-
1
-
-
0034777649
-
Intercepting Mobile Communications: The Insecurity of 802.11
-
ACM Press
-
N. Borisov, I. Goldberg, and D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11," Proc. 7th ACM Int'l Conf. Mobile Computing and Networking, ACM Press, 2001, pp. 180-189.
-
(2001)
Proc. 7th ACM Int'l Conf. Mobile Computing and Networking
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
2
-
-
3042737904
-
Wireless Security Future
-
B. Potter, "Wireless Security Future," IEEE Security & Privacy, vol. 1, no. 4, 2003, pp. 68-72.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 68-72
-
-
Potter, B.1
-
3
-
-
84925368904
-
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
-
Usenix Assoc
-
J. Bellardo and S. Savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," Proc. 11th Usenix Security Symp., Usenix Assoc., 2003, pp. 15-28.
-
(2003)
Proc. 11th Usenix Security Symp
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
4
-
-
33847748750
-
-
S. Capkun andJ.P. Hubaux, Securing Position and Distance Verification in Wireless Networks, tech. report EPFL/IC/200443, Swiss Federal Inst. of Tech., May 2004.
-
S. Capkun andJ.P. Hubaux, Securing Position and Distance Verification in Wireless Networks, tech. report EPFL/IC/200443, Swiss Federal Inst. of Tech., May 2004.
-
-
-
-
5
-
-
0034858411
-
Hidden Terminal Jamming Problems in IEEE 802.11 Mobile Ad Hoc Networks
-
ICC, IEEE CS Press
-
C. Ware, T. Wysocki, and J.F. Chicharo, "Hidden Terminal Jamming Problems in IEEE 802.11 Mobile Ad Hoc Networks," Prof. IEEE Int'l Conf. Communications (ICC), IEEE CS Press, 2001, pp. 262-265.
-
(2001)
Prof. IEEE Int'l Conf. Communications
, pp. 262-265
-
-
Ware, C.1
Wysocki, T.2
Chicharo, J.F.3
-
6
-
-
0037003792
-
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
-
MILCOM, IEEE CS Press
-
V. Gupta, S. Krishnamurthy, and M. Faloutsos, "Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks," Proc. IEEE Military Communications Conf. (MILCOM), IEEE CS Press, 2002, pp. 1118-1123.
-
(2002)
Proc. IEEE Military Communications Conf
, pp. 1118-1123
-
-
Gupta, V.1
Krishnamurthy, S.2
Faloutsos, M.3
-
7
-
-
0010461175
-
-
NAI Labs tech. report #00-010, NAI Labs, Sept
-
D.W. Carman, P.S. Kruus, and B.J. Matt, Constraints and Approaches for Distributed Sensor Network Security, NAI Labs tech. report #00-010, NAI Labs, Sept. 2000.
-
(2000)
Constraints and Approaches for Distributed Sensor Network Security
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
8
-
-
0034771532
-
TCP Westwood: Bandwidth Estimation for Enhanced Transport over Wireless Links
-
MOBICOM, ACM Press
-
S. Mascolo et al., "TCP Westwood: Bandwidth Estimation for Enhanced Transport over Wireless Links," Proc. 7th ACM Int'l Conf. Mobile Computing and Networking (MOBICOM), ACM Press, 2001, pp. 287-297.
-
(2001)
Proc. 7th ACM Int'l Conf. Mobile Computing and Networking
, pp. 287-297
-
-
Mascolo, S.1
-
9
-
-
29844457889
-
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks
-
ACM Press
-
W. Xu et al., "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. 6th ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, ACM Press, 2005, pp. 46-57.
-
(2005)
Proc. 6th ACM Int'l Symp. Mobile Ad Hoc Networking and Computing
, pp. 46-57
-
-
Xu, W.1
-
11
-
-
0242696170
-
ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Adhoc Networks
-
ACM Press
-
J. Kong and X. Hong, "ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Adhoc Networks," ACM Int'l Symp. Mobile Ad-Hoc Networking and Computing, ACM Press, 2003, pp. 291-302.
-
(2003)
ACM Int'l Symp. Mobile Ad-Hoc Networking and Computing
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
12
-
-
33847758837
-
-
WCTG Report for Darpa, Nat'1 Inst. Standards and Technology Wireless Comm. Technologies Group, Apr
-
L.E. Miller, Why UWB? A Review of Ultrawideband Technology, WCTG Report for Darpa, Nat'1 Inst. Standards and Technology Wireless Comm. Technologies Group, Apr. 2003.
-
(2003)
Why UWB? A Review of Ultrawideband Technology
-
-
Miller, L.E.1
-
13
-
-
3042643459
-
Autonomic 802.11 Wireless LAN Security Auditing
-
J.W Branch et al., "Autonomic 802.11 Wireless LAN Security Auditing," IEEE Security & Privacy, vol. 2, no. 3, 2004, pp. 56-64.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.3
, pp. 56-64
-
-
Branch, J.W.1
-
14
-
-
4544324338
-
DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots
-
ACM Press
-
M. Raya, J.P. Hubaux, and I. Aad, "DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots," ACM MobiSys, ACM Press, 2004, pp. 84-97.
-
(2004)
ACM MobiSys
, pp. 84-97
-
-
Raya, M.1
Hubaux, J.P.2
Aad, I.3
-
16
-
-
33847735232
-
A Methodology for the Analysis of 802.1 la Links in Industrial Environments
-
IEEE CS Press
-
D. Brevi et al., "A Methodology for the Analysis of 802.1 la Links in Industrial Environments," IEEE Int'l Workshop on Factory Comm. Systems, IEEE CS Press, 2006, pp. 165-174.
-
(2006)
IEEE Int'l Workshop on Factory Comm. Systems
, pp. 165-174
-
-
Brevi, D.1
|