|
Conferences in DBLP
(wisec) 2008 (conf/wisec/2008)
RFID security: in the shoulder and on the loading dock. [Citation Graph (, )][DBLP]
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. [Citation Graph (, )][DBLP]
Defending against false-endorsement-based dos attacks in wireless sensor networks. [Citation Graph (, )][DBLP]
Wireless authentication using remote passwords. [Citation Graph (, )][DBLP]
Comparison of innovative signature algorithms for WSNs. [Citation Graph (, )][DBLP]
Wireless client puzzles in IEEE 802.11 networks: security by wireless. [Citation Graph (, )][DBLP]
Identifying unique devices through wireless fingerprinting. [Citation Graph (, )][DBLP]
Active behavioral fingerprinting of wireless devices. [Citation Graph (, )][DBLP]
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. [Citation Graph (, )][DBLP]
An efficient integrity-preserving scheme for hierarchical sensor aggregation. [Citation Graph (, )][DBLP]
Towards event source unobservability with minimum network traffic in sensor networks. [Citation Graph (, )][DBLP]
Mitigating attacks against virtual coordinate based routing in wireless sensor networks. [Citation Graph (, )][DBLP]
Key management and secure software updates in wireless process control environments. [Citation Graph (, )][DBLP]
Slede: a domain-specific verification framework for sensor network security protocol implementations. [Citation Graph (, )][DBLP]
Minimum node degree and kappa-connectivity for key predistribution schemes and distributed sensor networks. [Citation Graph (, )][DBLP]
Mind your manners: socially appropriate wireless key establishment for groups. [Citation Graph (, )][DBLP]
Wireless and physical security via embedded sensor networks. [Citation Graph (, )][DBLP]
RFID authentication protocol for low-cost tags. [Citation Graph (, )][DBLP]
Body sensor network security: an identity-based cryptography approach. [Citation Graph (, )][DBLP]
Self-certified Sybil-free pseudonyms. [Citation Graph (, )][DBLP]
RFID security and privacy: long-term research or short-term tinkering? [Citation Graph (, )][DBLP]
A secure and resilient WSN roadside architecture for intelligent transport systems. [Citation Graph (, )][DBLP]
Towards self-propagate mal-packets in sensor networks. [Citation Graph (, )][DBLP]
Secure multi-hop network programming with multiple one-way key chains. [Citation Graph (, )][DBLP]
Attacks on time-of-flight distance bounding channels. [Citation Graph (, )][DBLP]
Anti-jamming timing channels for wireless networks. [Citation Graph (, )][DBLP]
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. [Citation Graph (, )][DBLP]
Simple and effective defense against evil twin access points. [Citation Graph (, )][DBLP]
|