The SCEAS System
Navigation Menu

Conferences in DBLP

(wisec)
2008 (conf/wisec/2008)


  1. RFID security: in the shoulder and on the loading dock. [Citation Graph (, )][DBLP]


  2. Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. [Citation Graph (, )][DBLP]


  3. Defending against false-endorsement-based dos attacks in wireless sensor networks. [Citation Graph (, )][DBLP]


  4. Wireless authentication using remote passwords. [Citation Graph (, )][DBLP]


  5. Comparison of innovative signature algorithms for WSNs. [Citation Graph (, )][DBLP]


  6. Wireless client puzzles in IEEE 802.11 networks: security by wireless. [Citation Graph (, )][DBLP]


  7. Identifying unique devices through wireless fingerprinting. [Citation Graph (, )][DBLP]


  8. Active behavioral fingerprinting of wireless devices. [Citation Graph (, )][DBLP]


  9. A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. [Citation Graph (, )][DBLP]


  10. An efficient integrity-preserving scheme for hierarchical sensor aggregation. [Citation Graph (, )][DBLP]


  11. Towards event source unobservability with minimum network traffic in sensor networks. [Citation Graph (, )][DBLP]


  12. Mitigating attacks against virtual coordinate based routing in wireless sensor networks. [Citation Graph (, )][DBLP]


  13. Key management and secure software updates in wireless process control environments. [Citation Graph (, )][DBLP]


  14. Slede: a domain-specific verification framework for sensor network security protocol implementations. [Citation Graph (, )][DBLP]


  15. Minimum node degree and kappa-connectivity for key predistribution schemes and distributed sensor networks. [Citation Graph (, )][DBLP]


  16. Mind your manners: socially appropriate wireless key establishment for groups. [Citation Graph (, )][DBLP]


  17. Wireless and physical security via embedded sensor networks. [Citation Graph (, )][DBLP]


  18. RFID authentication protocol for low-cost tags. [Citation Graph (, )][DBLP]


  19. Body sensor network security: an identity-based cryptography approach. [Citation Graph (, )][DBLP]


  20. Self-certified Sybil-free pseudonyms. [Citation Graph (, )][DBLP]


  21. RFID security and privacy: long-term research or short-term tinkering? [Citation Graph (, )][DBLP]


  22. A secure and resilient WSN roadside architecture for intelligent transport systems. [Citation Graph (, )][DBLP]


  23. Towards self-propagate mal-packets in sensor networks. [Citation Graph (, )][DBLP]


  24. Secure multi-hop network programming with multiple one-way key chains. [Citation Graph (, )][DBLP]


  25. Attacks on time-of-flight distance bounding channels. [Citation Graph (, )][DBLP]


  26. Anti-jamming timing channels for wireless networks. [Citation Graph (, )][DBLP]


  27. Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. [Citation Graph (, )][DBLP]


  28. Simple and effective defense against evil twin access points. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002