-
1
-
-
77955288554
-
Record Setting Software Implementation of DES Using CUDA
-
IEEE Computer Society
-
G. Agosta, A. Barenghi, F. D. Santis, and G. Pelosi. Record Setting Software Implementation of DES Using CUDA. In Proceedings of the International Conference on Information Technology: New Generations, pages 748-755. IEEE Computer Society, 2010.
-
(2010)
Proceedings of the International Conference on Information Technology: New Generations
, pp. 748-755
-
-
Agosta, G.1
Barenghi, A.2
Santis, F. D.3
Pelosi, G.4
-
2
-
-
84874721375
-
-
Aircrack. Aircrack-ng. http://www.aircrack-ng.org/, 2012.
-
(2012)
Aircrack-ng
-
-
-
4
-
-
62849089985
-
Mitigating Evil Twin Attacks in 802.11
-
December
-
K. Bauer, H. Gonzales, and D. McCoy. Mitigating Evil Twin Attacks in 802.11. In Proceedings of the Performance, Computing and Communications Conference, pages 513-516, December 2008.
-
(2008)
Proceedings of the Performance, Computing and Communications Conference
, pp. 513-516
-
-
Bauer, K.1
Gonzales, H.2
McCoy, D.3
-
5
-
-
85180415005
-
-
BBN Technologies
-
BBN Technologies. 802.11b Transmitter/Receiver. https://www.cgran.org/wiki/BBN80211, 2008.
-
(2008)
802.11b Transmitter/Receiver
-
-
-
6
-
-
33751038485
-
The Final Nail in WEP's Coffin
-
0
-
A. Bittau, M. Handley, and J. Lackey. The Final Nail in WEP's Coffin. Security and Privacy, IEEE Symposium on, 0:386-400, 2006.
-
(2006)
Security and Privacy, IEEE Symposium on
, pp. 386-400
-
-
Bittau, A.1
Handley, M.2
Lackey, J.3
-
7
-
-
43949105260
-
Active behavioral fingerprinting of wireless devices
-
New York, NY, USA, ACM
-
S. Bratus, C. Cornelius, D. Kotz, and D. l. Peebles. Active behavioral fingerprinting of wireless devices. In Proceedings of the first ACM conference on Wireless network security, WiSec'08, pages 56-61, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the first ACM conference on Wireless network security, WiSec'08
, pp. 56-61
-
-
Bratus, S.1
Cornelius, C.2
Kotz, D.3
Peebles, D. l.4
-
10
-
-
77953853641
-
Shake them up!: a movement-based pairing protocol for cpu-constrained devices
-
C. Castelluccia and P. Mutaf. Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In MobiSys, pages 51-64, 2005.
-
(2005)
MobiSys
, pp. 51-64
-
-
Castelluccia, C.1
Mutaf, P.2
-
12
-
-
37749010823
-
Cross-layer jamming detection and mitigation in wireless broadcast networks
-
J. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proceedings of MobiCom, 2007.
-
(2007)
Proceedings of MobiCom
-
-
Chiang, J.1
Hu, Y.-C.2
-
14
-
-
84871954941
-
-
Comodo, Inc
-
Comodo, Inc. Comodo Report of Incident. https://www.comodo.com/Comodo-FraudIncident-2011-03-23.html, 2011.
-
(2011)
Comodo Report of Incident
-
-
-
15
-
-
33745223821
-
Wireless commons perils in the common good
-
February
-
J. Damsgaard, M. A. Parikh, and B. Rao. Wireless commons perils in the common good. Communications of the ACM, 49(2):104-109, February 2006.
-
(2006)
Communications of the ACM
, vol.49
, Issue.2
, pp. 104-109
-
-
Damsgaard, J.1
Parikh, M. A.2
Rao, B.3
-
20
-
-
77958042149
-
-
GNU Radio Project
-
GNU Radio Project. GNU Radio. http://gnuradio. org, 2012.
-
(2012)
GNU Radio
-
-
-
22
-
-
79551626084
-
Practical Defenses for Evil Twin Attacks in 802.11
-
December
-
H. Gonzales, K. Bauer, J. Lindqvist, D. McCoy, and D. Sicker. Practical Defenses for Evil Twin Attacks in 802.11. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), pages 1-6, December 2010.
-
(2010)
Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM)
, pp. 1-6
-
-
Gonzales, H.1
Bauer, K.2
Lindqvist, J.3
McCoy, D.4
Sicker, D.5
-
23
-
-
33947635594
-
Loud and Clear: Human-Verifiable Authentication Based on Audio
-
M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. Loud and Clear: Human-Verifiable Authentication Based on Audio. In Proceedings of the IEEE Internation Conference on Distributed Computing Systems, page 10, 2006.
-
(2006)
Proceedings of the IEEE Internation Conference on Distributed Computing Systems
, pp. 10
-
-
Goodrich, M.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
24
-
-
54049130356
-
Cryptanalysis with COPACOBANA
-
T. Guneysu, T. Kasper, M. Novotny, C. Paar, and A. Rupp. Cryptanalysis with COPACOBANA. IEEE Transactions on Computers, 57:1498-1513, 2008.
-
(2008)
IEEE Transactions on Computers
, vol.57
, pp. 1498-1513
-
-
Guneysu, T.1
Kasper, T.2
Novotny, M.3
Paar, C.4
Rupp, A.5
-
26
-
-
84970874882
-
-
IEEE. http://standards.ieee.org/about/get/802/802.11.html
-
IEEE. Standards for Wireless, Local, and Metropolitan Area Networks. http://standards.ieee.org/findstds/standard/802.1X-2010.html, http://standards.ieee.org/about/get/802/802.11.html, 2012.
-
(2012)
Standards for Wireless, Local, and Metropolitan Area Networks
-
-
-
27
-
-
41949126461
-
Why and How to Perform Fraud Experiments
-
March-April
-
M. Jakobsson, P. Finn, and N. Johnson. Why and How to Perform Fraud Experiments. Security & Privacy, IEEE, 6(2):66-68, March-April 2008.
-
(2008)
Security & Privacy, IEEE
, vol.6
, Issue.2
, pp. 66-68
-
-
Jakobsson, M.1
Finn, P.2
Johnson, N.3
-
29
-
-
77953306472
-
Randomized differential dsss: jamming-resistant wireless broadcast communication
-
Piscataway, NJ, USA, IEEE Press
-
Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential dsss: jamming-resistant wireless broadcast communication. In Proceedings of the 29th conference on Information communications, pages 695-703, Piscataway, NJ, USA, 2010. IEEE Press.
-
(2010)
Proceedings of the 29th conference on Information communications
, pp. 695-703
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
30
-
-
85180413224
-
-
M. Marlinspike. sslstrip. http://www.thoughtcrime.org/software/sslstrip/, 2012.
-
(2012)
sslstrip
-
-
Marlinspike, M.1
-
32
-
-
79961063540
-
ProxiMate: Proximity-based Secure Pairing using Ambient Wireless Signals
-
S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Madayam. ProxiMate: Proximity-based Secure Pairing using Ambient Wireless Signals. In International Conference on Mobile Systems, Applications, and Services (MOBISYS), 2011.
-
(2011)
International Conference on Mobile Systems, Applications, and Services (MOBISYS)
-
-
Mathur, S.1
Miller, R.2
Varshavsky, A.3
Trappe, W.4
Madayam, N.5
-
37
-
-
85180401326
-
-
Openwall Project
-
Openwall Project. John the Ripper. http://www.openwall.com/john/, 2012.
-
(2012)
John the Ripper
-
-
-
38
-
-
85180417546
-
-
OpenWRT Project
-
OpenWRT Project. OpenWRT. http://www.openwrt.org.
-
OpenWRT
-
-
-
39
-
-
76749132821
-
Ares: an anti-jamming reinforcement system for 802.11 networks
-
New York, NY, USA, ACM
-
K. Pelechrinis, I. Broustis, S. V. Krishnamurthy, and C. Gkantsidis. Ares: an anti-jamming reinforcement system for 802.11 networks. In Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT'09, pages 181-192, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT'09
, pp. 181-192
-
-
Pelechrinis, K.1
Broustis, I.2
Krishnamurthy, S. V.3
Gkantsidis, C.4
-
40
-
-
56649111524
-
Simple and effective defense against evil twin access points
-
New York, NY, USA, ACM
-
V. Roth, W. Polak, E. Rieffel, and T. Turner. Simple and effective defense against evil twin access points. In Proceedings of the ACM Conference on Wireless Network Security, pages 220-235, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the ACM Conference on Wireless Network Security
, pp. 220-235
-
-
Roth, V.1
Polak, W.2
Rieffel, E.3
Turner, T.4
-
46
-
-
85180405020
-
-
The Shmoo Group. IDN Homograph Attack. http://www.shmoo.com/idn, 2005.
-
(2005)
IDN Homograph Attack
-
-
-
48
-
-
70449688216
-
Password Cracking Using Probabilistic Context-Free Grammars
-
Oakland, CA USA, May IEEE Computer Society
-
M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek. Password Cracking Using Probabilistic Context-Free Grammars. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA USA, May 2009. IEEE Computer Society.
-
(2009)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Weir, M.1
Aggarwal, S.2
de Medeiros, B.3
Glodek, B.4
-
49
-
-
80051886930
-
Short paper: reactive jamming in wireless networks: how realistic is the threat?
-
New York, NY, USA, ACM
-
M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders. Short paper: reactive jamming in wireless networks: how realistic is the threat? In Proceedings of the fourth ACM conference on Wireless network security, WiSec'11, pages 47-52, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the fourth ACM conference on Wireless network security, WiSec'11
, pp. 47-52
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J. B.3
Lenders, V.4
-
52
-
-
51849119602
-
Defending wireless sensor networks from radio interference through channel adaptation
-
18: September
-
W. Xu, W. Trappe, and Y. Zhang. Defending wireless sensor networks from radio interference through channel adaptation. ACM Transactions on Sensor Networks, 4:18:1-18:34, September 2008.
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, pp. 1-18:34
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
|