|
Search the dblp DataBase
Zinaida Benenson:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso
Safety, Liveness, and Information Flow: Dependability Revisited. [Citation Graph (0, 0)][DBLP] ARCS Workshops, 2006, pp:56-65 [Conf]
- Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2006, pp:165-178 [Conf]
- Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. [Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:34-48 [Conf]
- Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan
User Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP] GI Jahrestagung (2), 2004, pp:385-389 [Conf]
- Zinaida Benenson, Peter M. Cholewinski, Felix C. Freiling
Simple Evasive Data Storage in Sensor Networks. [Citation Graph (0, 0)][DBLP] IASTED PDCS, 2005, pp:779-784 [Conf]
- Zinaida Benenson, Lexi Pimenidis, Felix C. Freiling, Stefan Lucks
Authenticated Query Flooding in Sensor Networks. [Citation Graph (0, 0)][DBLP] PerCom Workshops, 2006, pp:644-647 [Conf]
- Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis
Authenticated Query Flooding in Sensor Networks. [Citation Graph (0, 0)][DBLP] SEC, 2006, pp:38-49 [Conf]
- Alexander Becher, Zinaida Benenson, Maximillian Dornseif
Tampering with Motes: Real-World Attacks on Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] Sicherheit, 2006, pp:26-29 [Conf]
- Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan
Secure Multi-Party Computation with Security Modules. [Citation Graph (0, 0)][DBLP] Sicherheit, 2005, pp:41-52 [Conf]
- Alexander Becher, Zinaida Benenson, Maximillian Dornseif
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] SPC, 2006, pp:104-118 [Conf]
- Zinaida Benenson
Lower Bounds. [Citation Graph (0, 0)][DBLP] Algorithms for Sensor and Ad Hoc Networks, 2007, pp:117-130 [Conf]
Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks. [Citation Graph (, )][DBLP]
Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks. [Citation Graph (, )][DBLP]
Cryptographic Attack Metrics. [Citation Graph (, )][DBLP]
Cooperative Intrusion Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Advanced Evasive Data Storage in Sensor Networks. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|