-
1
-
-
77952326651
-
On the reliability of wireless fingerprinting using clock skews
-
Hoboken, NJ, USA
-
Arackaparambil, C., Bratus, S., Shubina, A. and Kotz, D. (2010) 'On the reliability of wireless fingerprinting using clock skews', Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec), Hoboken, NJ, USA, pp.169-174.
-
(2010)
Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec)
, pp. 169-174
-
-
Arackaparambil, C.1
Bratus, S.2
Shubina, A.3
Kotz, D.4
-
2
-
-
0021372387
-
Linear time algorithms for two- and threevariable linear programs
-
Dyer, M.E. (1984) 'Linear time algorithms for two- and threevariable linear programs', SIAM Journal on Computing, Vol. 13, pp.31-45. (Pubitemid 15494572)
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.1
, pp. 31-45
-
-
Dyer, M.E.1
-
3
-
-
1542316037
-
The nesC language: A holistic approach to networked embedded systems
-
San Diego, CA, USA
-
Gay, D., Levis, P., von Behren, R., Welsh, M., Brewer, E. and Culler, D. (2003, June) 'The nesC language: a holistic approach to networked embedded systems', Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI 2003), San Diego, CA, USA, pp.1-11.
-
(2003)
Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI 2003)
, pp. 1-11
-
-
Gay, D.1
Levis, P.2
Von Behren, R.3
Welsh, M.4
Brewer, E.5
Culler, D.6
-
4
-
-
39049162016
-
PAST: Probabilistic authentication of sensor timestamps
-
11 December-15 December, Miami Beach, FL, USA
-
Gehani, A. and Chandra, S. (2006) 'PAST: probabilistic authentication of sensor timestamps', 22nd Annual Computer Security Applications Conference (ACSAC), 11 December-15 December, Miami Beach, FL, USA.
-
(2006)
22nd Annual Computer Security Applications Conference (ACSAC)
-
-
Gehani, A.1
Chandra, S.2
-
5
-
-
85180626613
-
Device identification via analog signal fingerprinting: A matched filter approach
-
February
-
Gerdes, R.M., Daniels, T.E., Mina, M. and Russel, S.F. (2006, February) 'Device identification via analog signal fingerprinting: a matched filter approach', Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS).
-
(2006)
Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Gerdes, R.M.1
Daniels, T.E.2
Mina, M.3
Russel, S.F.4
-
6
-
-
61649117595
-
Sundial: Using sunlight to reconstruct global timestamps
-
Cork, Ireland
-
Gupchup, J., Musaloiu-E, R., Szalay, A. and Terzis, A. (2009) 'Sundial: using sunlight to reconstruct global timestamps', Proceedings of the 6th European Conference on Wireless Sensor Networks (EWSN), Cork, Ireland, pp.183-198.
-
(2009)
Proceedings of the 6th European Conference on Wireless Sensor Networks (EWSN)
, pp. 183-198
-
-
Gupchup, J.1
Musaloiu, E.R.2
Szalay, A.3
Terzis, A.4
-
8
-
-
79960475451
-
Clock skew based node identification in wireless sensor networks
-
November, New Orleans, LO, USA
-
Huang, D.J., Teng, W-C., Wang, C-Y., Huang, H-Y. and Hellerstein, J.M. (2008, November) 'Clock skew based node identification in wireless sensor networks', Proceedings of the IEEE Globecom, New Orleans, LO, USA, pp.1-5.
-
(2008)
Proceedings of the IEEE Globecom
, pp. 1-5
-
-
Huang, D.J.1
Teng, W.-C.2
Wang, C.-Y.3
Huang, H.-Y.4
Hellerstein, J.M.5
-
9
-
-
60349083720
-
On fast and accurate detection of unauthorized wireless access points using clock skews
-
14-19 September, San Francisco, CA
-
Jana, S. and Kasera, S.K. (2008) 'On fast and accurate detection of unauthorized wireless access points using clock skews', ACM International Conference on Mobile Computing and Networking (MobiCom), 14-19 September, San Francisco, CA.
-
(2008)
ACM International Conference on Mobile Computing and Networking (MobiCom)
-
-
Jana, S.1
Kasera, S.K.2
-
10
-
-
27544460278
-
Remote physical device fingerprinting
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
Kohno, T., Broido, A. and Claffy, K.C. (2005) 'Remote physical device fingerprinting', Proceedings of IEEE Symposium on Security and Privacy, 8-9 May, pp.211-225. (Pubitemid 41543657)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Kohno, T.1
Broido, A.2
Claffy, K.3
-
11
-
-
79960544500
-
-
June
-
Levis, P. (2006, June) TinyOS programming. Available online at: http://wireless.cs.uh.edu/presentation/2006/07/tinyosprogramming- 1-0.pdf.
-
(2006)
-
-
Levis, P.1
-
12
-
-
34548321774
-
Detecting wormhole attacks in wireless networks using connectivity information
-
DOI 10.1109/INFCOM.2007.21, 4215603, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
Maheshwari, R., Gao, J. and Das, S.R. (2007) 'Detecting wormhole attacks in wireless networks using connectivity information', 26th IEEE INFOCOM, pp.107-115. (Pubitemid 47334221)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 107-115
-
-
Maheshwari, R.1
Gao, J.2
Das, S.R.3
-
16
-
-
0032660830
-
Estimation and removal of clock skew from network delay measurements
-
21-25 March, New York, USA
-
Moon, S.B., Skelly, P. and Towsley, D. (1999) 'Estimation and removal of clock skew from network delay measurements', Proceedings of the 18th Annual Joint Conference on Computer Communications Societies (IEEE Infocom), 21-25 March, New York, USA, pp.227-234.
-
(1999)
Proceedings of the 18th Annual Joint Conference on Computer Communications Societies (IEEE Infocom)
, pp. 227-234
-
-
Moon, S.B.1
Skelly, P.2
Towsley, D.3
-
17
-
-
34547339276
-
Hot or not: Revealing hidden services by their clock skew
-
DOI 10.1145/1180405.1180410, 1180410, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Murdoch, S.J. (2006, October) 'Hot or not: revealing hidden services by their clock skew', Proceedings of the 9th ACM Conference of the IEEE Computer and Communications Security (CCS '06), Alexandria, VA, USA, pp.27-36. (Pubitemid 47131353)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 27-36
-
-
Murdoch, S.J.1
-
18
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis & defenses
-
Berkeley, California, USA
-
Newsome, J., Shi, E., Song, D. and Perrig, A. (2004) 'The Sybil attack in sensor networks: analysis & defenses', Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN), Berkeley, California, USA, pp.259-268.
-
(2004)
Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
19
-
-
0032092064
-
On calibrating measurements of packet transit times
-
Paxson, V. (1998, June) On calibrating measurements of packet transit times, ACM SIGMETRICS '98 Performance Evaluation Review, Vol.26, No. 1, pp.11-21. (Pubitemid 128593218)
-
(1998)
Performance Evaluation Review
, vol.26
, Issue.1
, pp. 11-21
-
-
Paxson, V.1
-
20
-
-
51349157157
-
Implications of radio fingerprinting on the security of sensor networks
-
17-21 September, Nice, France
-
Rasmussen, K.B. and Capkun, S. (2007) 'Implications of radio fingerprinting on the security of sensor networks', International Conference on Security and Privacy in Communication Networks (SecureComm), 17-21 September, Nice, France, pp.331-340.
-
(2007)
International Conference on Security and Privacy in Communication Networks (SecureComm)
, pp. 331-340
-
-
Rasmussen, K.B.1
Capkun, S.2
-
23
-
-
65249165857
-
An improved clock-skew measurement technique for revealing hidden services
-
28 July-1 August
-
Zander, S. and Murdoch, S.J. (2008) 'An improved clock-skew measurement technique for revealing hidden services', 17th USENIX Security Symposium, 28 July-1 August
-
(2008)
17th USENIX Security Symposium
-
-
Zander, S.1
Murdoch, S.J.2
|