-
1
-
-
85008543309
-
Provably secure on-demand source routing in mobile ad hoc networks
-
Gergely Ács, Levente Buttyán, and István Vajda. Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 5 (11):1533-1546, 2006.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.11
, pp. 1533-1546
-
-
Ács, G.1
Buttyán, L.2
István Vajda3
-
2
-
-
84976295016
-
Distance-bounding protocols
-
Secaucus, NJ, USA
-
Stefan Brands and David Chaum. Distance-bounding protocols. In EUROCRYPT '93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pages 344-359, Secaucus, NJ, USA, 1994.
-
(1994)
EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
4
-
-
0029462943
-
Novel identification of intercepted signals from unknown radio transmitters
-
Howard C. Choe, Clark E. Poole, Andrea M. Yu, and Harold H. Szu. Novel identification of intercepted signals from unknown radio transmitters. In H. H. Szu, editor, Proc. SPIE Vol. 2491, p. 504-517
-
Proc. SPIE
, vol.2491
, pp. 504-517
-
-
Choe, H.C.1
Poole, C.E.2
Yu, A.M.3
Szu, H.H.4
-
5
-
-
78751606829
-
Wavelet applications II
-
Harold H. Szu; Ed. April, of Presented at the
-
Wavelet Applications II, Harold H. Szu; Ed., volume 2491 of Presented at the Society of Photo-Optical Instrumentation Engineers (SPIE) Conference, pages 504-517, April 1995.
-
(1995)
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference
, vol.2491
, pp. 504-517
-
-
-
6
-
-
37849004592
-
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
-
New York, NY, USA, ACM
-
Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini, and Alessandro Mei. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In MobiHoc '07: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, pages 80-89, New York, NY, USA, 2007. ACM.
-
(2007)
MobiHoc '07: Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 80-89
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
7
-
-
0019649307
-
On the security of public key protocols (extended abstract)
-
Danny Dolev and Andrew Chi-Chih Yao. On the security of public key protocols (extended abstract). In FOCS, pages 350-357, 1981.
-
(1981)
FOCS
, pp. 350-357
-
-
Dolev, D.1
Chi-Chih Yao, A.2
-
8
-
-
0035388827
-
-
Radio Science, Volume
-
K. J. Ellis and Nur Serinken. Characteristics of radio transmitter fingerprints, 2001. Radio Science, Volume 36, Issue 4, p. 585-598.
-
(2001)
Characteristics of Radio Transmitter Fingerprints
, vol.36
, Issue.4
, pp. 585-598
-
-
Ellis, K.J.1
Serinken, N.2
-
10
-
-
33749684148
-
Security of emergent properties in ad-hoc networks (transcript of discussion)
-
Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors
-
Virgil D. Gligor. Security of emergent properties in ad-hoc networks (transcript of discussion). In Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors, Security Protocols Workshop, volume 3957 of Lecture Notes in Computer Science, pages 256-266, 2004.
-
(2004)
Security Protocols Workshop, Volume 3957 of Lecture Notes in Computer Science
, pp. 256-266
-
-
Gligor, V.D.1
-
12
-
-
33745770376
-
A modular correctness proof of IEEE 802.11i and TLS
-
New York, NY, USA
-
Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, and John C. Mitchell. A modular correctness proof of IEEE 802.11i and TLS. In CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, pages 2-15, New York, NY, USA, 2005.
-
(2005)
CCS '05: Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 2-15
-
-
He, C.1
Sundararajan, M.2
Datta, A.3
Derek, A.4
Mitchell, J.C.5
-
16
-
-
84882715141
-
Distance bounding protocols: Authentication logic analysis and collusion attacks
-
Springer-Verlag, Series: Advances in Information Security, Poovendran, Radha; Wang, Cliff; Roy, Sumit Eds.
-
Catherine Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, and Paul Syverson. Distance bounding protocols: Authentication logic analysis and collusion attacks. In Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Springer-Verlag, Series: Advances in Information Security, Vol. 30 Poovendran, Radha; Wang, Cliff; Roy, Sumit (Eds.), 2007.
-
(2007)
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
, vol.30
-
-
Meadows, C.1
Poovendran, R.2
Pavlovic, D.3
Chang, L.4
Syverson, P.5
-
17
-
-
33750440529
-
A framework for security analysis of mobile wireless networks
-
Sebastian Nanz and Chris Hankin. A framework for security analysis of mobile wireless networks. Theoretical Computer Science, 367 (1):203-227, 2006.
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1
, pp. 203-227
-
-
Nanz, S.1
Hankin, C.2
-
18
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
New York, NY, USA, ACM
-
James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig. The sybil attack in sensor networks: analysis & defenses. In IPSN '04: Proceedings of the third international symposium on Information processing in sensor networks, pages 259-268, New York, NY, USA, 2004. ACM.
-
(2004)
IPSN '04: Proceedings of the Third International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
19
-
-
51749101324
-
How to specify and how to prove correctness of secure routing protocols for MANET
-
Panagiotis Papadimitratos, Zygmunt Haas, and Jean-Pierre Hubaux. How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET. In IEEE-CS Third International Conference on BroadBand Communcations, Networks, and Systems, 2006.
-
(2006)
IEEE-CS Third International Conference on BroadBand Communcations, Networks, and Systems
-
-
Papadimitratos, P.1
Haas, Z.2
Hubaux, J.3
-
20
-
-
51749088454
-
Secure neighborhood discovery: A fundamental element for mobile ad hoc networking
-
February
-
Panos Papadimitratos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David Basin, Srdjan Čapkun, and Jean-Pierre Hubaux. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking. IEEE Communications Magazine, February 2008.
-
(2008)
IEEE Communications Magazine
-
-
Papadimitratos, P.1
Poturalski, M.2
Schaller, P.3
Lafourcade, P.4
Basin, D.5
Čapkun, S.6
Hubaux, J.7
-
22
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
Radha Poovendran and Loukas Lazos. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13 (1):27-59, 2007.
-
(2007)
Wireless Networks
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
23
-
-
52049110580
-
Secure neighbor discovery in wireless networks: Formal investigation of possiblity
-
Marcin Poturalski, Panos Papadimitratos, and Jean-Pierre Hubaux. Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possiblity. Technical report, EPFL, 2007.
-
(2007)
Technical Report, EPFL
-
-
Poturalski, M.1
Papadimitratos, P.2
Hubaux, J.3
-
24
-
-
51349107820
-
Implications of radio fingerprinting on the security of sensor networks
-
ETH Zürich
-
Kasper Bonne Rasmussen and Srdjan Čapkun. Implications of radio fingerprinting on the security of sensor networks. Technical Report 536, ETH Zürich, 2006.
-
(2006)
Technical Report
, vol.536
-
-
Rasmussen, K.B.1
Čapkun, S.2
-
25
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
New York, NY, USA
-
Jason Reid, Juan M. Gonzalez Nieto, Tee Tang, and Bouchra Senadji. Detecting relay attacks with timing-based protocols. In ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pages 204-213, New York, NY, USA, 2007.
-
(2007)
ASIACCS '07: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security
, pp. 204-213
-
-
Reid, J.1
Nieto, J.M.G.2
Tang, T.3
Senadji, B.4
-
26
-
-
1542317849
-
Secure verification of location claims
-
New York, NY, USA, ACM
-
Naveen Sastry, Umesh Shankar, and David Wagner. Secure verification of location claims. In WiSe '03: Proceedings of the 2nd ACM workshop on Wireless security, pages 1-10, New York, NY, USA, 2003. ACM.
-
(2003)
WiSe '03: Proceedings of the 2nd ACM Workshop on Wireless Security
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
27
-
-
4043157158
-
An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions
-
29, July
-
Önder H. Tekbaş, Nur Serinken, and Oktay Üreten. An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions. IEEE Canadian Journal of Electrical and Computer Engineering, 29, July 2004.
-
(2004)
IEEE Canadian Journal of Electrical and Computer Engineering
-
-
Tekbas, N.O.1
Serinken, N.2
Üreten, O.3
-
28
-
-
4544259841
-
SECTOR: Secure tracking of node encounters in multi-hop wireless networks
-
New York, NY, USA
-
Srdjan Čapkun, Levente Buttyán, and Jean-Pierre Hubaux. SECTOR: secure tracking of node encounters in multi-hop wireless networks. In SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 21-32, New York, NY, USA, 2003.
-
(2003)
SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 21-32
-
-
Čapkun, S.1
Buttyán, L.2
Hubaux, J.3
-
31
-
-
4544302090
-
Modeling vulnerabilities of ad hoc routing protocols
-
New York, NY, USA
-
Shahan Yang and John S. Baras. Modeling vulnerabilities of ad hoc routing protocols. In SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 12-20, New York, NY, USA, 2003.
-
(2003)
SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 12-20
-
-
Yang, S.1
Baras, J.S.2
|