower bounds for secure in-network aggregation. 197-204

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.