|
Search the dblp DataBase
Wade Trappe:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin
The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study. [Citation Graph (0, 0)][DBLP] DCOSS, 2006, pp:546-563 [Conf]
- Hyukjoon Lee, Seung Hyong Rhee, Dipankar Raychaudhuri, Wade Trappe
Interworking of Self-organizing Hierarchical Ad Hoc Networks and the Internet. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (4), 2006, pp:930-937 [Conf]
- Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal Ozturk
Enhancing Source-Location Privacy in Sensor Network Routing. [Citation Graph (0, 0)][DBLP] ICDCS, 2005, pp:599-608 [Conf]
- Wade Trappe, Min Wu, K. J. Ray Liu
Anti-collusion codes: multi-user and multimedia perspectives. [Citation Graph (0, 0)][DBLP] ICIP (2), 2002, pp:149-152 [Conf]
- Zang Li, Wade Trappe, Yanyong Zhang, Badri Nath
Robust statistical methods for securing wireless localization in sensor networks. [Citation Graph (0, 0)][DBLP] IPSN, 2005, pp:91-98 [Conf]
- Wenyuan Xu, Wade Trappe, Yanyong Zhang
Channel surfing: defending wireless sensor networks from interference. [Citation Graph (0, 0)][DBLP] IPSN, 2007, pp:499-508 [Conf]
- Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wood
The feasibility of launching and detecting jamming attacks in wireless networks. [Citation Graph (0, 0)][DBLP] MobiHoc, 2005, pp:46-57 [Conf]
- Shu Chen, Yu Zhang, Wade Trappe
Inverting sensor networks and actuating the environment for spatio-temporal access control. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:1-12 [Conf]
- Celal Ozturk, Yanyong Zhang, Wade Trappe
Source-location privacy in energy-constrained sensor network routing. [Citation Graph (0, 0)][DBLP] SASN, 2004, pp:88-93 [Conf]
- Wenyuan Xu, Wade Trappe, Yanyong Zhang
Channel surfing: defending wireless sensor networks from jamming and interference. [Citation Graph (0, 0)][DBLP] SenSys, 2006, pp:403-404 [Conf]
- Min Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu
Collusion-resistant multimedia fingerprinting: a unified framework. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:748-759 [Conf]
- Mathias Bohge, Wade Trappe
An authentication framework for hierarchical ad hoc sensor networks. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2003, pp:79-87 [Conf]
- Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang
Channel surfing and spatial retreats: defenses against wireless denial of service. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:80-89 [Conf]
- Celal Ozturk, Yanyong Zhang, Wade Trappe, Maximilian Ott
Source-Location Privacy for Networks of Energy-Constrained Sensors. [Citation Graph (0, 0)][DBLP] WSTFEUS, 2004, pp:68-0 [Conf]
- Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang
Jamming sensor networks: attack and defense strategies. [Citation Graph (0, 0)][DBLP] IEEE Network, 2006, v:20, n:3, pp:41-47 [Journal]
- Z. Jane Wang, Min Wu, H. Vicky Zhao, Wade Trappe, K. J. Ray Liu
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Image Processing, 2005, v:14, n:6, pp:804-821 [Journal]
- Wade Trappe, Jie Song, Radha Poovendran, K. J. Ray Liu
Key management and distribution for secure multimedia multicast. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Multimedia, 2003, v:5, n:4, pp:544-557 [Journal]
- Yan Sun, Wade Trappe, K. J. Ray Liu
A scalable multicast key management scheme for heterogeneous wireless networks. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 2004, v:12, n:4, pp:653-666 [Journal]
- Wade Trappe, Yuke Wang, K. J. Ray Liu
Resource-aware conference key establishment for heterogeneous networks. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 2005, v:13, n:1, pp:134-146 [Journal]
- Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong Zhang
Temporal Privacy in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICDCS, 2007, pp:23- [Conf]
- Yingying Chen, Wade Trappe, Richard P. Martin
Attack Detection in Wireless Localization. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:1964-1972 [Conf]
- Zang Li, Wade Trappe, Roy Yates
Secret Communication via Multi-antenna Transmission. [Citation Graph (0, 0)][DBLP] CISS, 2007, pp:905-910 [Conf]
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. [Citation Graph (, )][DBLP]
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals. [Citation Graph (, )][DBLP]
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. [Citation Graph (, )][DBLP]
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks. [Citation Graph (, )][DBLP]
Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks. [Citation Graph (, )][DBLP]
Mining joules and bits: towards a long-life pervasive system. [Citation Graph (, )][DBLP]
Demo abstract: Towards continuous tracking: Low-power communication and fail-safe presence assurance. [Citation Graph (, )][DBLP]
An identity-based security framework For VANETs. [Citation Graph (, )][DBLP]
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. [Citation Graph (, )][DBLP]
ParkNet: drive-by sensing of road-side parking statistics. [Citation Graph (, )][DBLP]
ADLS: Attack Detection for Wireless Localization Using Least Squares. [Citation Graph (, )][DBLP]
Exploiting Environmental Properties for Wireless Localization and Location Aware Applications. [Citation Graph (, )][DBLP]
Securing wireless systems via lower layer enforcements. [Citation Graph (, )][DBLP]
MIMO-assisted channel-based authentication in wireless networks. [Citation Graph (, )][DBLP]
The Snowball Effect: DetailingPerformance Anomalies of 802.11 Rate Adaptation. [Citation Graph (, )][DBLP]
Power-Modulated Challenge-Response Schemes for Verifying Location Claims. [Citation Graph (, )][DBLP]
Characterizing Indoor Wireless Channels via Ray Tracing, and Validation via Measurements. [Citation Graph (, )][DBLP]
P2P-ISP Cooperation: Risks and Mitigation in Multiple-ISP Networks. [Citation Graph (, )][DBLP]
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks. [Citation Graph (, )][DBLP]
Subverting MIMO wireless systems by jamming the channel estimation procedure. [Citation Graph (, )][DBLP]
Anti-jamming timing channels for wireless networks. [Citation Graph (, )][DBLP]
MIAMI: methods and infrastructure for the assurance of measurement information. [Citation Graph (, )][DBLP]
Service Discovery and Device Identification in Cognitive Radio Networks. [Citation Graph (, )][DBLP]
A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios. [Citation Graph (, )][DBLP]
Facilitating an Active Transmit-only RFID System Through Receiver-based Processing. [Citation Graph (, )][DBLP]
Detecting and Localizing Wireless Spoofing Attacks. [Citation Graph (, )][DBLP]
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication [Citation Graph (, )][DBLP]
MIMO-Assisted Channel-Based Authentication in Wireless Networks [Citation Graph (, )][DBLP]
Using the Physical Layer for Wireless Authentication in Time-Variant Channels [Citation Graph (, )][DBLP]
Information-theoretically Secret Key Generation for Fading Wireless Channels [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.152secs
|