


default search action
ACM Workshop on Wireless Security 2004: Philadelphia, PA, USA
- Markus Jakobsson, Adrian Perrig:

Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004. ACM 2004, ISBN 1-58113-925-X
Secure services
- George Theodorakopoulos

, John S. Baras:
Trust evaluation in ad-hoc networks. 1-10 - Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-Rotaru:

JANUS: towards robust and malicious resilient routing in hybrid wireless networks. 11-20 - Loukas Lazos, Radha Poovendran:

SeRLoc: secure range-independent localization for wireless sensor networks. 21-30
Invited Presentation 1
- Ari Juels:

RFID: security and privacy for five-cent wireless devices. 31
Security analysis
- Naveen Sastry, David A. Wagner:

Security considerations for IEEE 802.15.4 networks. 32-42 - Changhua He, John C. Mitchell:

Analysis of the 802.11i 4-way handshake. 43-50
Attack detection
- Weichao Wang, Bharat K. Bhargava:

Visualization of wormholes in sensor networks. 51-60 - Bo Sun, Fei Richard Yu, Kui Wu, Victor C. M. Leung:

Mobility-based anomaly detection in cellular mobile networks. 61-69
Wireless monitoring and denial of service
- Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala:

A framework for wireless LAN monitoring and its applications. 70-79 - Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang:

Channel surfing and spatial retreats: defenses against wireless denial of service. 80-89 - Ulrike Meyer, Susanne Wetzel:

A man-in-the-middle attack on UMTS. 90-97

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














