callback( { "result":{ "query":":facetid:toc:\"db/conf/wisec/wisec2012.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.41" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"20", "@dc":"20", "@oc":"20", "@id":"43432024", "text":":facetid:toc:db/conf/wisec/wisec2012.bht" } }, "hits":{ "@total":"20", "@computed":"20", "@sent":"20", "@first":"0", "hit":[{ "@score":"1", "@id":"4508875", "info":{"authors":{"author":[{"@pid":"06/6119","text":"Syed Taha Ali"},{"@pid":"63/6049","text":"Vijay Sivaraman"},{"@pid":"14/5304","text":"Diethelm Ostry"}]},"title":"Zero reconciliation secret key generation for body-worn health monitoring devices.","venue":"WISEC","pages":"39-50","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/AliSO12","doi":"10.1145/2185448.2185455","ee":"https://doi.org/10.1145/2185448.2185455","url":"https://dblp.org/rec/conf/wisec/AliSO12"}, "url":"URL#4508875" }, { "@score":"1", "@id":"4508876", "info":{"authors":{"author":[{"@pid":"a/GildasAvoine","text":"Gildas Avoine"},{"@pid":"70/5358","text":"Iwen Coisel"},{"@pid":"57/7630","text":"Tania Martin"}]},"title":"A privacy-restoring mechanism for offline RFID systems.","venue":"WISEC","pages":"63-74","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/AvoineCM12","doi":"10.1145/2185448.2185458","ee":"https://doi.org/10.1145/2185448.2185458","url":"https://dblp.org/rec/conf/wisec/AvoineCM12"}, "url":"URL#4508876" }, { "@score":"1", "@id":"4508877", "info":{"authors":{"author":[{"@pid":"97/6100","text":"Raghav Bhaskar"},{"@pid":"63/1704","text":"Ragesh Jaiswal"},{"@pid":"51/11186","text":"Sidharth Telang"}]},"title":"Congestion lower bounds for secure in-network aggregation.","venue":"WISEC","pages":"197-204","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/BhaskarJT12","doi":"10.1145/2185448.2185474","ee":"https://doi.org/10.1145/2185448.2185474","url":"https://dblp.org/rec/conf/wisec/BhaskarJT12"}, "url":"URL#4508877" }, { "@score":"1", "@id":"4508878", "info":{"authors":{"author":[{"@pid":"46/10265","text":"Patrick P. F. Chan"},{"@pid":"h/LucasChiKwongHui","text":"Lucas Chi Kwong Hui"},{"@pid":"y/SiuMingYiu","text":"Siu-Ming Yiu"}]},"title":"DroidChecker: analyzing android applications for capability leak.","venue":"WISEC","pages":"125-136","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/ChanHY12","doi":"10.1145/2185448.2185466","ee":"https://doi.org/10.1145/2185448.2185466","url":"https://dblp.org/rec/conf/wisec/ChanHY12"}, "url":"URL#4508878" }, { "@score":"1", "@id":"4508879", "info":{"authors":{"author":[{"@pid":"72/7604","text":"Kaoutar Elkhiyaoui"},{"@pid":"14/2769","text":"Erik-Oliver Blass"},{"@pid":"m/RefikMolva","text":"Refik Molva"}]},"title":"CHECKER: on-site checking in RFID-based supply chains.","venue":"WISEC","pages":"173-184","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/ElkhiyaouiBM12","doi":"10.1145/2185448.2185471","ee":"https://doi.org/10.1145/2185448.2185471","url":"https://dblp.org/rec/conf/wisec/ElkhiyaouiBM12"}, "url":"URL#4508879" }, { "@score":"1", "@id":"4508880", "info":{"authors":{"author":{"@pid":"f/EdwardWFelten","text":"Edward W. Felten"}},"title":"Toward a healthy wireless privacy ecosystem.","venue":"WISEC","pages":"1-2","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/Felten12","doi":"10.1145/2185448.2185450","ee":"https://doi.org/10.1145/2185448.2185450","url":"https://dblp.org/rec/conf/wisec/Felten12"}, "url":"URL#4508880" }, { "@score":"1", "@id":"4508881", "info":{"authors":{"author":[{"@pid":"15/9578","text":"Koorosh Firouzbakht"},{"@pid":"25/5432","text":"Guevara Noubir"},{"@pid":"41/806","text":"Masoud Salehi"}]},"title":"On the capacity of rate-adaptive packetized wireless communication links under jamming.","venue":"WISEC","pages":"3-14","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/FirouzbakhtNS12","doi":"10.1145/2185448.2185452","ee":"https://doi.org/10.1145/2185448.2185452","url":"https://dblp.org/rec/conf/wisec/FirouzbakhtNS12"}, "url":"URL#4508881" }, { "@score":"1", "@id":"4508882", "info":{"authors":{"author":[{"@pid":"94/1900","text":"Michael C. Grace"},{"@pid":"14/7096-1","text":"Wu Zhou 0001"},{"@pid":"80/6988","text":"Xuxian Jiang"},{"@pid":"s/AhmadRezaSadeghi","text":"Ahmad-Reza Sadeghi"}]},"title":"Unsafe exposure analysis of mobile in-app advertisements.","venue":"WISEC","pages":"101-112","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/GraceZJS12","doi":"10.1145/2185448.2185464","ee":"https://doi.org/10.1145/2185448.2185464","url":"https://dblp.org/rec/conf/wisec/GraceZJS12"}, "url":"URL#4508882" }, { "@score":"1", "@id":"4508883", "info":{"authors":{"author":[{"@pid":"89/8524","text":"Chang-Han Jong"},{"@pid":"20/2659","text":"Virgil D. Gligor"}]},"title":"Private communication detection: a stochastic approach.","venue":"WISEC","pages":"75-86","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/JongG12","doi":"10.1145/2185448.2185459","ee":"https://doi.org/10.1145/2185448.2185459","url":"https://dblp.org/rec/conf/wisec/JongG12"}, "url":"URL#4508883" }, { "@score":"1", "@id":"4508884", "info":{"authors":{"author":{"@pid":"k/TadayoshiKohno","text":"Tadayoshi Kohno"}},"title":"Security for cyber-physical systems: case studies with medical devices, robots, and automobiles.","venue":"WISEC","pages":"99-100","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/Kohno12","doi":"10.1145/2185448.2185462","ee":"https://doi.org/10.1145/2185448.2185462","url":"https://dblp.org/rec/conf/wisec/Kohno12"}, "url":"URL#4508884" }, { "@score":"1", "@id":"4508885", "info":{"authors":{"author":[{"@pid":"60/6791","text":"Di Ma"},{"@pid":"55/11186","text":"Anudath K. Prasad"},{"@pid":"25/1169","text":"Nitesh Saxena"},{"@pid":"70/11191","text":"Tuo Xiang"}]},"title":"Location-aware and safer cards: enhancing RFID security and privacy via location sensing.","venue":"WISEC","pages":"51-62","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/MaPSX12","doi":"10.1145/2185448.2185457","ee":"https://doi.org/10.1145/2185448.2185457","url":"https://dblp.org/rec/conf/wisec/MaPSX12"}, "url":"URL#4508885" }, { "@score":"1", "@id":"4508886", "info":{"authors":{"author":[{"@pid":"20/7881","text":"Andrew Newell"},{"@pid":"c/RezaCurtmola","text":"Reza Curtmola"},{"@pid":"n/CristinaNitaRotaru","text":"Cristina Nita-Rotaru"}]},"title":"Entropy attacks and countermeasures in wireless network coding.","venue":"WISEC","pages":"185-196","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/NewellCN12","doi":"10.1145/2185448.2185473","ee":"https://doi.org/10.1145/2185448.2185473","url":"https://dblp.org/rec/conf/wisec/NewellCN12"}, "url":"URL#4508886" }, { "@score":"1", "@id":"4508887", "info":{"authors":{"author":[{"@pid":"23/11190","text":"Aanjhan Ranganathan"},{"@pid":"90/422","text":"Boris Danev"},{"@pid":"88/3343","text":"Aurélien Francillon"},{"@pid":"51/1639","text":"Srdjan Capkun"}]},"title":"Physical-layer attacks on chirp-based ranging systems.","venue":"WISEC","pages":"15-26","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/RanganathanDFC12","doi":"10.1145/2185448.2185453","ee":"https://doi.org/10.1145/2185448.2185453","url":"https://dblp.org/rec/conf/wisec/RanganathanDFC12"}, "url":"URL#4508887" }, { "@score":"1", "@id":"4508888", "info":{"authors":{"author":[{"@pid":"94/4745-1","text":"Steffen Schulz 0001"},{"@pid":"s/AhmadRezaSadeghi","text":"Ahmad-Reza Sadeghi"},{"@pid":"29/11187","text":"Maria Zhdanova"},{"@pid":"209/9651","text":"Hossen Asiful Mustafa"},{"@pid":"10/3878-1","text":"Wenyuan Xu 0001"},{"@pid":"v/VijayVaradharajan","text":"Vijay Varadharajan"}]},"title":"Tetherway: a framework for tethering camouflage.","venue":"WISEC","pages":"149-160","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/SchulzSZMXV12","doi":"10.1145/2185448.2185468","ee":"https://doi.org/10.1145/2185448.2185468","url":"https://dblp.org/rec/conf/wisec/SchulzSZMXV12"}, "url":"URL#4508888" }, { "@score":"1", "@id":"4508889", "info":{"authors":{"author":[{"@pid":"42/11188","text":"Lu Shi"},{"@pid":"l/MingLi3","text":"Ming Li 0003"},{"@pid":"21/5356","text":"Shucheng Yu"},{"@pid":"03/11190","text":"Jiawei Yuan"}]},"title":"BANA: body area network authentication exploiting channel characteristics.","venue":"WISEC","pages":"27-38","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/ShiLYY12","doi":"10.1145/2185448.2185454","ee":"https://doi.org/10.1145/2185448.2185454","url":"https://dblp.org/rec/conf/wisec/ShiLYY12"}, "url":"URL#4508889" }, { "@score":"1", "@id":"4508890", "info":{"authors":{"author":[{"@pid":"56/2124","text":"Tao Shu"},{"@pid":"47/2755","text":"Marwan Krunz"}]},"title":"Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing.","venue":"WISEC","pages":"87-98","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/ShuK12","doi":"10.1145/2185448.2185460","ee":"https://doi.org/10.1145/2185448.2185460","url":"https://dblp.org/rec/conf/wisec/ShuK12"}, "url":"URL#4508890" }, { "@score":"1", "@id":"4508891", "info":{"authors":{"author":[{"@pid":"54/3497-1","text":"Sheng Wei 0001"},{"@pid":"p/MiodragPotkonjak","text":"Miodrag Potkonjak"}]},"title":"Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection.","venue":"WISEC","pages":"161-172","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/WeiP12","doi":"10.1145/2185448.2185470","ee":"https://doi.org/10.1145/2185448.2185470","url":"https://dblp.org/rec/conf/wisec/WeiP12"}, "url":"URL#4508891" }, { "@score":"1", "@id":"4508892", "info":{"authors":{"author":[{"@pid":"50/3857-4","text":"Zhi Xu 0004"},{"@pid":"56/2984","text":"Kun Bai"},{"@pid":"40/2231","text":"Sencun Zhu"}]},"title":"TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors.","venue":"WISEC","pages":"113-124","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/XuBZ12","doi":"10.1145/2185448.2185465","ee":"https://doi.org/10.1145/2185448.2185465","url":"https://dblp.org/rec/conf/wisec/XuBZ12"}, "url":"URL#4508892" }, { "@score":"1", "@id":"4508893", "info":{"authors":{"author":[{"@pid":"74/4952","text":"Yuanyuan Zeng"},{"@pid":"s/KangGShin","text":"Kang G. Shin"},{"@pid":"13/6380-1","text":"Xin Hu 0001"}]},"title":"Design of SMS commanded-and-controlled and P2P-structured mobile botnets.","venue":"WISEC","pages":"137-148","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wisec/ZengSH12","doi":"10.1145/2185448.2185467","ee":"https://doi.org/10.1145/2185448.2185467","url":"https://dblp.org/rec/conf/wisec/ZengSH12"}, "url":"URL#4508893" }, { "@score":"1", "@id":"4517075", "info":{"authors":{"author":[{"@pid":"47/2755","text":"Marwan Krunz"},{"@pid":"15/3615","text":"Loukas Lazos"},{"@pid":"73/6934","text":"Roberto Di Pietro"},{"@pid":"72/5440","text":"Wade Trappe"}]},"title":"Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012","venue":"WISEC","publisher":"ACM","year":"2012","type":"Editorship","key":"conf/wisec/2012","ee":"http://dl.acm.org/citation.cfm?id=2185448","url":"https://dblp.org/rec/conf/wisec/2012"}, "url":"URL#4517075" } ] } } } )