-
1
-
-
84976295016
-
Distance-bounding protocols (extended abstract
-
Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: EUROCRYPT. (1993) 344-359
-
(1993)
Eurocrypt
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
4
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless networks. In: INFOCOM. (2003)
-
(2003)
Infocom
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
5
-
-
84876353503
-
-
Hu, Y.C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. [22] 30-40
-
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
, vol.22
, pp. 30-40
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
DOI 10.1016/S1570-8705(03)00008-8
-
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2-3) (2003) 293-315 (Pubitemid 40421415)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
7
-
-
4544259841
-
SECTOR: Secure tracking of node encounters in multi-hop wireless networks
-
Setia, S., Swarup, V., eds.
-
Čapkun, S., Buttyán, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In Setia, S., Swarup, V., eds.: SASN, ACM (2003) 21-32
-
(2003)
SASN, ACM
, pp. 21-32
-
-
Čapkun, S.1
Buttyán, L.2
Hubaux, J.P.3
-
8
-
-
0032165502
-
Designing a positioning system for finding things and people indoors
-
Werb, J., Lanzl, C.: Designing a positioning system for finding things and people indoors. IEEE Spectrum 35(9) (1998) 71-78
-
(1998)
IEEE Spectrum
, vol.35
, Issue.9
, pp. 71-78
-
-
Werb, J.1
Lanzl, C.2
-
9
-
-
0033872896
-
RADAR: An in-building RF-based user location and tracking system
-
Bahl, P., Padmanabhan, V.: RADAR: An in-building RF-based user location and tracking system. In: Nineteenth Annual Joint Conference of the IEEE Computer and Communication Society, IEEE (2000) 775-784 (Pubitemid 30584527)
-
(2000)
Proceedings - IEEE INFOCOM
, vol.2
, pp. 775-784
-
-
Bahl Paramvir1
Padmanabhan Venkata, N.2
-
10
-
-
33144467903
-
Attack-resistant location estimation in sensor networks
-
DOI 10.1109/IPSN.2005.1440904, 1440904, 2005 Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005
-
Liu, D., Ning, P., Du, W.: Attack-resistant location estimation in sensor networks. In: IPSN, IEEE (2005) 99-106 (Pubitemid 43841220)
-
(2005)
2005 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005
, vol.2005
, pp. 99-106
-
-
Liu, D.1
Ning, P.2
Du, W.K.3
-
11
-
-
27944459744
-
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
-
Liu, D., Ning, P., Du, W.: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: ICDCS, IEEE Computer Society (2005) 609-619
-
(2005)
ICDCS, IEEE Computer Society
, pp. 609-619
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
12
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
Čapkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: INFOCOM. (2005)
-
(2005)
Infocom
-
-
Čapkun, S.1
Hubaux, J.P.2
-
13
-
-
33144454801
-
Secure positioning in wireless networks
-
DOI 10.1109/JSAC.2005.861380
-
Čapkun, S., Hubaux, J.P.: Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications: Special Issue on Security in Wireless Ad Hoc Networks 24(2) (2006) 221-232 (Pubitemid 43269745)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 221-232
-
-
Capkun, S.1
-
16
-
-
84876394992
-
-
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. [22] 1-10
-
Secure Verification of Location Claims
, vol.22
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
17
-
-
33847329743
-
An RFID distance bounding protocol
-
Athens, Greece, 5-9 September 2005, IEEE Computer Society
-
Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: IEEE SecureComm 2005, Athens, Greece, 5-9 September 2005, IEEE Computer Society (2005) 67-73
-
(2005)
IEEE SecureComm 2005
, pp. 67-73
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
22
-
-
1542287663
-
Proceedings of the 2003 ACM workshop on wireless security
-
San Diego, CA, USA, September 19, 2003 In Maughan, W.D., Perrig, A., eds., ACM
-
Maughan, W.D., Perrig, A., eds.: Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003. In Maughan, W.D., Perrig, A., eds.: Workshop on Wireless Security, ACM (2003)
-
(2003)
Workshop on Wireless Security
-
-
Maughan, W.D.1
Perrig, A.2
-
23
-
-
84876361213
-
-
Crossbow Technology: MICA2 mote (2006) http://www.xbow.com/Products/ Product.pdf files/Wireless pdf/MICA2 Datasheet.pdf.
-
(2006)
Crossbow Technology: MICA2 Mote
-
-
|