-
4
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
M. Strasser, C. Pöpper, S. Čapkun, and M. Čagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE Symposium on Security and Privacy, 2008.
-
(2008)
Proc. IEEE Symposium on Security and Privacy
-
-
Strasser, M.1
Pöpper, C.2
Čapkun, S.3
Čagalj, M.4
-
6
-
-
47349115740
-
Performance of DSSS against repeater jamming
-
W. Hang, W. Zanji, and G. Jingbo, "Performance of DSSS against repeater jamming," in Proc. IEEE International Conference on Electronics, Circuits and Systems (ICECS), pp. 858-861, 2006.
-
(2006)
Proc. IEEE International Conference on Electronics, Circuits and Systems (ICECS)
, pp. 858-861
-
-
Hang, W.1
Zanji, W.2
Jingbo, G.3
-
8
-
-
24144480841
-
Accumulators from bilinear pairings and applications
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
L. Nguyen, "Accumulators from Bilinear Pairings and Applications," in Topics in Cryptology - CT-RSA, vol. 3376/2005 of Lecture Notes in Computer Science, pp. 275-292, Springer Berlin / Heidelberg, 2005. (Pubitemid 41231217)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 275-292
-
-
Nguyen, L.1
-
9
-
-
84957360970
-
Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees
-
Advances in Cryptology - Eurocrypt '97
-
N. Bari and B. Pfitzmann, "Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees," in Advances in Cryptology EUROCRYPT, vol. 1233/1997 of Lecture Notes in Computer Science, pp. 480-494, Springer Berlin / Heidelberg, 1997. (Pubitemid 127067821)
-
(1997)
Lecture Notes in Computer Science
, Issue.1233
, pp. 480-494
-
-
Baric, N.1
Pfitzmann, B.2
-
11
-
-
28444495509
-
An evolutionary approach to designing complex spreading codes for DS-CDMA
-
DOI 10.1109/TWC.2005.853826
-
B. Natarajan, S. Das, and D. Stevens, "An evolutionary approach to designing complex spreading codes for DS-CDMA," IEEE Trans. Wireless Commun., vol. 4, no. 5, pp. 2051-2056, 2005. (Pubitemid 41729713)
-
(2005)
IEEE Transactions on Wireless Communications
, vol.4
, Issue.5
, pp. 2051-2056
-
-
Natarajan, B.1
Das, S.2
Stevens, D.3
-
12
-
-
0019021287
-
Crosscorrelation properties of pseudorandom and related sequences
-
May
-
D. V. Sarwate and M. B. Pursley, "Crosscorrelation properties of pseudorandom and related sequences," in Proc. IEEE, vol. 68, pp. 593-619, May 1980.
-
(1980)
Proc. IEEE
, vol.68
, pp. 593-619
-
-
Sarwate, D.V.1
Pursley, M.B.2
-
14
-
-
84855469781
-
-
"GNU Radio Software." http://gnuradio.org/trac.
-
-
-
-
16
-
-
84855440565
-
-
U. Government, "Global positioning system." http://www.gps.gov, 2009.
-
(2009)
-
-
Government, U.1
-
19
-
-
25844454876
-
An asymmetric security mechanism for navigation signals
-
M. Kuhn, "An asymmetric security mechanism for navigation signals," in Proc. Information Hiding Workshop, 2004.
-
(2004)
Proc. Information Hiding Workshop
-
-
Kuhn, M.1
-
20
-
-
37749043207
-
SecNav: Secure broadcast localization and time synchronization in wireless networks
-
K. B. Rasmussen, S. Čapkun, and M. Čagalj, "SecNav: Secure broadcast localization and time synchronization in wireless networks," in Proc. Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 310-313, 2007.
-
(2007)
Proc. Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 310-313
-
-
Rasmussen, K.B.1
Čapkun, S.2
Čagalj, M.3
-
22
-
-
70450252080
-
Attacks on public WLAN-based positioning
-
N. O. Tippenhauer, K. B. Rasmussen, C. Pöpper, and S. Čapkun, "Attacks on public WLAN-based positioning," in Proc. ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), 2009.
-
(2009)
Proc. ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys)
-
-
Tippenhauer, N.O.1
Rasmussen, K.B.2
Pöpper, C.3
Čapkun, S.4
-
24
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2005.
-
(2005)
Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
26
-
-
33845635202
-
Wormhole-based antijamming techniques in sensor networks
-
DOI 10.1109/TMC.2007.250674
-
M. Čagalj, S. Čapkun, and J.-P. Hubaux, "Wormhole-based antijamming techniques in sensor networks," IEEE Trans. Mobile Comput., vol. 6, no. 1, pp. 100-114, 2007. (Pubitemid 44955817)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.1
, pp. 100-114
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.-P.3
-
27
-
-
0036793924
-
Denial of service in sensor networks
-
DOI 10.1109/MC.2002.1039518
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, pp. 54-62, Oct. 2002. (Pubitemid 35186161)
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
29
-
-
84890457246
-
Broadcast anti-jamming systems
-
Y. Desmedt, R. Safavi-Naini, H. Wang, C. Charnes, and J. Pieprzyk, "Broadcast anti-jamming systems," in Proc. IEEE International Conference on Networks (ICON), p. 349, 1999.
-
(1999)
Proc. IEEE International Conference on Networks (ICON)
, pp. 349
-
-
Desmedt, Y.1
Safavi-Naini, R.2
Wang, H.3
Charnes, C.4
Pieprzyk, J.5
-
30
-
-
29844445404
-
Low-power DoS attacks in data wireless LANs and countermeasures
-
G. Noubir and G. Lin, "Low-power DoS attacks in data wireless LANs and countermeasures," SIGMOBILE Mobile Computing and Communications Review, vol. 7, no. 3, pp. 29-30, 2003.
-
(2003)
SIGMOBILE Mobile Computing and Communications Review
, vol.7
, Issue.3
, pp. 29-30
-
-
Noubir, G.1
Lin, G.2
-
33
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun, "Loud and clear: Human-verifiable authentication based on audio," in Proc. IEEE International Conference on Distributed Computing Systems, 2006.
-
(2006)
Proc. IEEE International Conference on Distributed Computing Systems
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
34
-
-
34247391971
-
Integrity regions: Authentication through presence in wireless networks
-
DOI 10.1145/1161289.1161291, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
S. Čapkun and M. Čagalj, "Integrity regions: authentication through presence in wireless networks," in Proc. 5th ACM workshop on Wireless Security (WiSe), pp. 1-10, 2006. (Pubitemid 46634296)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 1-10
-
-
Capkun, S.1
Cagalj, M.2
-
35
-
-
23944521144
-
Manual authentication for wireless devices
-
C. Gehrmann, C. J. Mitchell, and K. Nyberg, "Manual authentication for wireless devices," RSA Cryptobytes, vol. 7, no. 1, 2004.
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
-
-
Gehrmann, C.1
Mitchell, C.J.2
Nyberg, K.3
-
36
-
-
48749133065
-
Keyless jam resistance
-
June
-
L. C. Baird, W. L. Bahn, M. D. Collins, M. C. Carlisle, and S. C. Butler, "Keyless jam resistance," in Proc. IEEE Information Assurance and Security Workshop (IAW), pp. 143-150, June 2007.
-
(2007)
Proc. IEEE Information Assurance and Security Workshop (IAW)
, pp. 143-150
-
-
Baird, L.C.1
Bahn, W.L.2
Collins, M.D.3
Carlisle, M.C.4
Butler, S.C.5
-
37
-
-
57549101228
-
Secure communication over radio channels
-
S. Dolev, S. Gilbert, R. Guerraoui, and C. Newport, "Secure communication over radio channels," in Proc. 27th ACM symposium on Principles of Distributed Computing (PODC), 2008.
-
(2008)
Proc. 27th ACM Symposium on Principles of Distributed Computing (PODC)
-
-
Dolev, S.1
Gilbert, S.2
Guerraoui, R.3
Newport, C.4
-
38
-
-
77953998228
-
Zero pre-shared secret key establishment in the presence of jammers
-
ACM Press
-
T. Jin, G. Noubir, and B. Thapa, "Zero pre-shared secret key establishment in the presence of jammers," in Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 219-228, ACM Press, 2009.
-
(2009)
Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 219-228
-
-
Jin, T.1
Noubir, G.2
Thapa, B.3
-
40
-
-
38049032492
-
Gossiping in a multi-channel radio network (an oblivious approach to coping with malicious interference)
-
S. Dolev, S. Gilbert, R. Guerraoui, and C. Newport, "Gossiping in a multi-channel radio network (an oblivious approach to coping with malicious interference)," in Proc. 21st International Symposium on Distributed Computing (DISC), pp. 208-222, 2007.
-
(2007)
Proc. 21st International Symposium on Distributed Computing (DISC)
, pp. 208-222
-
-
Dolev, S.1
Gilbert, S.2
Guerraoui, R.3
Newport, C.4
-
41
-
-
68749121136
-
Speed dating despite jammers
-
D. Meier, Y. A. Pignolet, S. Schmid, and R. Wattenhofer, "Speed dating despite jammers," in Proc. IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), 2009.
-
(2009)
Proc. IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)
-
-
Meier, D.1
Pignolet, Y.A.2
Schmid, S.3
Wattenhofer, R.4
-
42
-
-
58549116731
-
Of malicious motes and suspicious sensors
-
S. Gilbert, R. Guerraoui, and C. Newport, "Of Malicious Motes and Suspicious Sensors," Theoretical Computer Science, vol. 410, no. 6-7, pp. 546-569, 2009.
-
(2009)
Theoretical Computer Science
, vol.410
, Issue.6-7
, pp. 546-569
-
-
Gilbert, S.1
Guerraoui, R.2
Newport, C.3
|