-
1
-
-
1542317849
-
Secure verification of location claims
-
San Diego, CA
-
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the ACM workshop on Wireless security, San Diego, CA (2003) 1-10
-
(2003)
Proceedings of the ACM Workshop on Wireless Security
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
2
-
-
3042593365
-
Dependable systems: Whisper: Local secret maintenance in sensor networks
-
Naik, V., Arora, A., Bapat, S., Gouda, M.: Dependable systems: Whisper: Local secret maintenance in sensor networks. IEEE Distributed Systems Online 4 (2003)
-
(2003)
IEEE Distributed Systems Online
, vol.4
-
-
Naik, V.1
Arora, A.2
Bapat, S.3
Gouda, M.4
-
3
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
San Diego, CA, Internet Society
-
Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2002), San Diego, CA, Internet Society (2002)
-
(2002)
Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2002)
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
4
-
-
0013393580
-
Location-based authentication: Grounding cyberspace for better security
-
Denning, D.E., Denning, P.J., eds. ACM Press / Addison-Wesley, New York Reprint from Computer Fraud and Security, Elsevier Science, Ltd, February 1996
-
Denning, D.E., MacDoran, P.P.: Location-based authentication: Grounding Cyberspace for better security. In Denning, D.E., Denning, P.J., eds.: Internet Besieged: Countering Cyberspace Scofflaws. ACM Press / Addison-Wesley, New York (1998) 167-174 Reprint from Computer Fraud and Security, Elsevier Science, Ltd, February 1996.
-
(1998)
Internet Besieged: Countering Cyberspace Scofflaws
, pp. 167-174
-
-
Denning, D.E.1
MacDoran, P.P.2
-
5
-
-
33751533670
-
Packet leashes: A defense against wormhole attacks
-
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks. In: INFOCOM 2003. (2003)
-
(2003)
INFOCOM 2003
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
84976295016
-
Distance-bounding protocols (extended abstract)
-
Helleseth, T., ed.: Advances in Cryptology-EUROCRYPT 93, Springer-Verlag, 1994
-
Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In Helleseth, T., ed.: Advances in Cryptology-EUROCRYPT 93. Volume 765 of Lecture Notes in Computer Science., Springer-Verlag, 1994 (1993) 344-359
-
(1993)
Lecture Notes in Computer Science
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
8
-
-
25044466389
-
Context authentication using constrained channels
-
Hewlett Packard Laboratories
-
Kindberg, T., Zhang, K.: Context authentication using constrained channels. Technical Report HPL-2001-84, Hewlett Packard Laboratories (2001)
-
(2001)
Technical Report
, vol.HPL-2001-84
-
-
Kindberg, T.1
Zhang, K.2
-
9
-
-
0032218225
-
How to prove where you are: Tracking the location of customer equipment
-
San Francisco, California, ACM Press
-
Gabber, E., Wool, A.: How to prove where you are: Tracking the location of customer equipment. In: Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, California, ACM Press (1998) 142-149
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 142-149
-
-
Gabber, E.1
Wool, A.2
-
11
-
-
84871442641
-
On communication security in wireless ad-hoc sensor networks
-
Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.B.: On communication security in wireless ad-hoc sensor networks. In: 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. (2002) 139-144
-
(2002)
11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 139-144
-
-
Slijepcevic, S.1
Potkonjak, M.2
Tsiatsis, V.3
Zimbeck, S.4
Srivastava, M.B.5
-
13
-
-
84861263671
-
-
: Tinypk project, (http://www.is.bbn.com/projects/lws-nest/)
-
-
-
|