-
1
-
-
60149088258
-
-
B. A.-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 401-410, New York, NY, USA, November 2007. ACM.
-
B. A.-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 401-410, New York, NY, USA, November 2007. ACM.
-
-
-
-
2
-
-
58049204211
-
Enabling Authentic Transmissions in WSNs - Turning Jamming against the Attacker
-
Orlando, FL, USA, October
-
A. Bachorek, I. Martinovic, and J. B. Schmitt. Enabling Authentic Transmissions in WSNs - Turning Jamming against the Attacker. In Proceedings of the IEEE ICNP 4th Annual Workshop on Secure Network Protocols (NPSec 2008), Orlando, FL, USA, October 2008.
-
(2008)
Proceedings of the IEEE ICNP 4th Annual Workshop on Secure Network Protocols (NPSec 2008)
-
-
Bachorek, A.1
Martinovic, I.2
Schmitt, J.B.3
-
3
-
-
48049094399
-
Detecting and localizing wireless spoofing attacks
-
May
-
Y Chen, W. Trappe, and R. Martin. Detecting and localizing wireless spoofing attacks. In Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, pages 193-202, May 2007.
-
(2007)
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks
, pp. 193-202
-
-
Chen, Y.1
Trappe, W.2
Martin, R.3
-
5
-
-
34247339387
-
Securing Wireless Systems Via Lower Layer Enforcements
-
September
-
Z. Li, W. Xu, R. Miller, and W. Trappe. Securing Wireless Systems Via Lower Layer Enforcements. In WiSe '06: Proceedings of the 5th ACM Workshop on Wireless Security, pages 33-42, September 2006.
-
(2006)
WiSe '06: Proceedings of the 5th ACM Workshop on Wireless Security
, pp. 33-42
-
-
Li, Z.1
Xu, W.2
Miller, R.3
Trappe, W.4
-
7
-
-
70349132332
-
Jamming for Good: A Fresh Approach to Authentic Communication in WSNs
-
Technical Report, University of Kaiserslautern, Germany, July
-
I. Martinovic, P. Pichota, and J. B. Schmitt. Jamming for Good: A Fresh Approach to Authentic Communication in WSNs. Technical Report, University of Kaiserslautern, Germany, July 2008.
-
(2008)
-
-
Martinovic, I.1
Pichota, P.2
Schmitt, J.B.3
-
8
-
-
52049085664
-
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
-
Alexandria, VA, USA, March
-
I. Martinovic, F. Zdarsky, M. Wilhelm, C. Wegmann, and J. B. Schmitt. Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless. In Proc. ACM Conference on Wireless Network Security (WiSec 2008), pages 43-52, Alexandria, VA, USA, March 2008.
-
(2008)
Proc. ACM Conference on Wireless Network Security (WiSec 2008)
, pp. 43-52
-
-
Martinovic, I.1
Zdarsky, F.2
Wilhelm, M.3
Wegmann, C.4
Schmitt, J.B.5
-
9
-
-
60149097098
-
Radio-Telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel
-
ACM Press, September
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-Telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. In The 14th Annual International Conference on Mobile Computing and Networking (MobiCom). ACM Press, September 2008.
-
(2008)
The 14th Annual International Conference on Mobile Computing and Networking (MobiCom)
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
13
-
-
70349146321
-
-
Texas Instruments. 2.4 GHz IEEE 802.15.4/ZigBee-ready RF Transceiver, mar 2007.
-
Texas Instruments. 2.4 GHz IEEE 802.15.4/ZigBee-ready RF Transceiver, mar 2007.
-
-
-
-
14
-
-
33751031293
-
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
-
May
-
M. Čagalj, S. Čapkun, R. Rengaswamy, I. Tsigkogiannis, M. Srivastava, and J.-P. Hubaux. Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pages 280-294, May 2006.
-
(2006)
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06)
, pp. 280-294
-
-
Čagalj, M.1
Čapkun, S.2
Rengaswamy, R.3
Tsigkogiannis, I.4
Srivastava, M.5
Hubaux, J.-P.6
|