default search action
ACM Workshop on Wireless Security 2004: Philadelphia, PA, USA
- Markus Jakobsson, Adrian Perrig:
Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004. ACM 2004, ISBN 1-58113-925-X
Secure services
- George Theodorakopoulos, John S. Baras:
Trust evaluation in ad-hoc networks. 1-10 - Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-Rotaru:
JANUS: towards robust and malicious resilient routing in hybrid wireless networks. 11-20 - Loukas Lazos, Radha Poovendran:
SeRLoc: secure range-independent localization for wireless sensor networks. 21-30
Invited Presentation 1
- Ari Juels:
RFID: security and privacy for five-cent wireless devices. 31
Security analysis
- Naveen Sastry, David A. Wagner:
Security considerations for IEEE 802.15.4 networks. 32-42 - Changhua He, John C. Mitchell:
Analysis of the 802.11i 4-way handshake. 43-50
Attack detection
- Weichao Wang, Bharat K. Bhargava:
Visualization of wormholes in sensor networks. 51-60 - Bo Sun, Fei Richard Yu, Kui Wu, Victor C. M. Leung:
Mobility-based anomaly detection in cellular mobile networks. 61-69
Wireless monitoring and denial of service
- Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala:
A framework for wireless LAN monitoring and its applications. 70-79 - Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang:
Channel surfing and spatial retreats: defenses against wireless denial of service. 80-89 - Ulrike Meyer, Susanne Wetzel:
A man-in-the-middle attack on UMTS. 90-97
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.