-
2
-
-
84907691269
-
From IPv4 to IPv6 - Data security in the transition phase
-
Venice/Mestre, Italy
-
T. Bilski, "From IPv4 to IPv6 - Data Security in the Transition Phase", in Proc. 7th Int. Conf. Netw. Serv. ICNS 2011, Venice/Mestre, Italy, 2011, pp. 66-72.
-
(2011)
Proc. 7th Int. Conf. Netw. Serv. ICNS 2011
, pp. 66-72
-
-
Bilski, T.1
-
3
-
-
77958595094
-
Network performance issues in IP transition phase
-
Seoul, Korea 2010
-
T. Bilski, "Network performance issues in IP transition phase", in Proc. 6th Int. Conf. Netw. Comput. Adv. Inform. Manag. NCM 2010, Seoul, Korea, 2010, pp. 39-44, 2010.
-
(2010)
Proc. 6th Int. Conf. Netw. Comput. Adv. Inform. Manag. NCM 2010
, pp. 39-44
-
-
Bilski, T.1
-
4
-
-
69949156113
-
Physical layer attacks on unlinkability in wireless LANs
-
I. Goldberg and M. Atallah, Eds. LNCS, Berlin Heidelberg: Springer
-
K. Bauer, D. McCoy, B. Greenstein, D. Grunwald, and D. Sicker, "Physical layer attacks on unlinkability in wireless LANs", in Privacy Enhancing Technologies, I. Goldberg and M. Atallah, Eds. LNCS, vol. 5672. Berlin Heidelberg: Springer, 2009, pp. 108-127.
-
(2009)
Privacy Enhancing Technologies
, vol.5672
, pp. 108-127
-
-
Bauer, K.1
McCoy, D.2
Greenstein, B.3
Grunwald, D.4
Sicker, D.5
-
5
-
-
84907704085
-
Traffic analysis based on IP packet size
-
Silesian University of Technology Press, Gliwice, Poland
-
T. Bilski, "Traffic analysis based on IP packet size", Studia Informatica, vol. 32, no. 3A (98), Silesian University of Technology Press, Gliwice, Poland, pp. 167-176, 2011.
-
(2011)
Studia Informatica
, vol.32
, Issue.3-98 A
, pp. 167-176
-
-
Bilski, T.1
-
8
-
-
67649458219
-
Application classification using packet size distribution and port association
-
L. Ying-Dar et al., "Application classification using packet size distribution and port association", J. Netw. and Comp. Appl., vol. 32, no. 5, pp. 1023-1030, 2009.
-
(2009)
J. Netw. and Comp. Appl.
, vol.32
, Issue.5
, pp. 1023-1030
-
-
Ying-Dar, L.1
-
9
-
-
33646706570
-
Securing wireless mesh networks
-
B. Salem and J. P. Hubaux, "Securing wireless mesh networks", Wirel. Commun., vol. 13, no. 2, pp. 50-55, 2006.
-
(2006)
Wirel. Commun.
, vol.13
, Issue.2
, pp. 50-55
-
-
Salem, B.1
Hubaux, J.P.2
-
13
-
-
84907689848
-
Physical-layer security in OFDMA-based broadband wireless networks
-
Kioto, Japan
-
X. Wang, M. Tao, J. Mo, and Y. Xu, "Physical-layer security in OFDMA-based broadband wireless networks", in Proc. IEEE Int. Conf. Commun. ICC 2011, Kioto, Japan, 2011, pp. 1-5.
-
(2011)
Proc. IEEE Int. Conf. Commun. ICC 2011
, pp. 1-5
-
-
Wang, X.1
Tao, M.2
Mo, J.3
Xu, Y.4
-
14
-
-
84857778441
-
The energy impact of security mechanisms in modern mobile devices
-
Feb.
-
L. Caviglione and A. Merlo, "The energy impact of security mechanisms in modern mobile devices", Netw. Secur., Feb. 2012 [Online]. Available: http://www.ai-lab.it/merlo/publications/NS-2012.pdf
-
(2012)
Netw. Secur.
-
-
Caviglione, L.1
Merlo, A.2
-
15
-
-
84907702888
-
Tradeoffs between energy and security in wireless networks
-
F. C. Colon Osorio, E. Agu, and K. McKay, "Tradeoffs between energy and security in wireless networks", Worcester Polytechnic Institute, 2005 [Online]. Available: http://digitalcommons.wpi.edu/computerscience-pubs/67
-
(2005)
Worcester Polytechnic Institute
-
-
Colon Osorio, F.C.1
Agu, E.2
McKay, K.3
-
16
-
-
78751498804
-
Paranoid Android: Versatile protection for smartphones
-
Austin, TX, USA
-
G. Portokalidisi, P. Homburg, K. Anagnostakis, and H. Bos, "Paranoid Android: Versatile protection for smartphones", in Proc. 26th Ann. Comp. Secur. Appl. Conf., Austin, TX, USA, 2010, pp. 347-356.
-
(2010)
Proc. 26th Ann. Comp. Secur. Appl. Conf.
, pp. 347-356
-
-
Portokalidisi, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
18
-
-
84907693453
-
-
IETF, RFC 6697
-
Q. Wu, T. Taylor, Y. Nir, K. Hoeper, and S. Decugis, "Handover Keying (HOKEY) Architecture Design", IETF, RFC 6697, 2012.
-
(2012)
Handover Keying (HOKEY) Architecture Design
-
-
Wu, Q.1
Taylor, T.2
Nir, Y.3
Hoeper, K.4
Decugis, S.5
-
19
-
-
58149311082
-
Kerberized handover keying: A media-independent handover key management architecture
-
Kyoto, Japan
-
Y. Ohba, S. Das, and D. Ashutosh, "Kerberized handover keying: A media-independent handover key management architecture", in Proc. 2nd ACM Int. Worksh. Mobil. Evolv. Internet Archit. MobiArch 2007, Kyoto, Japan, 2007.
-
(2007)
Proc. 2nd ACM Int. Worksh. Mobil. Evolv. Internet Archit. MobiArch 2007
-
-
Ohba, Y.1
Das, S.2
Ashutosh, D.3
-
20
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages", IEEE Trans. Inform. Theory, vol. 24, no. 3, pp. 339-348, 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
21
-
-
84873731253
-
Transmit antenna selection for security enhancement in MIMO wiretap channels
-
N. Yang, P. Lep Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels", IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.1
, pp. 144-154
-
-
Yang, N.1
Lep Yeoh, P.2
Elkashlan, M.3
Schober, R.4
Collings, I.B.5
-
22
-
-
84881572098
-
Secure beamforming for MIMO two-way transmission with an untrusted relay
-
Shanghai, China
-
J. Mo, M. Tao, Y. Liu, B. Xia, and X. Ma, "Secure Beamforming for MIMO Two-Way Transmission with an Untrusted Relay", in Proc. IEEE Wirel. Commun. Netw. Conf. WCNC 2013, Shanghai, China, 2013, pp. 3279-3284.
-
(2013)
Proc. IEEE Wirel. Commun. Netw. Conf. WCNC 2013
, pp. 3279-3284
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
Xia, B.4
Ma, X.5
-
23
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI", IEEE Trans. Sig. Proces., vol. 59, no. 1, pp. 351-361, 2011.
-
(2011)
IEEE Trans. Sig. Proces.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
24
-
-
84863754970
-
Physical layer security of MIMO frequency selective channels by beamforming and noise generation
-
Barcelona, Spain
-
N. Romero-Zurita, M. Ghogho, and D. McLernon, "Physical layer security of MIMO frequency selective channels by beamforming and noise generation", in Proc. 19th Eur. Sig. Proces. Conf. EUSIPCO 2011, Barcelona, Spain, 2011, pp. 829-833.
-
(2011)
Proc. 19th Eur. Sig. Proces. Conf. EUSIPCO 2011
, pp. 829-833
-
-
Romero-Zurita, N.1
Ghogho, M.2
McLernon, D.3
-
25
-
-
27744504251
-
Collaborative beamforming for distributed wireless ad hoc sensor networks
-
H. Ochiai, P. Mitran, H. V. Poor, and V. Tarokh, "Collaborative beamforming for distributed wireless ad hoc sensor networks", IEEE Trans. Sig. Proces., vol. 53, no. 11, pp. 4110-4124, 2005.
-
(2005)
IEEE Trans. Sig. Proces.
, vol.53
, Issue.11
, pp. 4110-4124
-
-
Ochiai, H.1
Mitran, P.2
Poor, H.V.3
Tarokh, V.4
-
26
-
-
84870512709
-
Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
-
H. Wang, M. Luo, X. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI", IEEE Sig. Proces. Lett., vol. 20, no. 1, pp. 39-42, 2013.
-
(2013)
IEEE Sig. Proces. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.1
Luo, M.2
Xia, X.3
Yin, Q.4
-
27
-
-
34548146342
-
A human-verifiable authentication protocol using visible laser light
-
Vienna, Austria
-
R. Mayrhofer and M. Welch, "A human-verifiable authentication protocol using visible laser light", in Proc. 2nd Int. Conf. Availab., Reliab. Secur. ARES 2007, Vienna, Austria, 2007.
-
(2007)
Proc. 2nd Int. Conf. Availab., Reliab. Secur. ARES 2007
-
-
Mayrhofer, R.1
Welch, M.2
|