


default search action
6. WISEC 2013: Budapest, Hungary
- Levente Buttyán, Ahmad-Reza Sadeghi, Marco Gruteser:

Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013. ACM 2013, ISBN 978-1-4503-1998-0
Mobile device and application security
- Panagiotis Andriotis

, Theo Tryfonas
, George C. Oikonomou
, Can Yildiz:
A pilot study on the security of pattern screen-lock methods and soft side channel attacks. 1-6 - Tim Stöber, Mario Frank, Jens B. Schmitt, Ivan Martinovic:

Who do you sync you are?: smartphone fingerprinting via application behaviour. 7-12 - Saurabh Chakradeo, Bradley Reaves, Patrick Traynor, William Enck:

MAST: triage for market-scale mobile malware analysis. 13-24 - Haoyu Li, Di Ma

, Nitesh Saxena, Babins Shrestha, Yan Zhu
:
Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures. 25-30
Physical layer attacks and defenses
- Triet Vo Huu, Erik-Oliver Blass, Guevara Noubir:

Counter-jamming using mixed mechanical and software interference cancellation. 31-42 - Domenico Giustiniano

, Vincent Lenders
, Jens B. Schmitt, Michael Spuhler, Matthias Wilhelm
:
Detection of reactive jamming in DSSS-based wireless networks. 43-48 - Shrikant Adhikarla, Min Suk Kang, Patrick Tague

:
Selfish manipulation of cooperative cellular communications via channel fabrication. 49-54
Wireless protocol security
- René Hummen, Jens Hiller

, Hanno Wirtz, Martin Henze
, Hossein Shafagh, Klaus Wehrle
:
6LoWPAN fragmentation attacks and mitigation mechanisms. 55-66 - Attila Altay Yavuz

:
ETA: efficient and tiny and authentication for heterogeneous wireless systems. 67-72 - Ethmane El Moustaine, Maryline Laurent

:
GPS+: a back-end coupons identification for low-cost RFID. 73-78 - Teng Wu, Guang Gong:

The weakness of integrity protection for LTE. 79-88
Privacy in wireless systems
- Alejandro Proaño, Loukas Lazos:

Perfect contextual information privacy in WSNs undercolluding eavesdroppers. 89-94 - Benjamin Henne, Christian Szongott, Matthew Smith:

SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it. 95-106 - Frank Kargl, Arik Friedman, Roksana Boreli:

Differential privacy in intelligent transportation systems. 107-112 - Gökay Saldamli, Richard Chow, Hongxia Jin, Bart P. Knijnenburg:

Private proximity testing with an untrusted server. 113-118
Design and testing of secure protocols
- Oscar García Morchon, Sye Loong Keoh

, Sandeep S. Kumar, Pedro Moreno-Sanchez
, Francisco Vidal-Meca, Jan Henrik Ziegeldorf:
Securing the IP-based internet of things with HIP and DTLS. 119-124 - Panagiotis Rizomiliotis, Stefanos Gritzalis

:
Revisiting lightweight authentication protocols based on hard learning problems. 125-130 - Rens W. van der Heijden

, Stefan Dietzel, Frank Kargl:
SeDyA: secure dynamic aggregation in VANETs. 131-142 - Md. Endadul Hoque, Hyojeong Lee

, Rahul Potharaju, Charles E. Killian, Cristina Nita-Rotaru:
Adversarial testing of wireless routing implementations. 143-148
Establishing keys, trust, and identity
- Christine Hennebert, Hicham Hossayni

, Cédric Lauradoux:
Entropy harvesting from physical sensors. 149-154 - Lu Shi, Jiawei Yuan, Shucheng Yu

, Ming Li:
ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks. 155-166 - Yantian Hou, Ming Li, Joshua D. Guttman

:
Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel. 167-178 - Marek Klonowski, Michal Koza:

Countermeasures against sybil attacks in WSN based on proofs-of-work. 179-184
Energy and distance bounding
- Sheng Wei, Jong Hoon Ahnn, Miodrag Potkonjak:

Energy attacks and defense techniques for wireless systems. 185-194 - Marc Fischlin, Cristina Onete

:
Subtle kinks in distance-bounding: an analysis of prominent protocols. 195-206 - Jens Hermans, Roel Peeters

, Cristina Onete
:
Efficient, secure, private distance bounding without key updates. 207-218

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














