default search action
6. WISEC 2013: Budapest, Hungary
- Levente Buttyán, Ahmad-Reza Sadeghi, Marco Gruteser:
Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013. ACM 2013, ISBN 978-1-4503-1998-0
Mobile device and application security
- Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Can Yildiz:
A pilot study on the security of pattern screen-lock methods and soft side channel attacks. 1-6 - Tim Stöber, Mario Frank, Jens B. Schmitt, Ivan Martinovic:
Who do you sync you are?: smartphone fingerprinting via application behaviour. 7-12 - Saurabh Chakradeo, Bradley Reaves, Patrick Traynor, William Enck:
MAST: triage for market-scale mobile malware analysis. 13-24 - Haoyu Li, Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu:
Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures. 25-30
Physical layer attacks and defenses
- Triet Vo Huu, Erik-Oliver Blass, Guevara Noubir:
Counter-jamming using mixed mechanical and software interference cancellation. 31-42 - Domenico Giustiniano, Vincent Lenders, Jens B. Schmitt, Michael Spuhler, Matthias Wilhelm:
Detection of reactive jamming in DSSS-based wireless networks. 43-48 - Shrikant Adhikarla, Min Suk Kang, Patrick Tague:
Selfish manipulation of cooperative cellular communications via channel fabrication. 49-54
Wireless protocol security
- René Hummen, Jens Hiller, Hanno Wirtz, Martin Henze, Hossein Shafagh, Klaus Wehrle:
6LoWPAN fragmentation attacks and mitigation mechanisms. 55-66 - Attila Altay Yavuz:
ETA: efficient and tiny and authentication for heterogeneous wireless systems. 67-72 - Ethmane El Moustaine, Maryline Laurent:
GPS+: a back-end coupons identification for low-cost RFID. 73-78 - Teng Wu, Guang Gong:
The weakness of integrity protection for LTE. 79-88
Privacy in wireless systems
- Alejandro Proaño, Loukas Lazos:
Perfect contextual information privacy in WSNs undercolluding eavesdroppers. 89-94 - Benjamin Henne, Christian Szongott, Matthew Smith:
SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it. 95-106 - Frank Kargl, Arik Friedman, Roksana Boreli:
Differential privacy in intelligent transportation systems. 107-112 - Gökay Saldamli, Richard Chow, Hongxia Jin, Bart P. Knijnenburg:
Private proximity testing with an untrusted server. 113-118
Design and testing of secure protocols
- Oscar García Morchon, Sye Loong Keoh, Sandeep S. Kumar, Pedro Moreno-Sanchez, Francisco Vidal-Meca, Jan Henrik Ziegeldorf:
Securing the IP-based internet of things with HIP and DTLS. 119-124 - Panagiotis Rizomiliotis, Stefanos Gritzalis:
Revisiting lightweight authentication protocols based on hard learning problems. 125-130 - Rens W. van der Heijden, Stefan Dietzel, Frank Kargl:
SeDyA: secure dynamic aggregation in VANETs. 131-142 - Md. Endadul Hoque, Hyojeong Lee, Rahul Potharaju, Charles E. Killian, Cristina Nita-Rotaru:
Adversarial testing of wireless routing implementations. 143-148
Establishing keys, trust, and identity
- Christine Hennebert, Hicham Hossayni, Cédric Lauradoux:
Entropy harvesting from physical sensors. 149-154 - Lu Shi, Jiawei Yuan, Shucheng Yu, Ming Li:
ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks. 155-166 - Yantian Hou, Ming Li, Joshua D. Guttman:
Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel. 167-178 - Marek Klonowski, Michal Koza:
Countermeasures against sybil attacks in WSN based on proofs-of-work. 179-184
Energy and distance bounding
- Sheng Wei, Jong Hoon Ahnn, Miodrag Potkonjak:
Energy attacks and defense techniques for wireless systems. 185-194 - Marc Fischlin, Cristina Onete:
Subtle kinks in distance-bounding: an analysis of prominent protocols. 195-206 - Jens Hermans, Roel Peeters, Cristina Onete:
Efficient, secure, private distance bounding without key updates. 207-218
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.