|
Conferences in DBLP
- George Theodorakopoulos, John S. Baras
Trust evaluation in ad-hoc networks. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:1-10 [Conf]
- Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-Rotaru
JANUS: towards robust and malicious resilient routing in hybrid wireless networks. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:11-20 [Conf]
- Loukas Lazos, Radha Poovendran
SeRLoc: secure range-independent localization for wireless sensor networks. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:21-30 [Conf]
- Ari Juels
RFID: security and privacy for five-cent wireless devices. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:31- [Conf]
- Naveen Sastry, David Wagner
Security considerations for IEEE 802.15.4 networks. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:32-42 [Conf]
- Changhua He, John C. Mitchell
Analysis of the 802.11i 4-way handshake. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:43-50 [Conf]
- Weichao Wang, Bharat K. Bhargava
Visualization of wormholes in sensor networks. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:51-60 [Conf]
- Bo Sun, Fei Yu, Kui Wu, Victor C. M. Leung
Mobility-based anomaly detection in cellular mobile networks. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:61-69 [Conf]
- Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala
A framework for wireless LAN monitoring and its applications. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:70-79 [Conf]
- Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang
Channel surfing and spatial retreats: defenses against wireless denial of service. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:80-89 [Conf]
- Ulrike Meyer, Susanne Wetzel
A man-in-the-middle attack on UMTS. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:90-97 [Conf]
|