The SCEAS System
Navigation Menu

Search the dblp DataBase


Mario Cagalj: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Márk Félegyházi, Mario Cagalj, Jean-Pierre Hubaux
    Multi-radio channel allocation in competitive wireless networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2006, pp:36- [Conf]
  2. Mario Cagalj, Saurabh Ganeriwal, Imad Aad, Jean-Pierre Hubaux
    On selfish behavior in CSMA/CA networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:2513-2524 [Conf]
  3. Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava
    Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:280-294 [Conf]
  4. Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux
    Wormhole-Based Antijamming Techniques in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:1, pp:100-114 [Journal]
  5. Márk Félegyházi, Mario Cagalj, Shirin Saeedi Bidokhti, Jean-Pierre Hubaux
    Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1442-1450 [Conf]
  6. Márk Félegyházi, Mario Cagalj, Diego Dufour, Jean-Pierre Hubaux
    Border Games in Cellular Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:812-820 [Conf]
  7. Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
    Secure Localization with Hidden and Mobile Base Stations. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]

  8. On the Usability of Secure Association of Wireless Devices Based on Distance Bounding. [Citation Graph (, )][DBLP]

  9. Shoulder-Surfing Safe Login in a Partially Observable Attacker Model. [Citation Graph (, )][DBLP]

  10. SecNav: secure broadcast localization and time synchronization in wireless networks. [Citation Graph (, )][DBLP]

  11. Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads. [Citation Graph (, )][DBLP]

  12. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. [Citation Graph (, )][DBLP]

  13. Integrity regions: authentication through presence in wireless networks. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002