The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Srdjan Capkun: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun
    A Formal Analysis of Syverson?s Rational Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:193-205 [Conf]
  2. Srdjan Capkun, Maher Hamdi, Jean-Pierre Hubaux
    GPS-Free Positioning in Mobile ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2001, pp:- [Conf]
  3. Srdjan Capkun, Jean-Pierre Hubaux
    Secure positioning of wireless devices with application to sensor networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1917-1928 [Conf]
  4. Loukas Lazos, Radha Poovendran, Srdjan Capkun
    Rope: robust position estimation in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IPSN, 2005, pp:324-331 [Conf]
  5. Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán
    Mobility helps security in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2003, pp:46-56 [Conf]
  6. Jean-Pierre Hubaux, Levente Buttyán, Srdjan Capkun
    The quest for security in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2001, pp:146-155 [Conf]
  7. Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux
    SECTOR: secure tracking of node encounters in multi-hop wireless networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:21-32 [Conf]
  8. Sahar Sedighpour, Srdjan Capkun, Saurabh Ganeriwal, Mani B. Srivastava
    Distance enlargement and reduction attacks on ultrasound ranging. [Citation Graph (0, 0)][DBLP]
    SenSys, 2005, pp:312- [Conf]
  9. Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava
    Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:280-294 [Conf]
  10. Márk Félegyházi, Srdjan Capkun, Jean-Pierre Hubaux
    SOWER: self-organizing wireless network for messaging. [Citation Graph (0, 0)][DBLP]
    WMASH, 2004, pp:1-10 [Conf]
  11. Srdjan Capkun, Jean-Pierre Hubaux
    BISS: building secure routing out of an incomplete set of security associations. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:21-29 [Conf]
  12. Srdjan Capkun, Maher Hamdi, Jean-Pierre Hubaux
    GPS-free Positioning in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2002, v:5, n:2, pp:157-167 [Journal]
  13. Jean-Pierre Hubaux, Srdjan Capkun, Jun Luo
    The Security and Privacy of Smart Vehicles. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:49-55 [Journal]
  14. Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun
    A formal model of rational exchange and its application to the analysis of Syverson's protocol. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:3-4, pp:551-587 [Journal]
  15. Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux
    Self-Organized Public-Key Management for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2003, v:2, n:1, pp:52-64 [Journal]
  16. Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán
    Mobility Helps Peer-to-Peer Security. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:1, pp:43-51 [Journal]
  17. Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux
    Wormhole-Based Antijamming Techniques in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:1, pp:100-114 [Journal]
  18. Patrick Schaller, Srdjan Capkun, David A. Basin
    BAP: Broadcast Authentication Using Cryptographic Puzzles. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:401-419 [Conf]
  19. Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
    Secure Localization with Hidden and Mobile Base Stations. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]

  20. Location privacy of distance bounding protocols. [Citation Graph (, )][DBLP]


  21. Proximity-based access control for implantable medical devices. [Citation Graph (, )][DBLP]


  22. Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks. [Citation Graph (, )][DBLP]


  23. Low-Cost Client Puzzles Based on Modular Exponentiation. [Citation Graph (, )][DBLP]


  24. ID-Based Secure Distance Bounding and Localization. [Citation Graph (, )][DBLP]


  25. Secure Remote Execution of Sequential Computations. [Citation Graph (, )][DBLP]


  26. Transient-based identification of wireless sensor nodes. [Citation Graph (, )][DBLP]


  27. SecNav: secure broadcast localization and time synchronization in wireless networks. [Citation Graph (, )][DBLP]


  28. Efficient uncoordinated FHSS anti-jamming communication. [Citation Graph (, )][DBLP]


  29. Attacks on public WLAN-based positioning systems. [Citation Graph (, )][DBLP]


  30. Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads. [Citation Graph (, )][DBLP]


  31. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. [Citation Graph (, )][DBLP]


  32. Let's Get Physical: Models and Methods for Real-World Security Protocols. [Citation Graph (, )][DBLP]


  33. Integrity regions: authentication through presence in wireless networks. [Citation Graph (, )][DBLP]


  34. Secure time synchronization service for sensor networks. [Citation Graph (, )][DBLP]


  35. Attacks on physical-layer identification. [Citation Graph (, )][DBLP]


  36. Influence of user perception, security needs, and social factors on device pairing method choices. [Citation Graph (, )][DBLP]


Search in 0.025secs, Finished in 0.027secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002