default search action
4. WISEC 2011: Hamburg, Germany
- Dieter Gollmann, Dirk Westhoff, Gene Tsudik, N. Asokan:
Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. ACM 2011, ISBN 978-1-4503-0692-8
Keynote address
- Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede:
The communication and computation cost of wireless security: extended abstract. 1-4
WSN models and framework
- Phil Fazio, Keren Tan, Jihwang Yeo, David Kotz:
Short paper: the NetSANI framework for analysis and fine-tuning of network trace sanitization. 5-10 - Roberto Di Pietro, Nino Vincenzo Verde:
Epidemic data survivability in unattended wireless sensor networks. 11-22 - Emiliano De Cristofaro, Claudio Soriente:
Short paper: PEPSI - privacy-enhanced participatory sensing infrastructure. 23-28
Wireless jamming
- Sisi Liu, Loukas Lazos, Marwan Krunz:
Thwarting inside jamming attacks on wireless broadcast communications. 29-40 - Hossen Asiful Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu, Adrian Perrig:
Short paper: Jamming-resilient multipath routing leveraging availability-based correlation. 41-46 - Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders:
Short paper: reactive jamming in wireless networks: how realistic is the threat? 47-52
Monitoring and surveillance
- Md. Sohail Ahmad, Shashank Tadakamadla:
Short paper: security evaluation of IEEE 802.11w specification. 53-58 - Fan Zhang, Wenbo He, Xue Liu, Patrick G. Bridges:
Inferring users' online activities through traffic analysis. 59-70 - Patrick McHardy, Andreas Schuler, Erik Tews:
Interactive decryption of DECT phone calls. 71-78
Wireless jamming II
- Xi Tan, Kapil M. Borle, Wenliang Du, Biao Chen:
Cryptographic link signatures for spectrum usage authentication in cognitive radio. 79-90 - Robert D. Miller, Wade Trappe:
Short paper: ACE: authenticating the channel estimation process in wireless communication systems. 91-96 - Guevara Noubir, Rajmohan Rajaraman, Bo Sheng, Bishal Thapa:
On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming. 97-108
Mobile platforms and systems
- Steffen Schulz, Ahmad-Reza Sadeghi, Christian Wachsmann:
Short paper: lightweight remote attestation using physical functions. 109-114 - Jonathan Voris, Nitesh Saxena, Tzipora Halevi:
Accelerometers and randomness: perfect together. 115-126 - Hristo Bojinov, Dan Boneh, Rich Cannings, Iliyan Malchev:
Address space randomization for mobile devices. 127-138
Cryptographic authentication
- Isabelle Hang, Markus Ullmann, Christian Wieschebrink:
Short paper: a new identity-based DH key-agreement protocol for wireless sensor networks based on the Arazi-Qi scheme. 139-144 - Gildas Avoine, Cédric Lauradoux, Benjamin Martin:
How secret-sharing can defeat terrorist fraud. 145-156
VANETS
- Bisheng Liu, Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu:
Short paper: a practical view of "mixing" identities in vehicular networks. 157-162 - Hsu-Chun Hsiao, Ahren Studer, Rituik Dubey, Elaine Shi, Adrian Perrig:
Efficient and secure threshold-based event validation for VANETs. 163-174
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.