:facetid:toc:\"db/conf/wisec/wisec2010.bht\"
OK
:facetid:toc:db/conf/wisec/wisec2010.bht
Chrisil ArackaparambilSergey BratusAnna ShubinaDavid KotzOn the reliability of wireless fingerprinting using clock skews.WISEC169-1742010Conference and Workshop Papersclosedconf/wisec/ArackaparambilBSK1010.1145/1741866.1741894https://doi.org/10.1145/1741866.1741894https://dblp.org/rec/conf/wisec/ArackaparambilBSK10
URL#4970871
Brian M. BowenVasileios P. KemerlisPratap V. PrabhuAngelos D. KeromytisSalvatore J. StolfoAutomating the injection of believable decoys to detect snooping.WISEC81-862010Conference and Workshop Papersclosedconf/wisec/BowenKPKS1010.1145/1741866.1741880https://doi.org/10.1145/1741866.1741880https://dblp.org/rec/conf/wisec/BowenKPKS10
URL#4970872
Hao Chen 0095Efficient compromising resilient authentication schemes for large scale wireless sensor networks.WISEC49-542010Conference and Workshop Papersclosedconf/wisec/Chen1010.1145/1741866.1741875https://doi.org/10.1145/1741866.1741875https://dblp.org/rec/conf/wisec/Chen10
URL#4970873
Boris DanevHeinrich LueckenSrdjan CapkunKarim M. El DefrawyAttacks on physical-layer identification.WISEC89-982010Conference and Workshop Papersclosedconf/wisec/DanevLCD1010.1145/1741866.1741882https://doi.org/10.1145/1741866.1741882https://dblp.org/rec/conf/wisec/DanevLCD10
URL#4970874
Manuel FluryMarcin PoturalskiPanos PapadimitratosJean-Pierre HubauxJean-Yves Le BoudecEffectiveness of distance-decreasing attacks against impulse radio ranging.WISEC117-1282010Conference and Workshop Papersclosedconf/wisec/FluryPPHB1010.1145/1741866.1741887https://doi.org/10.1145/1741866.1741887https://dblp.org/rec/conf/wisec/FluryPPHB10
URL#4970875
Qijun GuEfficient code diversification for network reprogramming in sensor networks.WISEC145-1502010Conference and Workshop Papersclosedconf/wisec/Gu1010.1145/1741866.1741890https://doi.org/10.1145/1741866.1741890https://dblp.org/rec/conf/wisec/Gu10
URL#4970876
Florian KerschbaumNina OertelLeonardo Weiss Ferreira ChavesPrivacy-preserving computation of benchmarks on item-level data using RFID.WISEC105-1102010Conference and Workshop Papersclosedconf/wisec/KerschbaumOC1010.1145/1741866.1741884https://doi.org/10.1145/1741866.1741884https://dblp.org/rec/conf/wisec/KerschbaumOC10
URL#4970877
Jinsub KimDan SterneRommie L. HardyRoshan K. ThomasLang TongTiming-based localization of in-band wormhole tunnels in MANETs.WISEC1-122010Conference and Workshop Papersclosedconf/wisec/KimSHTT1010.1145/1741866.1741869https://doi.org/10.1145/1741866.1741869https://dblp.org/rec/conf/wisec/KimSHTT10
URL#4970878
Yong Ki LeeLejla BatinaDave SingeléeIngrid VerbauwhedeLow-cost untraceable authentication protocols for RFID.WISEC55-642010Conference and Workshop Papersclosedconf/wisec/LeeBSV1010.1145/1741866.1741877https://doi.org/10.1145/1741866.1741877https://dblp.org/rec/conf/wisec/LeeBSV10
URL#4970879
Zhenhua Liu 0005Wenyuan XuZeroing-in on network metric minima for sink location determination.WISEC99-1042010Conference and Workshop Papersclosedconf/wisec/LiuX1010.1145/1741866.1741883https://doi.org/10.1145/1741866.1741883https://dblp.org/rec/conf/wisec/LiuX10
URL#4970880
Qi MiJohn A. StankovicRadu StoleruSecure walking GPS: a secure localization and key distribution scheme for wireless sensor networks.WISEC163-1682010Conference and Workshop Papersclosedconf/wisec/MiSS1010.1145/1741866.1741893https://doi.org/10.1145/1741866.1741893https://dblp.org/rec/conf/wisec/MiSS10
URL#4970881
Robert D. MillerWade TrappeSubverting MIMO wireless systems by jamming the channel estimation procedure.WISEC19-242010Conference and Workshop Papersclosedconf/wisec/MillerT1010.1145/1741866.1741871https://doi.org/10.1145/1741866.1741871https://dblp.org/rec/conf/wisec/MillerT10
URL#4970882
Yasunobu NoharaSozo InoueA secure and scalable identification for hash-based RFID systems using updatable pre-computation.WISEC65-742010Conference and Workshop Papersclosedconf/wisec/NoharaI1010.1145/1741866.1741878https://doi.org/10.1145/1741866.1741878https://dblp.org/rec/conf/wisec/NoharaI10
URL#4970883
T. J. O'ConnorBenjamin SangsterhoneyM: a framework for implementing virtual honeyclients for mobile devices.WISEC129-1382010Conference and Workshop Papersclosedconf/wisec/OConnorS1010.1145/1741866.1741888https://doi.org/10.1145/1741866.1741888https://dblp.org/rec/conf/wisec/OConnorS10
URL#4970884
Andrew M. OdlyzkoProviding security with insecure systems.WISEC87-882010Conference and Workshop Papersclosedconf/wisec/Odlyzko1010.1145/1741866.1741867https://doi.org/10.1145/1741866.1741867https://dblp.org/rec/conf/wisec/Odlyzko10
URL#4970885
Maxim RayaReza ShokriJean-Pierre HubauxOn the tradeoff between trust and privacy in wireless ad hoc networks.WISEC75-802010Conference and Workshop Papersclosedconf/wisec/RayaSH1010.1145/1741866.1741879https://doi.org/10.1145/1741866.1741879https://dblp.org/rec/conf/wisec/RayaSH10
URL#4970886
Elmar SchochFrank KarglOn the efficiency of secure beaconing in VANETs.WISEC111-1162010Conference and Workshop Papersclosedconf/wisec/SchochK1010.1145/1741866.1741885https://doi.org/10.1145/1741866.1741885https://dblp.org/rec/conf/wisec/SchochK10
URL#4970887
Ahren StuderAdrian PerrigMobile user location-specific encryption (MULE): using your office as your password.WISEC151-1622010Conference and Workshop Papersclosedconf/wisec/StuderP1010.1145/1741866.1741892https://doi.org/10.1145/1741866.1741892https://dblp.org/rec/conf/wisec/StuderP10
URL#4970888
Nilothpal TalukderSheikh Iqbal AhamedPreventing multi-query attack in location-based services.WISEC25-362010Conference and Workshop Papersclosedconf/wisec/TalukderA1010.1145/1741866.1741873https://doi.org/10.1145/1741866.1741873https://dblp.org/rec/conf/wisec/TalukderA10
URL#4970889
Matthias Wilhelm 0001Ivan MartinovicJens B. SchmittSecret keys from entangled sensor motes: implementation and analysis.WISEC139-1442010Conference and Workshop Papersclosedconf/wisec/WilhelmMS1010.1145/1741866.1741889https://doi.org/10.1145/1741866.1741889https://dblp.org/rec/conf/wisec/WilhelmMS10
URL#4970890
Liang Xie 0002Xinwen ZhangJean-Pierre SeifertSencun ZhupBMDS: a behavior-based malware detection system for cellphone devices.WISEC37-482010Conference and Workshop Papersclosedconf/wisec/XieZSZ1010.1145/1741866.1741874https://doi.org/10.1145/1741866.1741874https://dblp.org/rec/conf/wisec/XieZSZ10
URL#4970891
Yanjun ZuoRFID survivability quantification and attack modeling.WISEC13-182010Conference and Workshop Papersclosedconf/wisec/Zuo1010.1145/1741866.1741870https://doi.org/10.1145/1741866.1741870https://dblp.org/rec/conf/wisec/Zuo10
URL#4970892
Susanne WetzelCristina Nita-RotaruFrank StajanoProceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010WISECACM2010Editorshipunavailableconf/wisec/2010https://dblp.org/rec/conf/wisec/2010
URL#4978866