-
1
-
-
0003418699
-
Complex analysis: An introduction to the theory of analytic functions of one complex variable
-
McGraw-Hill
-
L. V. Ahlfors. Complex analysis: an introduction to the theory of analytic functions of one complex variable. International series in pure and applied mathematics. McGraw-Hill, 1979.
-
(1979)
International Series in Pure and Applied Mathematics
-
-
Ahlfors, L.V.1
-
2
-
-
84976826673
-
Voronoi diagrams-a survey of a fundamental geometric data structure
-
F. Aurenhammer. Voronoi diagrams-a survey of a fundamental geometric data structure. ACM Comput. Surv., 23(3):345-405, 1991.
-
(1991)
ACM Comput. Surv.
, vol.23
, Issue.3
, pp. 345-405
-
-
Aurenhammer, F.1
-
3
-
-
34848876390
-
The wireless network jamming problem
-
DOI 10.1007/s10878-007-9071-7
-
C. Commander, P. Pardalos, V. Ryabchenko, S. Uryasev, and G. Zrazhevsky. The wireless network jamming problem. J. Comb. Optim., 14(4):481-498, 2007. (Pubitemid 47507476)
-
(2007)
Journal of Combinatorial Optimization
, vol.14
, Issue.4
, pp. 481-498
-
-
Commander, C.W.1
Pardalos, P.M.2
Ryabchenko, V.3
Uryasev, S.4
Zrazhevsky, G.5
-
5
-
-
33747142749
-
The capacity of wireless networks
-
P. Gupta and P. R. Kumar. The capacity of wireless networks. IEEE T. Inform. Theory, 46(2):388-404, 2000.
-
(2000)
IEEE T. Inform. Theory
, vol.46
, Issue.2
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.R.2
-
6
-
-
76649135514
-
Physical layer security game: Interaction between source, eavesdropper, and friendly jammer
-
Jun.
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes. Physical layer security game: Interaction between source, eavesdropper, and friendly jammer. EURASIP J. Wirel. Comm., pp. 11:1-11:10, Jun. 2009.
-
(2009)
EURASIP J. Wirel. Comm.
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
7
-
-
38549131714
-
Vulnerabilities in first-generation RFID-enabled credit cards
-
Financial Cryptography and Data Security - 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Revised Selected Papers
-
T. Heydt-Benjamin, D. Bailey, K. Fu, A. Juels, and T. O'Hare. Vulnerabilities in first-generation rfid-enabled credit cards. In Financial Cryptography and Data Security, vol. 4886 of LNCS, pp. 2-14. Springer, 2007. (Pubitemid 351153038)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4886 LNCS
, pp. 2-14
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
O'Hare, T.5
-
8
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
A. Juels. Rfid security and privacy: a research survey. IEEE J. Sel. Area. Comm., 24(2):381-394, 2006. (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
12
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
L. Lai and H. El Gamal. The relay-eavesdropper channel: Cooperation for secrecy. IEEE T. Inform. Theory, 54(9):4005 -4019, 2008.
-
(2008)
IEEE T. Inform. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
13
-
-
0002058718
-
Generalization of voronoi diagrams in the plane
-
D. T. Lee and R. L. Drysdale. Generalization of voronoi diagrams in the plane. SIAM J. Comput., 10(1):73-87, 1981.
-
(1981)
SIAM J. Comput.
, vol.10
, Issue.1
, pp. 73-87
-
-
Lee, D.T.1
Drysdale, R.L.2
-
14
-
-
20544447851
-
Codeblue: An ad hoc sensor network infrastructure for emergency medical care
-
D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton. Codeblue: An ad hoc sensor network infrastructure for emergency medical care. In Proc. 1st Int. Workshop on Wearable and Implantable Body Sensor Networks, pp. 55-58, 2004.
-
(2004)
Proc. 1st Int. Workshop on Wearable and Implantable Body Sensor Networks
, pp. 55-58
-
-
Malan, D.1
Fulford-Jones, T.2
Welsh, M.3
Moulton, S.4
-
16
-
-
34247106132
-
Living assistance systems: An ambient intelligence approach
-
J. Nehmer, M. Becker, A. Karshmer, and R. Lamm. Living assistance systems: an ambient intelligence approach. In Proc. 28th Int. Conf. on Software Engineering, pp. 43-50, 2006.
-
(2006)
Proc. 28th Int. Conf. on Software Engineering
, pp. 43-50
-
-
Nehmer, J.1
Becker, M.2
Karshmer, A.3
Lamm, R.4
-
18
-
-
33750291916
-
RFID systems: A survey on security threats and proposed solutions
-
Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings
-
P. Peris-Lopez, J. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda. Rfid systems: A survey on security threats and proposed solutions. In Personal Wireless Communications, vol. 4217 of LNCS, pp. 159-170. Springer, 2006. (Pubitemid 44617810)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4217 LNCS
, pp. 159-170
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
19
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53-57, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
22
-
-
77956873542
-
A survey on key management mechanisms for distributed wireless sensor networks
-
M. Simplício Jr., P. Barreto, C. Margi, and T. Carvalho. A survey on key management mechanisms for distributed wireless sensor networks. Comp. Netw., 54(15):2591-2612, 2010.
-
(2010)
Comp. Netw.
, vol.54
, Issue.15
, pp. 2591-2612
-
-
Simplício Jr., M.1
Barreto, P.2
Margi, C.3
Carvalho, T.4
-
23
-
-
79955491895
-
Interference assisted secret communication
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor. Interference assisted secret communication. IEEE T. Inform. Theory, 57(5):3153-3167, 2011.
-
(2011)
IEEE T. Inform. Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
25
-
-
79957465600
-
Wireless secrecy regions with friendly jamming
-
J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin. Wireless secrecy regions with friendly jamming. IEEE T. Inf. Foren. Sec., 6(2):256-266, 2011.
-
(2011)
IEEE T. Inf. Foren. Sec.
, vol.6
, Issue.2
, pp. 256-266
-
-
Vilela, J.P.1
Bloch, M.2
Barros, J.3
McLaughlin, S.W.4
-
26
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Y. Wang, G. Attebury, and B. Ramamurthy. A survey of security issues in wireless sensor networks. IEEE Communications Surveys Tutorials, 8(2):2-23, 2006.
-
(2006)
IEEE Communications Surveys Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
|