Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2014
- Jagdish Prasad Achara, Mathieu Cunche, Vincent Roca, Aurélien Francillon:
Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission. WISEC 2014: 231-236 - Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame:
Enabling BYOD through secure meta-market. WISEC 2014: 219-230 - N. Asokan:
On mobile malware infections. WISEC 2014: 37-38 - Ibrahim Ethem Bagci, Utz Roedig, Matthias Schulz, Matthias Hollick:
Short paper: gathering tamper evidence in wi-fi networks based on channel state information. WISEC 2014: 183-188 - Arijit Banerjee, Dustin Maas, Maurizio Bocca, Neal Patwari, Sneha Kumar Kasera:
Violating privacy through walls by passive monitoring of radio windows. WISEC 2014: 69-80 - David Barrera, Daniel McCarney, Jeremy Clark, Paul C. van Oorschot:
Baton: certificate agility for android's decentralized signing infrastructure. WISEC 2014: 1-12 - Daniel S. Berger, Francesco Gringoli, Nicolò Facchi, Ivan Martinovic, Jens B. Schmitt:
Gaining insight on friendly jamming in a real-world IEEE 802.11 network. WISEC 2014: 105-116 - Andrei Costin, Aurélien Francillon:
Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-design. WISEC 2014: 57-62 - Bruce DeBruhl, Christian Kroer, Anupam Datta, Tuomas Sandholm, Patrick Tague:
Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming. WISEC 2014: 117-128 - Stylianos Gisdakis, Thanassis Giannetsos, Panos Papadimitratos:
SPPEAR: security & privacy-preserving architecture for participatory-sensing applications. WISEC 2014: 39-50 - Jun Han, Yue-Hsun Lin, Adrian Perrig, Fan Bai:
Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles. WISEC 2014: 51-56 - Michael Herrmann, Alfredo Rial, Claudia Díaz, Bart Preneel:
Practical privacy-preserving location-sharing based services with aggregate statistics. WISEC 2014: 87-98 - Wenhui Hu, Damien Octeau, Patrick D. McDaniel, Peng Liu:
Duet: library integrity verification for android applications. WISEC 2014: 141-152 - Luke Hutton, Tristan Henderson, Apu Kapadia:
Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems. WISEC 2014: 81-86 - Ira Ray Jenkins, Rebecca Shapiro, Sergey Bratus, Travis Goodspeed, Ryan Speers, David Dowd:
Short paper: speaking the local dialect: exploiting differences between ieee 802.15.4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion. WISEC 2014: 63-68 - Nicholas Kolokotronis, Alexandros Katsiotis, Nicholas Kalouptsidis:
Short paper: attacking and defending lightweight PHY security schemes for wireless communications. WISEC 2014: 177-182 - Frederik Möllers, Sebastian Seitz, Andreas Hellmann, Christoph Sorge:
Short paper: extrapolation and prediction of user behaviour from wireless home automation communication. WISEC 2014: 195-200 - Adwait Nadkarni, Vasant Tendulkar, William Enck:
NativeWrap: ad hoc smartphone application creation for end users. WISEC 2014: 13-24 - Sashank Narain, Amirali Sanatinia, Guevara Noubir:
Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning. WISEC 2014: 201-212 - Hanif Rahbari, Marwan Krunz:
Friendly CryptoJam: a mechanism for securing physical-layer attributes. WISEC 2014: 129-140 - Pieter Robyns, Bram Bonné, Peter Quax, Wim Lamotte:
Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles. WISEC 2014: 189-194 - Mengtao Sun, Gang Tan:
NativeGuard: protecting android applications from third-party native libraries. WISEC 2014: 165-176 - Jiaqi Tan, Utsav Drolia, Rolando Martins, Rajeev Gandhi, Priya Narasimhan:
Short paper: CHIPS: content-based heuristics for improving photo privacy for smartphones. WISEC 2014: 213-218 - Zhen Xie, Sencun Zhu:
GroupTie: toward hidden collusion group discovery in app stores. WISEC 2014: 153-164 - Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun, David A. Basin:
Short paper: detection of GPS spoofing attacks in power grids. WISEC 2014: 99-104 - Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu, Peng Liu:
ViewDroid: towards obfuscation-resilient mobile application repackaging detection. WISEC 2014: 25-36 - Gergely Ács, Andrew P. Martin, Ivan Martinovic, Claude Castelluccia, Patrick Traynor:
7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014. ACM 2014, ISBN 978-1-4503-2972-9 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-19 10:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint