The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Workshop on Wireless Security (ws)
2003 (conf/ws/2003)

  1. Naveen Sastry, Umesh Shankar, David Wagner
    Secure verification of location claims. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:1-10 [Conf]
  2. Ping Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wallach
    Wireless LAN location-sensing for security applications. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:11-20 [Conf]
  3. Srdjan Capkun, Jean-Pierre Hubaux
    BISS: building secure routing out of an incomplete set of security associations. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:21-29 [Conf]
  4. Yih-Chun Hu, Adrian Perrig, David B. Johnson
    Rushing attacks and defense in wireless ad hoc network routing protocols. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:30-40 [Conf]
  5. Panagiotis Papadimitratos, Zygmunt J. Haas
    Secure data transmission in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:41-50 [Conf]
  6. Jiejun Kong, Shirshanka Das, Edward Tsai, Mario Gerla
    ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:51-60 [Conf]
  7. Sneha Kumar Kasera, Semyon Mizikovsky, Ganapathy S. Sundaram, Thomas Y. C. Woo
    On securely enabling intermediary-based services and performance enhancements for wireless mobile users. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:61-68 [Conf]
  8. Bo Sun, Kui Wu, Udo W. Pooch
    Alert aggregation in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:69-78 [Conf]
  9. Mathias Bohge, Wade Trappe
    An authentication framework for hierarchical ad hoc sensor networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:79-87 [Conf]
  10. Lein Harn, Wen-Jung Hsin
    On the security of wireless network access with enhancements. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:88-95 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002