Sciweavers

17 search results - page 1 / 4
» wisec 2010
Sort
View
WISEC
2010
ACM
13 years 11 months ago
On the efficiency of secure beaconing in VANETs
Elmar Schoch, Frank Kargl
WISEC
2010
ACM
13 years 11 months ago
Low-cost untraceable authentication protocols for RFID
Yong Ki Lee, Lejla Batina, Dave Singelée, I...
WISEC
2010
ACM
13 years 2 months ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu
WISEC
2010
ACM
13 years 9 months ago
Zeroing-in on network metric minima for sink location determination
The locations of base stations are critically important to the viability of wireless sensor networks. In this paper, we examine the location privacy problem from both the attack a...
Zhenhua Liu, Wenyuan Xu
WISEC
2010
ACM
13 years 11 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...