


default search action
4. WISEC 2011: Hamburg, Germany
- Dieter Gollmann, Dirk Westhoff, Gene Tsudik, N. Asokan:

Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. ACM 2011, ISBN 978-1-4503-0692-8
Keynote address
- Dave Singelée

, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede
:
The communication and computation cost of wireless security: extended abstract. 1-4
WSN models and framework
- Phil Fazio, Keren Tan, Jihwang Yeo, David Kotz

:
Short paper: the NetSANI framework for analysis and fine-tuning of network trace sanitization. 5-10 - Roberto Di Pietro

, Nino Vincenzo Verde:
Epidemic data survivability in unattended wireless sensor networks. 11-22 - Emiliano De Cristofaro, Claudio Soriente

:
Short paper: PEPSI - privacy-enhanced participatory sensing infrastructure. 23-28
Wireless jamming
- Sisi Liu, Loukas Lazos, Marwan Krunz:

Thwarting inside jamming attacks on wireless broadcast communications. 29-40 - Hossen Asiful Mustafa

, Xin Zhang, Zhenhua Liu, Wenyuan Xu, Adrian Perrig:
Short paper: Jamming-resilient multipath routing leveraging availability-based correlation. 41-46 - Matthias Wilhelm

, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders
:
Short paper: reactive jamming in wireless networks: how realistic is the threat? 47-52
Monitoring and surveillance
- Md. Sohail Ahmad, Shashank Tadakamadla:

Short paper: security evaluation of IEEE 802.11w specification. 53-58 - Fan Zhang, Wenbo He, Xue Liu, Patrick G. Bridges

:
Inferring users' online activities through traffic analysis. 59-70 - Patrick McHardy, Andreas Schuler, Erik Tews:

Interactive decryption of DECT phone calls. 71-78
Wireless jamming II
- Xi Tan, Kapil M. Borle, Wenliang Du, Biao Chen:

Cryptographic link signatures for spectrum usage authentication in cognitive radio. 79-90 - Robert D. Miller, Wade Trappe:

Short paper: ACE: authenticating the channel estimation process in wireless communication systems. 91-96 - Guevara Noubir, Rajmohan Rajaraman, Bo Sheng

, Bishal Thapa:
On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming. 97-108
Mobile platforms and systems
- Steffen Schulz, Ahmad-Reza Sadeghi, Christian Wachsmann:

Short paper: lightweight remote attestation using physical functions. 109-114 - Jonathan Voris, Nitesh Saxena, Tzipora Halevi:

Accelerometers and randomness: perfect together. 115-126 - Hristo Bojinov, Dan Boneh, Rich Cannings, Iliyan Malchev:

Address space randomization for mobile devices. 127-138
Cryptographic authentication
- Isabelle Hang, Markus Ullmann, Christian Wieschebrink:

Short paper: a new identity-based DH key-agreement protocol for wireless sensor networks based on the Arazi-Qi scheme. 139-144 - Gildas Avoine, Cédric Lauradoux, Benjamin Martin:

How secret-sharing can defeat terrorist fraud. 145-156
VANETS
- Bisheng Liu, Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu:

Short paper: a practical view of "mixing" identities in vehicular networks. 157-162 - Hsu-Chun Hsiao

, Ahren Studer, Rituik Dubey, Elaine Shi, Adrian Perrig:
Efficient and secure threshold-based event validation for VANETs. 163-174

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














