default search action
1. WISEC 2008: Alexandria, VA, USA
- Virgil D. Gligor, Jean-Pierre Hubaux, Radha Poovendran:
Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM 2008, ISBN 978-1-59593-814-5 - Ari Juels:
RFID security: in the shoulder and on the loading dock. 1
Authentication in wireless networks
- Qi Dong, Donggang Liu, Peng Ning:
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. 2-12 - Christoph Krauß, Markus Schneider, Claudia Eckert:
Defending against false-endorsement-based dos attacks in wireless sensor networks. 13-23 - Andrew Harding, Timothy W. van der Horst, Kent E. Seamons:
Wireless authentication using remote passwords. 24-29 - Benedikt Driessen, Axel Poschmann, Christof Paar:
Comparison of innovative signature algorithms for WSNs. 30-35
Device identification and privacy
- Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm, Christian Wegmann, Jens B. Schmitt:
Wireless client puzzles in IEEE 802.11 networks: security by wireless. 36-45 - Desmond Loh Chin Choong, Chia Yuan Cho, Chung Pheng Tan, Ri Seng Lee:
Identifying unique devices through wireless fingerprinting. 46-55 - Sergey Bratus, Cory Cornelius, David Kotz, Daniel Peebles:
Active behavioral fingerprinting of wireless devices. 56-61 - Zhiguo Wan, Kui Ren, Bart Preneel:
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. 62-67
Sensor network security
- Keith B. Frikken, Joseph A. Dougherty IV:
An efficient integrity-preserving scheme for hierarchical sensor aggregation. 68-76 - Yi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar, Guohong Cao:
Towards event source unobservability with minimum network traffic in sensor networks. 77-88 - Jing Dong, Kurt Erik Ackermann, Brett Bavar, Cristina Nita-Rotaru:
Mitigating attacks against virtual coordinate based routing in wireless sensor networks. 89-99
Key management
- Dennis K. Nilsson, Tanya G. Roosta, Ulf Lindqvist, Alfonso Valdes:
Key management and secure software updates in wireless process control environments. 100-108 - Youssef Hanna, Hridesh Rajan, Wensheng Zhang:
Slede: a domain-specific verification framework for sensor network security protocol implementations. 109-118 - Jiang Wu, Douglas R. Stinson:
Minimum node degree and kappa-connectivity for key predistribution schemes and distributed sensor networks. 119-124 - Cynthia Kuo, Ahren Studer, Adrian Perrig:
Mind your manners: socially appropriate wireless key establishment for groups. 125-130
RFID and embedded sensors
- Michael J. Ocean, Azer Bestavros:
Wireless and physical security via embedded sensor networks. 131-139 - Boyeon Song, Chris J. Mitchell:
RFID authentication protocol for low-cost tags. 140-147 - Chiu C. Tan, Haodong Wang, Sheng Zhong, Qun Li:
Body sensor network security: an identity-based cryptography approach. 148-153 - Leonardo A. Martucci, Markulf Kohlweiss, Christer Andersson, Andriy Panchenko:
Self-certified Sybil-free pseudonyms. 154-159
Panel
- Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback:
RFID security and privacy: long-term research or short-term tinkering? 160
Multi-hop applications and mal-packets
- Jens-Matthias Bohli, Alban Hessler, Osman Ugus, Dirk Westhoff:
A secure and resilient WSN roadside architecture for intelligent transport systems. 161-171 - Qijun Gu, Rizwan Noorani:
Towards self-propagate mal-packets in sensor networks. 172-182 - Hailun Tan, Sanjay K. Jha, Diethelm Ostry, John Zic, Vijay Sivaraman:
Secure multi-hop network programming with multiple one-way key chains. 183-193
Defensive techniques
- Gerhard P. Hancke, Markus G. Kuhn:
Attacks on time-of-flight distance bounding channels. 194-202 - Wenyuan Xu, Wade Trappe, Yanyong Zhang:
Anti-jamming timing channels for wireless networks. 203-213 - Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. 214-219 - Volker Roth, Wolfgang Polak, Eleanor Gilbert Rieffel, Thea Turner:
Simple and effective defense against evil twin access points. 220-235
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.