


default search action
ACM Workshop on Wireless Security 2005: Cologne, Germany
- Markus Jakobsson, Radha Poovendran:

Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005. ACM 2005, ISBN 1-59593-142-2
Key management
- Li Zhou, Jinfeng Ni, Chinya V. Ravishankar

:
Efficient key establishment for group-based wireless sensor deployments. 1-10 - Donggang Liu, Peng Ning, Wenliang Du:

Group-based key pre-distribution in wireless sensor networks. 11-20 - Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald:

Fully self-organized peer-to-peer key management for mobile ad hoc networks. 21-30 - Jean-Pierre Hubaux:

The security of vehicular networks. 31-32
Misbehavior
- Svetlana Radosavac, John S. Baras, Iordanis Koutsopoulos:

A framework for MAC protocol misbehavior detection in wireless networks. 33-42 - Yi-an Huang, Wenke Lee:

Hotspot-based traceback for mobile ad hoc networks. 43-54 - Virgil D. Gligor:

Emergent properties in ad-hoc networks: a security perspective. 55
Security analysis
- Geir M. Køien:

Privacy enhanced cellular access security. 57-66 - Ari Juels:

Strengthening EPC tags against cloning. 67-76 - James W. Mickens, Brian D. Noble:

Modeling epidemic spreading in mobile environments. 77-86
Synchronization
- Jiejun Kong, Zhengrong Ji, Weichao Wang, Mario Gerla, Rajive L. Bagrodia, Bharat K. Bhargava:

Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. 87-96 - Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, Mani B. Srivastava:

Secure time synchronization service for sensor networks. 97-106

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














