The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Workshop on Wireless Security (ws)
2004 (conf/ws/2004)

  1. George Theodorakopoulos, John S. Baras
    Trust evaluation in ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:1-10 [Conf]
  2. Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-Rotaru
    JANUS: towards robust and malicious resilient routing in hybrid wireless networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:11-20 [Conf]
  3. Loukas Lazos, Radha Poovendran
    SeRLoc: secure range-independent localization for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:21-30 [Conf]
  4. Ari Juels
    RFID: security and privacy for five-cent wireless devices. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:31- [Conf]
  5. Naveen Sastry, David Wagner
    Security considerations for IEEE 802.15.4 networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:32-42 [Conf]
  6. Changhua He, John C. Mitchell
    Analysis of the 802.11i 4-way handshake. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:43-50 [Conf]
  7. Weichao Wang, Bharat K. Bhargava
    Visualization of wormholes in sensor networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:51-60 [Conf]
  8. Bo Sun, Fei Yu, Kui Wu, Victor C. M. Leung
    Mobility-based anomaly detection in cellular mobile networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:61-69 [Conf]
  9. Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala
    A framework for wireless LAN monitoring and its applications. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:70-79 [Conf]
  10. Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang
    Channel surfing and spatial retreats: defenses against wireless denial of service. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:80-89 [Conf]
  11. Ulrike Meyer, Susanne Wetzel
    A man-in-the-middle attack on UMTS. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:90-97 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002