Sciweavers

9 search results - page 1 / 2
» wisec 2009
Sort
View
138
Voted
WISEC
2009
ACM
15 years 10 months ago
Practical attacks against WEP and WPA
Erik Tews, Martin Beck
101
Voted
WISEC
2009
ACM
15 years 10 months ago
Privacy-preserving 802.11 access-point discovery
Janne Lindqvist, Tuomas Aura, George Danezis, Teem...
112
Voted
WISEC
2009
ACM
15 years 10 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel
134
Voted
WISEC
2009
ACM
15 years 10 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
124
Voted
WISEC
2009
ACM
15 years 10 months ago
Jamming for good: a fresh approach to authentic communication in WSNs
While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast mediu...
Ivan Martinovic, Paul Pichota, Jens B. Schmitt