default search action
ACM Workshop on Wireless Security 2005: Cologne, Germany
- Markus Jakobsson, Radha Poovendran:
Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005. ACM 2005, ISBN 1-59593-142-2
Key management
- Li Zhou, Jinfeng Ni, Chinya V. Ravishankar:
Efficient key establishment for group-based wireless sensor deployments. 1-10 - Donggang Liu, Peng Ning, Wenliang Du:
Group-based key pre-distribution in wireless sensor networks. 11-20 - Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald:
Fully self-organized peer-to-peer key management for mobile ad hoc networks. 21-30 - Jean-Pierre Hubaux:
The security of vehicular networks. 31-32
Misbehavior
- Svetlana Radosavac, John S. Baras, Iordanis Koutsopoulos:
A framework for MAC protocol misbehavior detection in wireless networks. 33-42 - Yi-an Huang, Wenke Lee:
Hotspot-based traceback for mobile ad hoc networks. 43-54 - Virgil D. Gligor:
Emergent properties in ad-hoc networks: a security perspective. 55
Security analysis
- Geir M. Køien:
Privacy enhanced cellular access security. 57-66 - Ari Juels:
Strengthening EPC tags against cloning. 67-76 - James W. Mickens, Brian D. Noble:
Modeling epidemic spreading in mobile environments. 77-86
Synchronization
- Jiejun Kong, Zhengrong Ji, Weichao Wang, Mario Gerla, Rajive L. Bagrodia, Bharat K. Bhargava:
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. 87-96 - Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, Mani B. Srivastava:
Secure time synchronization service for sensor networks. 97-106
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.