The SCEAS System
Navigation Menu

Search the dblp DataBase


Wade Trappe: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin
    The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study. [Citation Graph (0, 0)][DBLP]
    DCOSS, 2006, pp:546-563 [Conf]
  2. Hyukjoon Lee, Seung Hyong Rhee, Dipankar Raychaudhuri, Wade Trappe
    Interworking of Self-organizing Hierarchical Ad Hoc Networks and the Internet. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2006, pp:930-937 [Conf]
  3. Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal Ozturk
    Enhancing Source-Location Privacy in Sensor Network Routing. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:599-608 [Conf]
  4. Wade Trappe, Min Wu, K. J. Ray Liu
    Anti-collusion codes: multi-user and multimedia perspectives. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2002, pp:149-152 [Conf]
  5. Zang Li, Wade Trappe, Yanyong Zhang, Badri Nath
    Robust statistical methods for securing wireless localization in sensor networks. [Citation Graph (0, 0)][DBLP]
    IPSN, 2005, pp:91-98 [Conf]
  6. Wenyuan Xu, Wade Trappe, Yanyong Zhang
    Channel surfing: defending wireless sensor networks from interference. [Citation Graph (0, 0)][DBLP]
    IPSN, 2007, pp:499-508 [Conf]
  7. Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wood
    The feasibility of launching and detecting jamming attacks in wireless networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2005, pp:46-57 [Conf]
  8. Shu Chen, Yu Zhang, Wade Trappe
    Inverting sensor networks and actuating the environment for spatio-temporal access control. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:1-12 [Conf]
  9. Celal Ozturk, Yanyong Zhang, Wade Trappe
    Source-location privacy in energy-constrained sensor network routing. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:88-93 [Conf]
  10. Wenyuan Xu, Wade Trappe, Yanyong Zhang
    Channel surfing: defending wireless sensor networks from jamming and interference. [Citation Graph (0, 0)][DBLP]
    SenSys, 2006, pp:403-404 [Conf]
  11. Min Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu
    Collusion-resistant multimedia fingerprinting: a unified framework. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:748-759 [Conf]
  12. Mathias Bohge, Wade Trappe
    An authentication framework for hierarchical ad hoc sensor networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:79-87 [Conf]
  13. Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang
    Channel surfing and spatial retreats: defenses against wireless denial of service. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:80-89 [Conf]
  14. Celal Ozturk, Yanyong Zhang, Wade Trappe, Maximilian Ott
    Source-Location Privacy for Networks of Energy-Constrained Sensors. [Citation Graph (0, 0)][DBLP]
    WSTFEUS, 2004, pp:68-0 [Conf]
  15. Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang
    Jamming sensor networks: attack and defense strategies. [Citation Graph (0, 0)][DBLP]
    IEEE Network, 2006, v:20, n:3, pp:41-47 [Journal]
  16. Z. Jane Wang, Min Wu, H. Vicky Zhao, Wade Trappe, K. J. Ray Liu
    Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2005, v:14, n:6, pp:804-821 [Journal]
  17. Wade Trappe, Jie Song, Radha Poovendran, K. J. Ray Liu
    Key management and distribution for secure multimedia multicast. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2003, v:5, n:4, pp:544-557 [Journal]
  18. Yan Sun, Wade Trappe, K. J. Ray Liu
    A scalable multicast key management scheme for heterogeneous wireless networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:4, pp:653-666 [Journal]
  19. Wade Trappe, Yuke Wang, K. J. Ray Liu
    Resource-aware conference key establishment for heterogeneous networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2005, v:13, n:1, pp:134-146 [Journal]
  20. Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong Zhang
    Temporal Privacy in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:23- [Conf]
  21. Yingying Chen, Wade Trappe, Richard P. Martin
    Attack Detection in Wireless Localization. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1964-1972 [Conf]
  22. Zang Li, Wade Trappe, Roy Yates
    Secret Communication via Multi-antenna Transmission. [Citation Graph (0, 0)][DBLP]
    CISS, 2007, pp:905-910 [Conf]

  23. SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. [Citation Graph (, )][DBLP]

  24. A Physical-Layer Technique to Enhance Authentication for Mobile Terminals. [Citation Graph (, )][DBLP]

  25. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. [Citation Graph (, )][DBLP]

  26. ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks. [Citation Graph (, )][DBLP]

  27. Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks. [Citation Graph (, )][DBLP]

  28. Mining joules and bits: towards a long-life pervasive system. [Citation Graph (, )][DBLP]

  29. Demo abstract: Towards continuous tracking: Low-power communication and fail-safe presence assurance. [Citation Graph (, )][DBLP]

  30. An identity-based security framework For VANETs. [Citation Graph (, )][DBLP]

  31. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. [Citation Graph (, )][DBLP]

  32. ParkNet: drive-by sensing of road-side parking statistics. [Citation Graph (, )][DBLP]

  33. ADLS: Attack Detection for Wireless Localization Using Least Squares. [Citation Graph (, )][DBLP]

  34. Exploiting Environmental Properties for Wireless Localization and Location Aware Applications. [Citation Graph (, )][DBLP]

  35. Securing wireless systems via lower layer enforcements. [Citation Graph (, )][DBLP]

  36. MIMO-assisted channel-based authentication in wireless networks. [Citation Graph (, )][DBLP]

  37. The Snowball Effect: DetailingPerformance Anomalies of 802.11 Rate Adaptation. [Citation Graph (, )][DBLP]

  38. Power-Modulated Challenge-Response Schemes for Verifying Location Claims. [Citation Graph (, )][DBLP]

  39. Characterizing Indoor Wireless Channels via Ray Tracing, and Validation via Measurements. [Citation Graph (, )][DBLP]

  40. P2P-ISP Cooperation: Risks and Mitigation in Multiple-ISP Networks. [Citation Graph (, )][DBLP]

  41. Detecting Identity Spoofs in IEEE 802.11e Wireless Networks. [Citation Graph (, )][DBLP]

  42. Subverting MIMO wireless systems by jamming the channel estimation procedure. [Citation Graph (, )][DBLP]

  43. Anti-jamming timing channels for wireless networks. [Citation Graph (, )][DBLP]

  44. MIAMI: methods and infrastructure for the assurance of measurement information. [Citation Graph (, )][DBLP]

  45. Service Discovery and Device Identification in Cognitive Radio Networks. [Citation Graph (, )][DBLP]

  46. A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios. [Citation Graph (, )][DBLP]

  47. Facilitating an Active Transmit-only RFID System Through Receiver-based Processing. [Citation Graph (, )][DBLP]

  48. Detecting and Localizing Wireless Spoofing Attacks. [Citation Graph (, )][DBLP]

  49. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication [Citation Graph (, )][DBLP]

  50. MIMO-Assisted Channel-Based Authentication in Wireless Networks [Citation Graph (, )][DBLP]

  51. Using the Physical Layer for Wireless Authentication in Time-Variant Channels [Citation Graph (, )][DBLP]

  52. Information-theoretically Secret Key Generation for Fading Wireless Channels [Citation Graph (, )][DBLP]

Search in 7.163secs, Finished in 7.165secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002