Sign in
Workshop on Wireless Security
2002
2003
2005
2006
2002
2006
Keyphrases
Publications
2006
Dijiang Huang
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems.
Workshop on Wireless Security
(2006)
Nicholas Tsougas
RFID security and privacy concerns.
Workshop on Wireless Security
(2006)
Daniel B. Faria
,
David R. Cheriton
Detecting identity-based attacks in wireless networks using signalprints.
Workshop on Wireless Security
(2006)
Jérémy Serror
,
Hui Zang
,
Jean-Chrysostome Bolot
Impact of paging channel overloads or attacks on a cellular network.
Workshop on Wireless Security
(2006)
Dave Singelée
,
Bart Preneel
Location privacy in wireless personal area networks.
Workshop on Wireless Security
(2006)
Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006
Workshop on Wireless Security
(2006)
Abhijit Bose
,
Kang G. Shin
Proactive security for mobile messaging networks.
Workshop on Wireless Security
(2006)
Arvind Seshadri
,
Mark Luk
,
Adrian Perrig
,
Leendert van Doorn
,
Pradeep K. Khosla
SCUBA: Secure Code Update By Attestation in sensor networks.
Workshop on Wireless Security
(2006)
Farooq Anjum
Location dependent key management using random key-predistribution in sensor networks.
Workshop on Wireless Security
(2006)
Kevin Kane
,
James C. Browne
Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks.
Workshop on Wireless Security
(2006)
Jiejun Kong
,
Xiaoyan Hong
,
Mario Gerla
Modeling Ad-hoc rushing attack in a negligibility-based security framework.
Workshop on Wireless Security
(2006)
Zang Li
,
Wenyuan Xu
,
Robert D. Miller
,
Wade Trappe
Securing wireless systems via lower layer enforcements.
Workshop on Wireless Security
(2006)
Adrian Perrig
Security in sensor networks: industry trends, present and future research directions.
Workshop on Wireless Security
(2006)
Srdjan Capkun
,
Mario Cagalj
Integrity regions: authentication through presence in wireless networks.
Workshop on Wireless Security
(2006)
2005
Saurabh Ganeriwal
,
Srdjan Capkun
,
Chih-Chieh Han
,
Mani B. Srivastava
Secure time synchronization service for sensor networks.
Workshop on Wireless Security
(2005)
Ari Juels
Strengthening EPC tags against cloning.
Workshop on Wireless Security
(2005)
James W. Mickens
,
Brian D. Noble
Modeling epidemic spreading in mobile environments.
Workshop on Wireless Security
(2005)
Donggang Liu
,
Peng Ning
,
Wenliang Du
Group-based key pre-distribution in wireless sensor networks.
Workshop on Wireless Security
(2005)
Svetlana Radosavac
,
John S. Baras
,
Iordanis Koutsopoulos
A framework for MAC protocol misbehavior detection in wireless networks.
Workshop on Wireless Security
(2005)
Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005
Workshop on Wireless Security
(2005)
Yi-an Huang
,
Wenke Lee
Hotspot-based traceback for mobile ad hoc networks.
Workshop on Wireless Security
(2005)
Johann van der Merwe
,
Dawoud S. Dawoud
,
Stephen McDonald
Fully self-organized peer-to-peer key management for mobile ad hoc networks.
Workshop on Wireless Security
(2005)
Jean-Pierre Hubaux
The security of vehicular networks.
Workshop on Wireless Security
(2005)
Virgil D. Gligor
Emergent properties in ad-hoc networks: a security perspective.
Workshop on Wireless Security
(2005)
Geir M. Køien
Privacy enhanced cellular access security.
Workshop on Wireless Security
(2005)
Jiejun Kong
,
Zhengrong Ji
,
Weichao Wang
,
Mario Gerla
,
Rajive L. Bagrodia
,
Bharat K. Bhargava
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks.
Workshop on Wireless Security
(2005)
Li Zhou
,
Jinfeng Ni
,
Chinya V. Ravishankar
Efficient key establishment for group-based wireless sensor deployments.
Workshop on Wireless Security
(2005)
2004
Naveen Sastry
,
David A. Wagner
Security considerations for IEEE 802.15.4 networks.
Workshop on Wireless Security
(2004)
Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004
Workshop on Wireless Security
(2004)
Ari Juels
RFID: security and privacy for five-cent wireless devices.
Workshop on Wireless Security
(2004)
Loukas Lazos
,
Radha Poovendran
SeRLoc: secure range-independent localization for wireless sensor networks.
Workshop on Wireless Security
(2004)
Bogdan Carbunar
,
Ioannis Ioannidis
,
Cristina Nita-Rotaru
JANUS: towards robust and malicious resilient routing in hybrid wireless networks.
Workshop on Wireless Security
(2004)
Weichao Wang
,
Bharat K. Bhargava
Visualization of wormholes in sensor networks.
Workshop on Wireless Security
(2004)
Jihwang Yeo
,
Moustafa Youssef
,
Ashok K. Agrawala
A framework for wireless LAN monitoring and its applications.
Workshop on Wireless Security
(2004)
Changhua He
,
John C. Mitchell
Analysis of the 802.11i 4-way handshake.
Workshop on Wireless Security
(2004)
Bo Sun
,
Fei Richard Yu
,
Kui Wu
,
Victor C. M. Leung
Mobility-based anomaly detection in cellular mobile networks.
Workshop on Wireless Security
(2004)
Ulrike Meyer
,
Susanne Wetzel
A man-in-the-middle attack on UMTS.
Workshop on Wireless Security
(2004)
George Theodorakopoulos
,
John S. Baras
Trust evaluation in ad-hoc networks.
Workshop on Wireless Security
(2004)
Wenyuan Xu
,
Timothy Wood
,
Wade Trappe
,
Yanyong Zhang
Channel surfing and spatial retreats: defenses against wireless denial of service.
Workshop on Wireless Security
(2004)
2003
Yih-Chun Hu
,
Adrian Perrig
,
David B. Johnson
Rushing attacks and defense in wireless ad hoc network routing protocols.
Workshop on Wireless Security
(2003)
Ping Tao
,
Algis Rudys
,
Andrew M. Ladd
,
Dan S. Wallach
Wireless LAN location-sensing for security applications.
Workshop on Wireless Security
(2003)
Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003
Workshop on Wireless Security
(2003)
Lein Harn
,
Wen-Jung Hsin
On the security of wireless network access with enhancements.
Workshop on Wireless Security
(2003)
Bo Sun
,
Kui Wu
,
Udo W. Pooch
Alert aggregation in mobile ad hoc networks.
Workshop on Wireless Security
(2003)
Panagiotis Papadimitratos
,
Zygmunt J. Haas
Secure data transmission in mobile ad hoc networks.
Workshop on Wireless Security
(2003)
Srdjan Capkun
,
Jean-Pierre Hubaux
BISS: building secure routing out of an incomplete set of security associations.
Workshop on Wireless Security
(2003)
Jiejun Kong
,
Shirshanka Das
,
Edward Tsai
,
Mario Gerla
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains.
Workshop on Wireless Security
(2003)
Mathias Bohge
,
Wade Trappe
An authentication framework for hierarchical ad hoc sensor networks.
Workshop on Wireless Security
(2003)
Sneha Kumar Kasera
,
Semyon Mizikovsky
,
Ganapathy S. Sundaram
,
Thomas Y. C. Woo
On securely enabling intermediary-based services and performance enhancements for wireless mobile users.
Workshop on Wireless Security
(2003)
Naveen Sastry
,
Umesh Shankar
,
David A. Wagner
Secure verification of location claims.
Workshop on Wireless Security
(2003)