-
1
-
-
56749105246
-
-
F. Armknecht, A. Festag, D. Westhoff, and Z, Ke. Cross-layer privacy enhancement and non-repudiation in vehicular communication. KIVS WMAN, 2007.
-
F. Armknecht, A. Festag, D. Westhoff, and Z, Ke. Cross-layer privacy enhancement and non-repudiation in vehicular communication. KIVS WMAN, 2007.
-
-
-
-
2
-
-
84876403419
-
Re-visited: Denial of service resilient access control for wireless sensor networks
-
F. Armknecht, J. Girao, M. Stoecklin, and D. Westhoff. Re-visited: Denial of service resilient access control for wireless sensor networks. In 3rd European Workshop on Security and Privacy for Ad Hoc and Sensor Networks, ESAS 2006, pages 18 - 31, 2006.
-
(2006)
3rd European Workshop on Security and Privacy for Ad Hoc and Sensor Networks, ESAS
, pp. 18-31
-
-
Armknecht, F.1
Girao, J.2
Stoecklin, M.3
Westhoff, D.4
-
4
-
-
33750315272
-
Authenticated query flooding in sensor networks
-
Z. Benenson, L. Pimenidis, F. Freiling, and S. Lucks. Authenticated query flooding in sensor networks. In 4th IEEE Conference on Pervasive Computing and Communications Workshop, pages 644-647, 2006.
-
(2006)
4th IEEE Conference on Pervasive Computing and Communications Workshop
, pp. 644-647
-
-
Benenson, Z.1
Pimenidis, L.2
Freiling, F.3
Lucks, S.4
-
5
-
-
34547471023
-
Ranbar: Ransac-based resilient aggregation in sensor networks
-
L. Buttyan, P. Schaffer, and I. Vajda. Ranbar: Ransac-based resilient aggregation in sensor networks. In Security of Ad Hoc and Sensor Networks, ACM SASN 2006, pages 83-90, 2006.
-
(2006)
Security of Ad Hoc and Sensor Networks, ACM SASN 2006
, pp. 83-90
-
-
Buttyan, L.1
Schaffer, P.2
Vajda, I.3
-
6
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
IEEE
-
R. Canetti, J. A. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In INFOCOM '99, pages 708-716. IEEE, 1999.
-
(1999)
INFOCOM '99
, pp. 708-716
-
-
Canetti, R.1
Garay, J.A.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
8
-
-
56749096081
-
-
H. Chan, A, Perrig, and D, Song, Secure hierarchical in-network aggregation in sensor networks. In In ACM Conference on Computer and Communication Security, CCS'06, page 287, 2006.
-
H. Chan, A, Perrig, and D, Song, Secure hierarchical in-network aggregation in sensor networks. In In ACM Conference on Computer and Communication Security, CCS'06, page 287, 2006.
-
-
-
-
10
-
-
0842332407
-
A witness-based approach for data fusion assurance in wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, and P. Varshney. A witness-based approach for data fusion assurance in wireless sensor networks. In IEEE Global Communications Conference, GLOBECOM 2003, pages 1435-1439, 2003.
-
(2003)
IEEE Global Communications Conference, GLOBECOM 2003
, pp. 1435-1439
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
-
11
-
-
34249316910
-
TinyPEDS: Persistent encrypted data storage in asynchronous wireless sensor networks
-
J. Girao, D. Westhoff, E. Mykletun, and T. Araki. TinyPEDS: Persistent encrypted data storage in asynchronous wireless sensor networks. Elsevier Ad Hoc Journal, 5(7): 1073-1089, 2007.
-
(2007)
Elsevier Ad Hoc Journal
, vol.5
, Issue.7
, pp. 1073-1089
-
-
Girao, J.1
Westhoff, D.2
Mykletun, E.3
Araki, T.4
-
12
-
-
56749176051
-
Cda: Concealed data aggregation in wireless sensor networks. in proceedings of the acm workshop on wireless security
-
J. Girao, D. Westhoff, and M. Schneider. Cda: Concealed data aggregation in wireless sensor networks. in proceedings of the acm workshop on wireless security. In ACM Workshop on Wireless Security, ACM WiSe'04, 2004.
-
(2004)
ACM Workshop on Wireless Security, ACM WiSe'04
-
-
Girao, J.1
Westhoff, D.2
Schneider, M.3
-
14
-
-
37849009419
-
Secure incentives for commercial ad dissemination in vehicular networks
-
S. Lee, G. Pan, J. Park, M. Gerla, and S. Lu. Secure incentives for commercial ad dissemination in vehicular networks. In The 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM MobiHoc 2007, 2007.
-
(2007)
The 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM MobiHoc 2007
-
-
Lee, S.1
Pan, G.2
Park, J.3
Gerla, M.4
Lu, S.5
-
18
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, 15(1):39 - 68, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.2
-
19
-
-
49649088025
-
Non-manipulable aggregator node election protocols for wireless sensor networks
-
M. Sivrianosh, D. Westhoff, F. Armknecht, and J. Girao. Non-manipulable aggregator node election protocols for wireless sensor networks. In 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, IEEE WiOpt 2007, 2007.
-
(2007)
5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, IEEE WiOpt 2007
-
-
Sivrianosh, M.1
Westhoff, D.2
Armknecht, F.3
Girao, J.4
-
20
-
-
56749096080
-
Verteiltes sniffen von IEEE 802.15.4 Netzen unter Zuhilfenahme eines WLAN Ad-hoc-Netzwerkes
-
L. Thiem and K. Scholl. Verteiltes sniffen von IEEE 802.15.4 Netzen unter Zuhilfenahme eines WLAN Ad-hoc-Netzwerkes. 6th Fachgespräch drahtlose Sensornetze of GI/ITG, 2007.
-
(2007)
6th Fachgespräch drahtlose Sensornetze of GI/ITG
-
-
Thiem, L.1
Scholl, K.2
-
22
-
-
70350617038
-
Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks
-
O. Ugus, D. Westhoff, R. Laue, A. Shoufan, and S. Huss. Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. In 2nd Workshop on Embedded Systems Security, WESS'2007, 2007.
-
(2007)
2nd Workshop on Embedded Systems Security, WESS'2007
-
-
Ugus, O.1
Westhoff, D.2
Laue, R.3
Shoufan, A.4
Huss, S.5
-
24
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in wireless sensor networks: Encryption, key pre-distribution and routing
-
D. Westhoff, J. Girao, and M. Acharya. Concealed data aggregation for reverse multicast traffic in wireless sensor networks: Encryption, key pre-distribution and routing. IEEE Transactions on Mobile Computing, 2006.
-
(2006)
IEEE Transactions on Mobile Computing
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
|