Stop the war!
Остановите войну!
for scientists:
default search action
3. WISEC 2010: Hoboken, New Jersey, USA
- Susanne Wetzel, Cristina Nita-Rotaru, Frank Stajano:
Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010. ACM 2010, ISBN 978-1-60558-923-7
Session 1
- Jinsub Kim, Dan Sterne, Rommie L. Hardy, Roshan K. Thomas, Lang Tong:
Timing-based localization of in-band wormhole tunnels in MANETs. 1-12 - Yanjun Zuo:
RFID survivability quantification and attack modeling. 13-18 - Robert D. Miller, Wade Trappe:
Subverting MIMO wireless systems by jamming the channel estimation procedure. 19-24
Session 2
- Nilothpal Talukder, Sheikh Iqbal Ahamed:
Preventing multi-query attack in location-based services. 25-36 - Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu:
pBMDS: a behavior-based malware detection system for cellphone devices. 37-48 - Hao Chen:
Efficient compromising resilient authentication schemes for large scale wireless sensor networks. 49-54
Session 3
- Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede:
Low-cost untraceable authentication protocols for RFID. 55-64 - Yasunobu Nohara, Sozo Inoue:
A secure and scalable identification for hash-based RFID systems using updatable pre-computation. 65-74 - Maxim Raya, Reza Shokri, Jean-Pierre Hubaux:
On the tradeoff between trust and privacy in wireless ad hoc networks. 75-80 - Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo:
Automating the injection of believable decoys to detect snooping. 81-86 - Andrew M. Odlyzko:
Providing security with insecure systems. 87-88
Session 4
- Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim M. El Defrawy:
Attacks on physical-layer identification. 89-98 - Zhenhua Liu, Wenyuan Xu:
Zeroing-in on network metric minima for sink location determination. 99-104 - Florian Kerschbaum, Nina Oertel, Leonardo Weiss Ferreira Chaves:
Privacy-preserving computation of benchmarks on item-level data using RFID. 105-110 - Elmar Schoch, Frank Kargl:
On the efficiency of secure beaconing in VANETs. 111-116
Session 5
- Manuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux, Jean-Yves Le Boudec:
Effectiveness of distance-decreasing attacks against impulse radio ranging. 117-128 - T. J. O'Connor, Benjamin Sangster:
honeyM: a framework for implementing virtual honeyclients for mobile devices. 129-138 - Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt:
Secret keys from entangled sensor motes: implementation and analysis. 139-144 - Qijun Gu:
Efficient code diversification for network reprogramming in sensor networks. 145-150
Session 6
- Ahren Studer, Adrian Perrig:
Mobile user location-specific encryption (MULE): using your office as your password. 151-162 - Qi Mi, John A. Stankovic, Radu Stoleru:
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks. 163-168 - Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, David Kotz:
On the reliability of wireless fingerprinting using clock skews. 169-174
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.