-
3
-
-
85165837957
-
-
Davidoff, S.: GPS spoofing (2008), http://philosecurity.org/2008/09/07/ gps-spoofing
-
(2008)
GPS Spoofing
-
-
Davidoff, S.1
-
4
-
-
84890457246
-
Broadcast anti-jamming systems
-
Desmedt, Y., Safavi-Naini, R., Wang, H., Charnes, C., Pieprzyk, J.: Broadcast anti-jamming systems. In: Proceedings of the IEEE International Conference on Networks, ICON (1999)
-
(1999)
Proceedings of the IEEE International Conference on Networks, ICON
-
-
Desmedt, Y.1
Safavi-Naini, R.2
Wang, H.3
Charnes, C.4
Pieprzyk, J.5
-
8
-
-
0004415562
-
-
Technical Report 2000-02-02, University ofWashington
-
Hightower, J., Borriello, G., Want, R.: SpotON: An indoor 3D location sensing technology based on RF signal strength. Technical Report 2000-02-02, University ofWashington (2000)
-
(2000)
SpotON: An Indoor 3D Location Sensing Technology Based on RF Signal Strength
-
-
Hightower, J.1
Borriello, G.2
Want, R.3
-
9
-
-
69949156439
-
Assessing the spoofing threat: Development of a portable GPS civilian spoofer
-
Humphreys, T.E., Ledvina, B.M., Psiaki, M.L., O'Hanlon, B.W., Kintner Jr., P.M.: Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In: Proceedings of the ION GNSS International Technical Meeting of the Satellite Division (2008)
-
(2008)
Proceedings of the ION GNSS International Technical Meeting of the Satellite Division
-
-
Humphreys, T.E.1
Ledvina, B.M.2
Psiaki, M.L.3
O'Hanlon, B.W.4
Kintner Jr., P.M.5
-
10
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom (2009)
-
(2009)
Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
11
-
-
77953998228
-
Zero pre-shared secret key establishment in the presence of jammers
-
ACM Press, New York
-
Jin, T., Noubir, G., Thapa, B.: Zero pre-shared secret key establishment in the presence of jammers. In: Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). ACM Press, New York (2009)
-
(2009)
Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Jin, T.1
Noubir, G.2
Thapa, B.3
-
12
-
-
24944508408
-
Distillation codes and applications to DoS resistant multicast authentication
-
Karlof, C., Sastry, N., Li, Y., Perrig, A., Tygar, D.: Distillation codes and applications to DoS resistant multicast authentication. In: Proceedings of the Network and Distributed Systems Security Symposium, NDSS (2004)
-
(2004)
Proceedings of the Network and Distributed Systems Security Symposium, NDSS
-
-
Karlof, C.1
Sastry, N.2
Li, Y.3
Perrig, A.4
Tygar, D.5
-
13
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attacks and network defense policies in wireless sensor networks. In: Proceedings of the IEEE Conference on Computer Communications, InfoCom (2007)
-
(2007)
Proceedings of the IEEE Conference on Computer Communications, InfoCom
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
14
-
-
18844450713
-
On link layer denial of service in data wireless LANs: Research articles
-
Lin, G., Noubir, G.: On link layer denial of service in data wireless LANs: Research articles. Wireless Communications & Mobile Computing 5(3), 273-284 (2005)
-
(2005)
Wireless Communications & Mobile Computing
, vol.5
, Issue.3
, pp. 273-284
-
-
Lin, G.1
Noubir, G.2
-
15
-
-
78751527470
-
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
-
Liu, A., Ning, P., Dai, H., Liu, Y.: Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. In: Proceedings of Annual Computer Security Applications Conference, ACSAC (2010)
-
(2010)
Proceedings of Annual Computer Security Applications Conference, ACSAC
-
-
Liu, A.1
Ning, P.2
Dai, H.3
Liu, Y.4
-
16
-
-
77953306472
-
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
-
Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized differential DSSS: Jamming-resistant wireless broadcast communication. In: Proceedings of the IEEE Conference on Computer Communications, InfoCom (2010)
-
(2010)
Proceedings of the IEEE Conference on Computer Communications, InfoCom
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
22
-
-
70350525196
-
Modeling and verifying physical properties of security protocols for wireless networks
-
Schaller, P., Schmidt, B., Basin, D., Čapkun, S.: Modeling and verifying physical properties of security protocols for wireless networks. In: Proceedings of the IEEE Computer Security Foundations Symposium (2009)
-
(2009)
Proceedings of the IEEE Computer Security Foundations Symposium
-
-
Schaller, P.1
Schmidt, B.2
Basin, D.3
Čapkun, S.4
-
23
-
-
34547481864
-
Experimental study of concurrent transmission in wireless sensor networks
-
Son, D., Krishnamachari, B., Heidemann, J.: Experimental study of concurrent transmission in wireless sensor networks. In: Proceedings of the ACM Conference on Networked Sensor Systems, SenSys (2006)
-
(2006)
Proceedings of the ACM Conference on Networked Sensor Systems, SenSys
-
-
Son, D.1
Krishnamachari, B.2
Heidemann, J.3
-
24
-
-
77956561765
-
Detection of reactive jamming in sensor networks
-
Strasser, M., Danev, B., Čapkun, S.: Detection of reactive jamming in sensor networks. ACM Transactions on Sensor Networks 7, 16:1-16:29 (2010)
-
(2010)
ACM Transactions on Sensor Networks
, vol.7
-
-
Strasser, M.1
Danev, B.2
Čapkun, S.3
-
25
-
-
50249175122
-
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
-
Strasser, M., Pöpper, C., Čapkun, S., Čagalj, M.: Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, S&P (2008)
-
(2008)
Proceedings of the IEEE Symposium on Research in Security and Privacy, S&P
-
-
Strasser, M.1
Pöpper, C.2
Čapkun, S.3
Čagalj, M.4
-
28
-
-
70450252080
-
Attacks on Public WLAN-based Positioning
-
Tippenhauer, N.O., Rasmussen, K.B., Pöpper, C., Čapkun, S.: Attacks on Public WLAN-based Positioning. In: Proceedings of the ACM Conference on Mobile Systems, Applications and Services, MobiSys (2009)
-
(2009)
Proceedings of the ACM Conference on Mobile Systems, Applications and Services, MobiSys
-
-
Tippenhauer, N.O.1
Rasmussen, K.B.2
Pöpper, C.3
Čapkun, S.4
-
30
-
-
33751031293
-
Integrity (I) Codes: Message Integrity Protection and Authentication over Insecure Channels
-
Čagalj, M., Hubaux, J.-P., Čapkun, S., Rengaswamy, R., Tsigkogiannis, I., Srivastava, M.: Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, S&P (2006)
-
(2006)
Proceedings of the IEEE Symposium on Research in Security and Privacy, S&P
-
-
Čagalj, M.1
Hubaux, J.-P.2
Čapkun, S.3
Rengaswamy, R.4
Tsigkogiannis, I.5
Srivastava, M.6
-
31
-
-
33845635202
-
Wormhole-based antijamming techniques in sensor networks
-
Čagalj, M., Čapkun, S., Hubaux, J.-P.: Wormhole-based antijamming techniques in sensor networks. IEEE Transactions on Mobile Computing 6(1), 100-114 (2007)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.1
, pp. 100-114
-
-
Čagalj, M.1
Čapkun, S.2
Hubaux, J.-P.3
-
33
-
-
33745136118
-
Exploiting the capture effect for collision detection and recovery
-
Whitehouse, K., Woo, A., Jiang, F., Polastre, J., Culler, D.: Exploiting the capture effect for collision detection and recovery. In: Proceedings of the IEEE workshop on Embedded Networked Sensors (EmNets) (2005)
-
(2005)
Proceedings of the IEEE Workshop on Embedded Networked Sensors (EmNets)
-
-
Whitehouse, K.1
Woo, A.2
Jiang, F.3
Polastre, J.4
Culler, D.5
-
34
-
-
80051886930
-
Reactive jamming in wireless networks: How realistic is the threat?
-
Wilhelm, M., Martinovic, I., Schmitt, J., Lenders, V.: Reactive jamming in wireless networks: How realistic is the threat? In: Proceedings of the forth ACM Conference onWireless Network Security, WiSec (2011)
-
(2011)
Proceedings of the Forth ACM Conference OnWireless Network Security, WiSec
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.3
Lenders, V.4
-
35
-
-
0036793924
-
Denial of service in sensor networks
-
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54-62 (2002)
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
36
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
Xiao, L., Greenstein, L., Mandayam, N., Trappe, W.: Fingerprints in the ether: Using the physical layer for wireless authentication. In: Proceedings of the IEEE International Conference on Communications, ICC (2007)
-
(2007)
Proceedings of the IEEE International Conference on Communications, ICC
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
37
-
-
85165840304
-
Channel surfing: Defending wireless sensor networks from jamming and interference
-
Xu, W., Trappe, W., Zhang, Y.: Channel surfing: defending wireless sensor networks from jamming and interference. In: Proceedings of the ACM Conference on Networked Sensor Systems, SenSys (2006)
-
(2006)
Proceedings of the ACM Conference on Networked Sensor Systems, SenSys
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
38
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc (2005)
-
(2005)
Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
|