


default search action
5. WISEC 2012: Tucson, AZ, USA
- Marwan Krunz, Loukas Lazos, Roberto Di Pietro, Wade Trappe:

Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012. ACM 2012, ISBN 978-1-4503-1265-3
Keynote address 1
- Edward W. Felten:

Toward a healthy wireless privacy ecosystem. 1-2
Physical layer security for wireless systems
- Koorosh Firouzbakht, Guevara Noubir, Masoud Salehi

:
On the capacity of rate-adaptive packetized wireless communication links under jamming. 3-14 - Aanjhan Ranganathan

, Boris Danev, Aurélien Francillon
, Srdjan Capkun:
Physical-layer attacks on chirp-based ranging systems. 15-26 - Lu Shi, Ming Li, Shucheng Yu

, Jiawei Yuan:
BANA: body area network authentication exploiting channel characteristics. 27-38 - Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:

Zero reconciliation secret key generation for body-worn health monitoring devices. 39-50
Privacy in wireless systems
- Di Ma

, Anudath K. Prasad, Nitesh Saxena, Tuo Xiang:
Location-aware and safer cards: enhancing RFID security and privacy via location sensing. 51-62 - Gildas Avoine, Iwen Coisel, Tania Martin:

A privacy-restoring mechanism for offline RFID systems. 63-74 - Chang-Han Jong, Virgil D. Gligor:

Private communication detection: a stochastic approach. 75-86 - Tao Shu, Marwan Krunz:

Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing. 87-98
Keynote address 2
- Tadayoshi Kohno:

Security for cyber-physical systems: case studies with medical devices, robots, and automobiles. 99-100
Mobile device and application security
- Michael C. Grace, Wu Zhou, Xuxian Jiang, Ahmad-Reza Sadeghi:

Unsafe exposure analysis of mobile in-app advertisements. 101-112 - Zhi Xu, Kun Bai, Sencun Zhu:

TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. 113-124 - Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:

DroidChecker: analyzing android applications for capability leak. 125-136 - Yuanyuan Zeng, Kang G. Shin, Xin Hu:

Design of SMS commanded-and-controlled and P2P-structured mobile botnets. 137-148 - Steffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova

, Hossen Asiful Mustafa
, Wenyuan Xu, Vijay Varadharajan
:
Tetherway: a framework for tethering camouflage. 149-160
Supply chain and manufacturing security
- Sheng Wei, Miodrag Potkonjak:

Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection. 161-172 - Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva

:
CHECKER: on-site checking in RFID-based supply chains. 173-184
Foundations of wireless network security
- Andrew Newell, Reza Curtmola, Cristina Nita-Rotaru:

Entropy attacks and countermeasures in wireless network coding. 185-196 - Raghav Bhaskar, Ragesh Jaiswal

, Sidharth Telang:
Congestion lower bounds for secure in-network aggregation. 197-204

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














