default search action
Mario Cagalj
Person information
- affiliation: Swiss Federal Institute of Technology in Lausanne, Switzerland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j19]Dinko Zidic, Toni Mastelic, Ivana Nizetic Kosovic, Mario Cagalj, Josip Lorincz:
Analyses of ping-pong handovers in real 4G telecommunication networks. Comput. Networks 227: 109699 (2023) - 2022
- [j18]Jelena Culic Gambiroza, Toni Mastelic, Ivana Nizetic Kosovic, Mario Cagalj:
Dynamic monitoring frequency for energy-efficient data collection in Internet of Things. J. Comput. Sci. 64: 101842 (2022) - 2020
- [j17]Ante Dagelic, Mario Cagalj, Toni Perkovic, Marin Bilos:
Towards linking social media profiles with user's WiFi preferred network list. Ad Hoc Networks 107: 102244 (2020) - [j16]Jelena Culic Gambiroza, Toni Mastelic, Tonko Kovacevic, Mario Cagalj:
Predicting Low-Cost Gas Sensor Readings From Transients Using Long Short-Term Memory Neural Networks. IEEE Internet Things J. 7(9): 8451-8461 (2020) - [j15]Toni Perkovic, Ante Dagelic, Marin Bugaric, Mario Cagalj:
On WPA2-Enterprise Privacy in High Education and Science. Secur. Commun. Networks 2020: 3731529:1-3731529:11 (2020)
2010 – 2019
- 2019
- [j14]Toni Perkovic, Mario Cagalj, Tonko Kovacevic:
LISA: Visible light based initialization and SMS based authentication of constrained IoT devices. Future Gener. Comput. Syst. 97: 105-118 (2019) - 2018
- [j13]Ante Dagelic, Toni Perkovic, Bojan Vujatovic, Mario Cagalj:
SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists. Wirel. Commun. Mob. Comput. 2018: 5153265:1-5153265:15 (2018) - [j12]Toni Perkovic, Tonko Kovacevic, Mario Cagalj:
BlinkComm: Initialization of IoT Devices Using Visible Light Communication. Wirel. Commun. Mob. Comput. 2018: 8523078:1-8523078:16 (2018) - [c17]Hrvoje Rudes, Ivana Nizetic Kosovic, Toni Perkovic, Mario Cagalj:
Towards reliable IoT: Testing LoRa communication. SoftCOM 2018: 1-3 - 2016
- [j11]Tonko Kovacevic, Toni Perkovic, Mario Cagalj:
Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices. Secur. Commun. Networks 9(10): 1050-1071 (2016) - 2015
- [j10]Mario Cagalj, Toni Perkovic, Marin Bugaric, Shujun Li:
Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive Mob. Comput. 20: 64-81 (2015) - [j9]Mario Cagalj, Toni Perkovic, Marin Bugaric:
Timing Attacks on Cognitive Authentication Schemes. IEEE Trans. Inf. Forensics Secur. 10(3): 584-596 (2015) - 2013
- [c16]Tonko Kovacevic, Toni Perkovic, Mario Cagalj:
LIRA: A new key deployment scheme for Wireless Body Area Networks. SoftCOM 2013: 1-6 - 2012
- [j8]Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh Saxena, Dinko Begusic:
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User. IEEE Trans. Mob. Comput. 11(2): 337-351 (2012) - 2011
- [c15]Toni Perkovic, Shujun Li, Asma Mumtaz, Syed Ali Khayam, Yousra Javed, Mario Cagalj:
Breaking undercover: exploiting design flaws and nonuniform human behavior. SOUPS 2011: 5 - 2010
- [j7]Srdjan Capkun, Mario Cagalj, Ghassan Karame, Nils Ole Tippenhauer:
Integrity Regions: Authentication through Presence in Wireless Networks. IEEE Trans. Mob. Comput. 9(11): 1608-1621 (2010) - [c14]Toni Perkovic, Mario Cagalj, Nitesh Saxena:
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model. Financial Cryptography 2010: 351-358
2000 – 2009
- 2009
- [j6]Márk Félegyházi, Mario Cagalj, Jean-Pierre Hubaux:
Efficient MAC in cognitive radio systems: A game-theoretic approach. IEEE Trans. Wirel. Commun. 8(4): 1984-1995 (2009) - [c13]Mario Cagalj, Nitesh Saxena, Ersin Uzun:
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding. CANS 2009: 443-462 - [c12]Ghassan Karame, Mario Cagalj, Srdjan Capkun:
Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads. NCA 2009: 278-283 - [c11]Toni Perkovic, Ivo Stancic, Luka Malisa, Mario Cagalj:
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks. SecureComm 2009: 228-247 - 2008
- [j5]Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani B. Srivastava:
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels. IEEE Trans. Dependable Secur. Comput. 5(4): 208-223 (2008) - [j4]Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani B. Srivastava:
Secure Location Verification with Hidden and Mobile Base Stations. IEEE Trans. Mob. Comput. 7(4): 470-483 (2008) - [c10]Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj:
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. SP 2008: 64-78 - 2007
- [j3]Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux:
Wormhole-Based Antijamming Techniques in Sensor Networks. IEEE Trans. Mob. Comput. 6(1): 100-114 (2007) - [c9]Márk Félegyházi, Mario Cagalj, Diego Dufour, Jean-Pierre Hubaux:
Border Games in Cellular Networks. INFOCOM 2007: 812-820 - [c8]Márk Félegyházi, Mario Cagalj, Shirin Saeedi Bidokhti, Jean-Pierre Hubaux:
Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks. INFOCOM 2007: 1442-1450 - [c7]Kasper Bonne Rasmussen, Srdjan Capkun, Mario Cagalj:
SecNav: secure broadcast localization and time synchronization in wireless networks. MobiCom 2007: 310-313 - 2006
- [j2]Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux:
Key Agreement in Peer-to-Peer Wireless Networks. Proc. IEEE 94(2): 467-478 (2006) - [c6]Márk Félegyházi, Mario Cagalj, Jean-Pierre Hubaux:
Multi-radio channel allocation in competitive wireless networks. ICDCS Workshops 2006: 36 - [c5]Srdjan Capkun, Mario Cagalj, Mani B. Srivastava:
Secure Localization with Hidden and Mobile Base Stations. INFOCOM 2006 - [c4]Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava:
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. S&P 2006: 280-294 - [c3]Srdjan Capkun, Mario Cagalj:
Integrity regions: authentication through presence in wireless networks. Workshop on Wireless Security 2006: 1-10 - 2005
- [j1]Mario Zagalj, Jean-Pierre Hubaux, Christian C. Enz:
Energy-Efficient Broadcasting in All-Wireless Networks. Wirel. Networks 11(1-2): 177-188 (2005) - [c2]Mario Cagalj, Saurabh Ganeriwal, Imad Aad, Jean-Pierre Hubaux:
On selfish behavior in CSMA/CA networks. INFOCOM 2005: 2513-2524 - 2002
- [c1]Mario Zagalj, Jean-Pierre Hubaux, Christian C. Enz:
Minimum-energy broadcast in all-wireless networks: : NP-completeness and distribution issues. MobiCom 2002: 172-182
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint