


Остановите войну!
for scientists:


default search action
Nikita Borisov
Person information

- affiliation: University of Illinois at Urbana-Champaign, IL, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c81]Hussein Darir, Geir E. Dullerud, Nikita Borisov:
ProbFlow : Using Probabilistic Programming in Anonymous Communication Networks. NDSS 2023 - 2022
- [j13]Hussein Darir
, Hussein Sibai, Chin-Yu Cheng, Nikita Borisov, Geir E. Dullerud, Sayan Mitra:
MLEFlow: Learning from History to Improve Load Balancing in Tor. Proc. Priv. Enhancing Technol. 2022(1): 75-104 (2022) - [i24]Hussein Darir, Nikita Borisov, Geir E. Dullerud:
DiProber: Using Dual Probing to Estimate Tor Relay Capacities in Underloaded Networks. CoRR abs/2211.16751 (2022) - 2021
- [c80]Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li:
Detecting AI Trojans Using Meta Neural Analysis. SP 2021: 103-120 - [e5]Nikita Borisov, Claudia Díaz:
Financial Cryptography and Data Security - 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part I. Lecture Notes in Computer Science 12674, Springer 2021, ISBN 978-3-662-64321-1 [contents] - [e4]Nikita Borisov, Claudia Díaz:
Financial Cryptography and Data Security - 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part II. Lecture Notes in Computer Science 12675, Springer 2021, ISBN 978-3-662-64330-3 [contents] - 2020
- [j12]Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis
, J. Alex Halderman, Nikita Borisov, Eric Wustrow:
Running Refraction Networking for Real. Proc. Priv. Enhancing Technol. 2020(4): 321-335 (2020) - [c79]Nguyen Phong Hoang, Arian Akhavan Niaki
, Nikita Borisov, Phillipa Gill, Michalis Polychronakis:
Assessing the Privacy Benefits of Domain Name Encryption. AsiaCCS 2020: 290-304
2010 – 2019
- 2019
- [c78]Simran Patil, Nikita Borisov:
What can you learn from an IP? ANRW 2019: 45-51 - [c77]Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow:
Conjure: Summoning Proxies from Unused Address Space. CCS 2019: 2215-2229 - [c76]Amin Kharraz, Zane Ma, Paul Murley, Charles Lever, Joshua Mason, Andrew Miller, Nikita Borisov, Manos Antonakakis, Michael Bailey:
Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild. WWW 2019: 840-852 - [i23]Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li:
Detecting AI Trojans Using Meta Neural Analysis. CoRR abs/1910.03137 (2019) - [i22]Nguyen Phong Hoang, Arian Akhavan Niaki, Nikita Borisov, Phillipa Gill, Michalis Polychronakis:
Assessing the Privacy Benefits of Domain Name Encryption. CoRR abs/1911.00563 (2019) - 2018
- [j11]Anupam Das, Nikita Borisov, Edward Chou:
Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures. Proc. Priv. Enhancing Technol. 2018(1): 88-108 (2018) - [c75]Sergey Frolov, Eric Wustrow, Frederick Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis
, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman:
An ISP-Scale Deployment of TapDance. ANRW 2018: 22 - [c74]Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, Nikita Borisov:
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. CCS 2018: 619-633 - [c73]Anupam Das, Gunes Acar, Nikita Borisov, Amogh Pradeep:
The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors. CCS 2018: 1515-1532 - [c72]Hussein Darir
, Hussein Sibai, Nikita Borisov, Geir E. Dullerud, Sayan Mitra:
TightRope: Towards Optimal Load-balancing of Paths in Anonymous Networks. WPES@CCS 2018: 76-85 - [i21]Qingrong Chen, Chong Xiang, Minhui Xue, Bo Li, Nikita Borisov, Dali Kaafar, Haojin Zhu:
Differentially Private Data Generative Models. CoRR abs/1812.02274 (2018) - 2017
- [j10]Amir Houmansadr
, Wenxuan Zhou, Matthew Caesar, Nikita Borisov:
SWEET: Serving the Web by Exploiting Email Tunnels. IEEE/ACM Trans. Netw. 25(3): 1517-1527 (2017) - [c71]Abhiram Kothapalli, Andrew Miller, Nikita Borisov:
SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts. Financial Cryptography Workshops 2017: 536-552 - [c70]Rashid Tahir
, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl A. Gunter, Fareed Zaffar, Matthew Caesar, Nikita Borisov:
Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises. RAID 2017: 287-310 - [c69]Sergey Frolov, Frederick Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman, Eric Wustrow:
An ISP-Scale Deployment of TapDance. FOCI @ USENIX Security Symposium 2017 - 2016
- [c68]Haiming Jin, Lu Su, Bolin Ding, Klara Nahrstedt, Nikita Borisov:
Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems. ICDCS 2016: 344-353 - [c67]Anupam Das, Nikita Borisov, Matthew Caesar:
Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses. NDSS 2016 - [i20]Anupam Das, Nikita Borisov, Edward Chou, Muhammad Haris Mughees:
Smartphone Fingerprinting Via Motion Sensors: Analyzing Feasiblity at Large-Scale and Studing Real Usage Patterns. CoRR abs/1605.08763 (2016) - 2015
- [j9]Nikita Borisov, George Danezis, Ian Goldberg:
DP5: A Private Presence Service. Proc. Priv. Enhancing Technol. 2015(2): 4-24 (2015) - [j8]Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, Matthew Caesar:
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction. Proc. Priv. Enhancing Technol. 2015(2): 171-187 (2015) - [i19]Anupam Das, Nikita Borisov, Matthew Caesar:
Exploring Ways To Mitigate Sensor-Based Smartphone Fingerprinting. CoRR abs/1503.01874 (2015) - 2014
- [j7]Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
Non-Blind Watermarking of Network Flows. IEEE/ACM Trans. Netw. 22(4): 1232-1244 (2014) - [c66]Anupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar:
Re3: relay reliability reputation for anonymity systems. AsiaCCS 2014: 63-74 - [c65]Anupam Das, Nikita Borisov, Matthew Caesar:
Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components. CCS 2014: 441-452 - [c64]Anupam Das, Nikita Borisov, Matthew Caesar:
Analyzing an adaptive reputation metric for anonymity systems. HotSoS 2014: 11 - [c63]Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, XiaoFeng Wang:
The Tangled Web of Password Reuse. NDSS 2014 - [i18]Anupam Das, Nikita Borisov, Matthew Caesar:
Fingerprinting Smart Devices Through Embedded Acoustic Components. CoRR abs/1403.3366 (2014) - [i17]Joshua Juen, Anupam Das, Aaron Johnson, Nikita Borisov, Matthew Caesar:
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction. CoRR abs/1410.1823 (2014) - 2013
- [j6]Saman A. Zonouz, Amir Houmansadr, Robin Berthier, Nikita Borisov, William H. Sanders:
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Comput. Secur. 37: 215-227 (2013) - [j5]Amir Houmansadr, Nikita Borisov:
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets. J. Syst. Softw. 86(3): 707-715 (2013) - [c62]Giang T. K. Nguyen, Xun Gong, Anupam Das, Nikita Borisov:
PnP: improving web browsing performance over tor using web resource prefetch-and-push. CCS 2013: 1433-1436 - [c61]Anupam Das, Nikita Borisov:
Securing Anonymous Communication Channels under the Selective DoS Attack. Financial Cryptography 2013: 362-370 - [c60]Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer:
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. NDSS 2013 - [c59]Prateek Mittal, Matthew K. Wright, Nikita Borisov:
Pisces: Anonymous Communication Using Social Networks. NDSS 2013: 1-18 - [c58]Qiyan Wang, Zi Lin, Nikita Borisov, Nicholas Hopper:
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation. NDSS 2013 - [c57]Amir Houmansadr, Nikita Borisov:
The Need for Flow Fingerprints to Link Correlated Network Flows. Privacy Enhancing Technologies 2013: 205-224 - 2012
- [j4]Prateek Mittal, Nikita Borisov:
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems. ACM Trans. Inf. Syst. Secur. 15(1): 5:1-5:28 (2012) - [c56]Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov:
CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing. CCS 2012: 121-132 - [c55]Nikita Borisov:
11th workshop on privacy in the electronic society. CCS 2012: 1064-1065 - [c54]Shirin Nilizadeh, Sonia Jahid, Prateek Mittal, Nikita Borisov, Apu Kapadia:
Cachet: a decentralized architecture for privacy preserving social networking with caching. CoNEXT 2012: 337-348 - [c53]Qiyan Wang, Nikita Borisov:
Octopus: A Secure and Anonymous DHT Lookup. ICDCS 2012: 325-334 - [c52]Prateek Mittal, Matthew Caesar, Nikita Borisov:
X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks. NDSS 2012 - [c51]Sonia Jahid, Shirin Nilizadeh, Prateek Mittal, Nikita Borisov, Apu Kapadia:
DECENT: A decentralized architecture for enforcing privacy in online social networks. PerCom Workshops 2012: 326-332 - [c50]Xun Gong, Nikita Borisov, Negar Kiyavash, Nabil Schear:
Website Detection Using Remote Traffic Analysis. Privacy Enhancing Technologies 2012: 58-78 - [e3]Ting Yu, Nikita Borisov:
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, WPES 2012, Raleigh, NC, USA, October 15, 2012. ACM 2012, ISBN 978-1-4503-1663-7 [contents] - [i16]Frank Li, Prateek Mittal, Matthew Caesar, Nikita Borisov:
SybilControl: Practical Sybil Defense with Computational Puzzles. CoRR abs/1201.2657 (2012) - [i15]Negar Kiyavash, Amir Houmansadr, Nikita Borisov:
Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures. CoRR abs/1203.1390 (2012) - [i14]Amir Houmansadr, Nikita Borisov:
BotMosaic: Collaborative Network Watermark for Botnet Detection. CoRR abs/1203.1568 (2012) - [i13]Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov:
CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing. CoRR abs/1203.1673 (2012) - [i12]Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
Non-blind watermarking of network flows. CoRR abs/1203.2273 (2012) - [i11]Qiyan Wang, Nikita Borisov:
Octopus: A Secure and Anonymous DHT Lookup. CoRR abs/1203.2668 (2012) - [i10]Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer:
IP over Voice-over-IP for censorship circumvention. CoRR abs/1207.2683 (2012) - [i9]Sonia Jahid, Nikita Borisov:
PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption. CoRR abs/1208.4877 (2012) - [i8]Prateek Mittal, Matthew K. Wright, Nikita Borisov:
Pisces: Anonymous Communication Using Social Networks. CoRR abs/1208.6326 (2012) - [i7]Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, Nikita Borisov:
SWEET: Serving the Web by Exploiting Email Tunnels. CoRR abs/1211.3191 (2012) - 2011
- [j3]Robin Snader, Nikita Borisov:
Improving Security and Performance in the Tor Network through Tunable Path Selection. IEEE Trans. Dependable Secur. Comput. 8(5): 728-741 (2011) - [c49]Kazuhiro Minami, Nikita Borisov, Marianne Winslett, Adam J. Lee
:
Confidentiality-preserving proof theories for distributed proof systems. AsiaCCS 2011: 145-154 - [c48]Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov:
Cirripede: circumvention infrastructure using router redirection with plausible deniability. CCS 2011: 187-200 - [c47]Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov:
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. CCS 2011: 215-226 - [c46]Sonia Jahid, Prateek Mittal, Nikita Borisov:
EASiER: encryption-based access control in social networks with efficient revocation. AsiaCCS 2011: 411-415 - [c45]Amir Houmansadr, Nikita Borisov:
Towards improving network flow watermarks using the repeat-accumulate codes. ICASSP 2011: 1852-1855 - [c44]Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal
, Vijit Singh, Pragya Agarwal, Nikita Borisov:
Stegobot: A Covert Social Network Botnet. Information Hiding 2011: 299-313 - [c43]Amir Houmansadr, Nikita Borisov:
CoCo: Coding-Based Covert Timing Channels for Network Flows. Information Hiding 2011: 314-328 - [c42]Amir Houmansadr, Nikita Borisov:
SWIRL: A Scalable Watermark to Detect Correlated Network Flows. NDSS 2011 - [c41]Shishir Nagaraja, Virajith Jalaparti, Matthew Caesar, Nikita Borisov:
P3CA: Private Anomaly Detection Across ISP Networks. PETS 2011: 38-56 - [c40]Prateek Mittal, Femi G. Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg:
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. USENIX Security Symposium 2011 - [i6]Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov:
Stegobot: construction of an unobservable communication network leveraging social behavior. CoRR abs/1107.2031 (2011) - [i5]Anupam Das, Nikita Borisov:
Securing Tor Tunnels under the Selective-DoS Attack. CoRR abs/1107.3863 (2011) - [i4]Xun Gong, Negar Kiyavash, Nabil Schear, Nikita Borisov:
Website Detection Using Remote Traffic Analysis. CoRR abs/1109.0097 (2011) - [i3]Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov:
Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting. CoRR abs/1109.0597 (2011) - [i2]Prateek Mittal, Matthew Caesar, Nikita Borisov:
X-Vine: Secure and Pseudonymous Routing Using Social Networks. CoRR abs/1109.0971 (2011) - [i1]Sonia Jahid, Shirin Nilizadeh, Prateek Mittal, Nikita Borisov, Apu Kapadia:
A Decentralized Architecture for Enforcing Privacy in Online Social Networks. CoRR abs/1111.5377 (2011) - 2010
- [j2]Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka
:
Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach. KSII Trans. Internet Inf. Syst. 4(3): 380-399 (2010) - [c39]Qiyan Wang, Prateek Mittal, Nikita Borisov:
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems. CCS 2010: 308-318 - [c38]Xun Gong, Negar Kiyavash, Nikita Borisov:
Fingerprinting websites using remote traffic analysis. CCS 2010: 684-686 - [c37]Kazuhiro Minami, Nikita Borisov:
Protecting location privacy against inference attacks. CCS 2010: 711-713 - [c36]Sachin Kadloor, Xun Gong, Negar Kiyavash, Tolga Tezcan, Nikita Borisov:
Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks. ICC 2010: 1-5 - [c35]Prateek Mittal, Nikita Borisov, Carmela Troncoso, Alfredo Rial:
Scalable Anonymous Communication with Provable Security. HotSec 2010 - [c34]Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov:
BotGrep: Finding P2P Bots with Structured Graph Analysis. USENIX Security Symposium 2010: 95-110 - [c33]Kazuhiro Minami, Nikita Borisov:
Protecting location privacy against inference attacks. WPES 2010: 123-126
2000 – 2009
- 2009
- [c32]Prateek Mittal, Nikita Borisov:
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. CCS 2009: 161-172 - [c31]Adam J. Lee
, Kazuhiro Minami, Nikita Borisov:
Confidentiality-preserving distributed proofs of conjunctive queries. AsiaCCS 2009: 287-297 - [c30]Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
Multi-flow attack resistant watermarks for network flows. ICASSP 2009: 1497-1500 - [c29]Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka
:
Attacking and Repairing the Improved ModOnions Protocol. ICISC 2009: 258-273 - [c28]Robin Snader, Nikita Borisov:
EigenSpeed: secure peer-to-peer bandwidth evaluation. IPTPS 2009: 9 - [c27]Amir Houmansadr, Negar Kiyavash, Nikita Borisov:
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. NDSS 2009 - [c26]Kazuhiro Minami, Nikita Borisov, Carl A. Gunter:
Safety in discretionary access control for logic-based publish-subscribe systems. SACMAT 2009: 3-12 - [c25]Matthew M. Lucas, Nikita Borisov:
flyByNight: mitigating the privacy risks of social networking. SOUPS 2009 - 2008
- [c24]Nikita Borisov, Soumyadeb Mitra:
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance. ACNS 2008: 373-391 - [c23]Prateek Mittal, Nikita Borisov:
Information leaks in structured peer-to-peer anonymous communication systems. CCS 2008: 267-278 - [c22]Soumyadeb Mitra, Marianne Winslett, Nikita Borisov:
Deleting index entries from compliance storage. EDBT 2008: 109-120 - [c21]Robin Snader, Nikita Borisov:
A Tune-up for Tor: Improving Security and Performance in the Tor Network. NDSS 2008 - [c20]Nabil Schear, David R. Albrecht, Nikita Borisov:
High-Speed Matching of Vulnerability Signatures. RAID 2008: 155-174 - [c19]Negar Kiyavash, Amir Houmansadr, Nikita Borisov:
Multi-flow Attacks Against Network Flow Watermarking Schemes. USENIX Security Symposium 2008: 307-320 - [c18]Matthew M. Lucas, Nikita Borisov:
FlyByNight: mitigating the privacy risks of social networking. WPES 2008: 1-8 - [c17]Kazuhiro Minami, Adam J. Lee
, Marianne Winslett, Nikita Borisov:
Secure aggregation in a publish-subscribe system. WPES 2008: 95-104 - [e2]Nikita Borisov, Ian Goldberg:
Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings. Lecture Notes in Computer Science 5134, Springer 2008, ISBN 978-3-540-70629-8 [contents] - 2007
- [c16]Jodie P. Boyer, Ragib Hasan
, Lars E. Olson, Nikita Borisov, Carl A. Gunter, David Raila:
Improving multi-tier security using redundant authentication. CSAW 2007: 54-62 - [c15]Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz:
Denial of service or denial of security? CCS 2007: 92-102 - [c14]Nikita Borisov, David Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, Chuanxiong Guo:
Generic Application-Level Protocol Analyzer and its Language. NDSS 2007 - [c13]Nikita Borisov, Kazuhiro Minami:
Single-bit re-encryption with applications to distributed proof systems. WPES 2007: 48-55 - [e1]Nikita Borisov, Philippe Golle:
Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4776, Springer 2007, ISBN 978-3-540-75550-0 [contents] - 2006
- [c12]Nikita Borisov:
Computational Puzzles as Sybil Defenses. Peer-to-Peer Computing 2006: 171-176 - [c11]Parisa Tabriz, Nikita Borisov:
Breaking the Collusion Detection Mechanism of MorphMix. Privacy Enhancing Technologies 2006: 368-383 - [c10]Jianqing Zhang, Nikita Borisov, William Yurcik:
Outsourcing Security Analysis with Anonymized Logs. SecureComm 2006: 1-9 - [c9]Adam J. Lee
, Parisa Tabriz, Nikita Borisov:
A privacy-preserving interdomain audit framework. WPES 2006: 99-108 - 2005
- [c8]Qiang Huang, Helen J. Wang, Nikita Borisov:
Privacy-Preserving Friends Troubleshooting Network. NDSS 2005 - [c7]Nikita Borisov:
An Analysis of Parallel Mixing with Attacker-Controlled Inputs. Privacy Enhancing Technologies 2005: 12-25 - [c6]Nikita Borisov, Robert Johnson:
Fixing Races for Fun and Profit: How to Abuse atime. USENIX Security Symposium 2005 - 2004
- [c5]Nikita Borisov, Ian Goldberg, Eric A. Brewer
:
Off-the-record communication, or, why not to use PGP. WPES 2004: 77-84 - [r1]Nikita Borisov:
Challenges in Wireless Security. Mobile Computing Handbook 2004 - 2002
- [c4]