


default search action
ACM Workshop on Wireless Security 2006: Los Angeles, CA, USA
- Radha Poovendran, Ari Juels:

Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006. ACM 2006, ISBN 1-59593-557-6
Location-based techniques
- Srdjan Capkun, Mario Cagalj:

Integrity regions: authentication through presence in wireless networks. 1-10 - Dave Singelée

, Bart Preneel:
Location privacy in wireless personal area networks. 11-18 - Farooq Anjum:

Location dependent key management using random key-predistribution in sensor networks. 21-30
Keynote talk 1
- Nicholas Tsougas:

RFID security and privacy concerns. 31
Radio-layer security
- Zang Li, Wenyuan Xu, Robert D. Miller, Wade Trappe:

Securing wireless systems via lower layer enforcements. 33-42 - Daniel B. Faria, David R. Cheriton:

Detecting identity-based attacks in wireless networks using signalprints. 43-52
Keynote talk 2
- Adrian Perrig:

Security in sensor networks: industry trends, present and future research directions. 53
Assessing vulnerabilities
- Jiejun Kong, Xiaoyan Hong, Mario Gerla:

Modeling Ad-hoc rushing attack in a negligibility-based security framework. 55-64 - Dijiang Huang

:
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems. 65-74 - Jérémy Serror, Hui Zang, Jean-Chrysostome Bolot:

Impact of paging channel overloads or attacks on a cellular network. 75-84
Defensive techniques
- Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:

SCUBA: Secure Code Update By Attestation in sensor networks. 85-94 - Abhijit Bose, Kang G. Shin:

Proactive security for mobile messaging networks. 95-104 - Kevin Kane, James C. Browne:

Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks. 105-113

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














