|
Search the dblp DataBase
Mario Cagalj:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Márk Félegyházi, Mario Cagalj, Jean-Pierre Hubaux
Multi-radio channel allocation in competitive wireless networks. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2006, pp:36- [Conf]
- Mario Cagalj, Saurabh Ganeriwal, Imad Aad, Jean-Pierre Hubaux
On selfish behavior in CSMA/CA networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2005, pp:2513-2524 [Conf]
- Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:280-294 [Conf]
- Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux
Wormhole-Based Antijamming Techniques in Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2007, v:6, n:1, pp:100-114 [Journal]
- Márk Félegyházi, Mario Cagalj, Shirin Saeedi Bidokhti, Jean-Pierre Hubaux
Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:1442-1450 [Conf]
- Márk Félegyházi, Mario Cagalj, Diego Dufour, Jean-Pierre Hubaux
Border Games in Cellular Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:812-820 [Conf]
- Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
Secure Localization with Hidden and Mobile Base Stations. [Citation Graph (0, 0)][DBLP] INFOCOM, 2006, pp:- [Conf]
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding. [Citation Graph (, )][DBLP]
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model. [Citation Graph (, )][DBLP]
SecNav: secure broadcast localization and time synchronization in wireless networks. [Citation Graph (, )][DBLP]
Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads. [Citation Graph (, )][DBLP]
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. [Citation Graph (, )][DBLP]
Integrity regions: authentication through presence in wireless networks. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|