The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zinaida Benenson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zinaida Benenson, Felix C. Freiling, Thorsten Holz, Dogan Kesdogan, Lucia Draque Penso
    Safety, Liveness, and Information Flow: Dependability Revisited. [Citation Graph (0, 0)][DBLP]
    ARCS Workshops, 2006, pp:56-65 [Conf]
  2. Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner
    Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:165-178 [Conf]
  3. Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan
    TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:34-48 [Conf]
  4. Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan
    User Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (2), 2004, pp:385-389 [Conf]
  5. Zinaida Benenson, Peter M. Cholewinski, Felix C. Freiling
    Simple Evasive Data Storage in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2005, pp:779-784 [Conf]
  6. Zinaida Benenson, Lexi Pimenidis, Felix C. Freiling, Stefan Lucks
    Authenticated Query Flooding in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:644-647 [Conf]
  7. Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis
    Authenticated Query Flooding in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:38-49 [Conf]
  8. Alexander Becher, Zinaida Benenson, Maximillian Dornseif
    Tampering with Motes: Real-World Attacks on Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:26-29 [Conf]
  9. Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan
    Secure Multi-Party Computation with Security Modules. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:41-52 [Conf]
  10. Alexander Becher, Zinaida Benenson, Maximillian Dornseif
    Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:104-118 [Conf]
  11. Zinaida Benenson
    Lower Bounds. [Citation Graph (0, 0)][DBLP]
    Algorithms for Sensor and Ad Hoc Networks, 2007, pp:117-130 [Conf]

  12. Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks. [Citation Graph (, )][DBLP]


  13. Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks. [Citation Graph (, )][DBLP]


  14. Cryptographic Attack Metrics. [Citation Graph (, )][DBLP]


  15. Cooperative Intrusion Detection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  16. Advanced Evasive Data Storage in Sensor Networks. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002