|
Conferences in DBLP
- Naveen Sastry, Umesh Shankar, David Wagner
Secure verification of location claims. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2003, pp:1-10 [Conf]
- Ping Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wallach
Wireless LAN location-sensing for security applications. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2003, pp:11-20 [Conf]
- Srdjan Capkun, Jean-Pierre Hubaux
BISS: building secure routing out of an incomplete set of security associations. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2003, pp:21-29 [Conf]
- Yih-Chun Hu, Adrian Perrig, David B. Johnson
Rushing attacks and defense in wireless ad hoc network routing protocols. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2003, pp:30-40 [Conf]
- Panagiotis Papadimitratos, Zygmunt J. Haas
Secure data transmission in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2003, pp:41-50 [Conf]
- Jiejun Kong, Shirshanka Das, Edward Tsai, Mario Gerla
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2003, pp:51-60 [Conf]
- Sneha Kumar Kasera, Semyon Mizikovsky, Ganapathy S. Sundaram, Thomas Y. C. Woo
On securely enabling intermediary-based services and performance enhancements for wireless mobile users. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2003, pp:61-68 [Conf]
- Bo Sun, Kui Wu, Udo W. Pooch
Alert aggregation in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2003, pp:69-78 [Conf]
- Mathias Bohge, Wade Trappe
An authentication framework for hierarchical ad hoc sensor networks. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2003, pp:79-87 [Conf]
- Lein Harn, Wen-Jung Hsin
On the security of wireless network access with enhancements. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2003, pp:88-95 [Conf]
|