|
Search the dblp DataBase
Srdjan Capkun:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun
A Formal Analysis of Syverson?s Rational Exchange Protocol. [Citation Graph (0, 0)][DBLP] CSFW, 2002, pp:193-205 [Conf]
- Srdjan Capkun, Maher Hamdi, Jean-Pierre Hubaux
GPS-Free Positioning in Mobile ad-hoc Networks. [Citation Graph (0, 0)][DBLP] HICSS, 2001, pp:- [Conf]
- Srdjan Capkun, Jean-Pierre Hubaux
Secure positioning of wireless devices with application to sensor networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2005, pp:1917-1928 [Conf]
- Loukas Lazos, Radha Poovendran, Srdjan Capkun
Rope: robust position estimation in wireless sensor networks. [Citation Graph (0, 0)][DBLP] IPSN, 2005, pp:324-331 [Conf]
- Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán
Mobility helps security in ad hoc networks. [Citation Graph (0, 0)][DBLP] MobiHoc, 2003, pp:46-56 [Conf]
- Jean-Pierre Hubaux, Levente Buttyán, Srdjan Capkun
The quest for security in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP] MobiHoc, 2001, pp:146-155 [Conf]
- Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux
SECTOR: secure tracking of node encounters in multi-hop wireless networks. [Citation Graph (0, 0)][DBLP] SASN, 2003, pp:21-32 [Conf]
- Sahar Sedighpour, Srdjan Capkun, Saurabh Ganeriwal, Mani B. Srivastava
Distance enlargement and reduction attacks on ultrasound ranging. [Citation Graph (0, 0)][DBLP] SenSys, 2005, pp:312- [Conf]
- Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:280-294 [Conf]
- Márk Félegyházi, Srdjan Capkun, Jean-Pierre Hubaux
SOWER: self-organizing wireless network for messaging. [Citation Graph (0, 0)][DBLP] WMASH, 2004, pp:1-10 [Conf]
- Srdjan Capkun, Jean-Pierre Hubaux
BISS: building secure routing out of an incomplete set of security associations. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2003, pp:21-29 [Conf]
- Srdjan Capkun, Maher Hamdi, Jean-Pierre Hubaux
GPS-free Positioning in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] Cluster Computing, 2002, v:5, n:2, pp:157-167 [Journal]
- Jean-Pierre Hubaux, Srdjan Capkun, Jun Luo
The Security and Privacy of Smart Vehicles. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:49-55 [Journal]
- Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun
A formal model of rational exchange and its application to the analysis of Syverson's protocol. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:551-587 [Journal]
- Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux
Self-Organized Public-Key Management for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2003, v:2, n:1, pp:52-64 [Journal]
- Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán
Mobility Helps Peer-to-Peer Security. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2006, v:5, n:1, pp:43-51 [Journal]
- Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux
Wormhole-Based Antijamming Techniques in Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2007, v:6, n:1, pp:100-114 [Journal]
- Patrick Schaller, Srdjan Capkun, David A. Basin
BAP: Broadcast Authentication Using Cryptographic Puzzles. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:401-419 [Conf]
- Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
Secure Localization with Hidden and Mobile Base Stations. [Citation Graph (0, 0)][DBLP] INFOCOM, 2006, pp:- [Conf]
Location privacy of distance bounding protocols. [Citation Graph (, )][DBLP]
Proximity-based access control for implantable medical devices. [Citation Graph (, )][DBLP]
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks. [Citation Graph (, )][DBLP]
Low-Cost Client Puzzles Based on Modular Exponentiation. [Citation Graph (, )][DBLP]
ID-Based Secure Distance Bounding and Localization. [Citation Graph (, )][DBLP]
Secure Remote Execution of Sequential Computations. [Citation Graph (, )][DBLP]
Transient-based identification of wireless sensor nodes. [Citation Graph (, )][DBLP]
SecNav: secure broadcast localization and time synchronization in wireless networks. [Citation Graph (, )][DBLP]
Efficient uncoordinated FHSS anti-jamming communication. [Citation Graph (, )][DBLP]
Attacks on public WLAN-based positioning systems. [Citation Graph (, )][DBLP]
Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads. [Citation Graph (, )][DBLP]
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. [Citation Graph (, )][DBLP]
Let's Get Physical: Models and Methods for Real-World Security Protocols. [Citation Graph (, )][DBLP]
Integrity regions: authentication through presence in wireless networks. [Citation Graph (, )][DBLP]
Secure time synchronization service for sensor networks. [Citation Graph (, )][DBLP]
Attacks on physical-layer identification. [Citation Graph (, )][DBLP]
Influence of user perception, security needs, and social factors on device pairing method choices. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.009secs
|