Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/wisec/wisec2012.bht:"
@inproceedings{DBLP:conf/wisec/AliSO12, author = {Syed Taha Ali and Vijay Sivaraman and Diethelm Ostry}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Zero reconciliation secret key generation for body-worn health monitoring devices}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {39--50}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185455}, doi = {10.1145/2185448.2185455}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AliSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AvoineCM12, author = {Gildas Avoine and Iwen Coisel and Tania Martin}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {A privacy-restoring mechanism for offline {RFID} systems}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {63--74}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185458}, doi = {10.1145/2185448.2185458}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AvoineCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BhaskarJT12, author = {Raghav Bhaskar and Ragesh Jaiswal and Sidharth Telang}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Congestion lower bounds for secure in-network aggregation}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {197--204}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185474}, doi = {10.1145/2185448.2185474}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/BhaskarJT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChanHY12, author = {Patrick P. F. Chan and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {DroidChecker: analyzing android applications for capability leak}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {125--136}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185466}, doi = {10.1145/2185448.2185466}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ChanHY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ElkhiyaouiBM12, author = {Kaoutar Elkhiyaoui and Erik{-}Oliver Blass and Refik Molva}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {{CHECKER:} on-site checking in RFID-based supply chains}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {173--184}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185471}, doi = {10.1145/2185448.2185471}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ElkhiyaouiBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Felten12, author = {Edward W. Felten}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Toward a healthy wireless privacy ecosystem}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {1--2}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185450}, doi = {10.1145/2185448.2185450}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Felten12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FirouzbakhtNS12, author = {Koorosh Firouzbakht and Guevara Noubir and Masoud Salehi}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {On the capacity of rate-adaptive packetized wireless communication links under jamming}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {3--14}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185452}, doi = {10.1145/2185448.2185452}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FirouzbakhtNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GraceZJS12, author = {Michael C. Grace and Wu Zhou and Xuxian Jiang and Ahmad{-}Reza Sadeghi}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Unsafe exposure analysis of mobile in-app advertisements}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {101--112}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185464}, doi = {10.1145/2185448.2185464}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GraceZJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JongG12, author = {Chang{-}Han Jong and Virgil D. Gligor}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Private communication detection: a stochastic approach}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {75--86}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185459}, doi = {10.1145/2185448.2185459}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/JongG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Kohno12, author = {Tadayoshi Kohno}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Security for cyber-physical systems: case studies with medical devices, robots, and automobiles}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {99--100}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185462}, doi = {10.1145/2185448.2185462}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Kohno12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MaPSX12, author = {Di Ma and Anudath K. Prasad and Nitesh Saxena and Tuo Xiang}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Location-aware and safer cards: enhancing {RFID} security and privacy via location sensing}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {51--62}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185457}, doi = {10.1145/2185448.2185457}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MaPSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NewellCN12, author = {Andrew Newell and Reza Curtmola and Cristina Nita{-}Rotaru}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Entropy attacks and countermeasures in wireless network coding}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {185--196}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185473}, doi = {10.1145/2185448.2185473}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/NewellCN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RanganathanDFC12, author = {Aanjhan Ranganathan and Boris Danev and Aur{\'{e}}lien Francillon and Srdjan Capkun}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Physical-layer attacks on chirp-based ranging systems}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {15--26}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185453}, doi = {10.1145/2185448.2185453}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/RanganathanDFC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchulzSZMXV12, author = {Steffen Schulz and Ahmad{-}Reza Sadeghi and Maria Zhdanova and Hossen Asiful Mustafa and Wenyuan Xu and Vijay Varadharajan}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Tetherway: a framework for tethering camouflage}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {149--160}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185468}, doi = {10.1145/2185448.2185468}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SchulzSZMXV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShiLYY12, author = {Lu Shi and Ming Li and Shucheng Yu and Jiawei Yuan}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {{BANA:} body area network authentication exploiting channel characteristics}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {27--38}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185454}, doi = {10.1145/2185448.2185454}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ShiLYY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShuK12, author = {Tao Shu and Marwan Krunz}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {87--98}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185460}, doi = {10.1145/2185448.2185460}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ShuK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WeiP12, author = {Sheng Wei and Miodrag Potkonjak}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {161--172}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185470}, doi = {10.1145/2185448.2185470}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/WeiP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/XuBZ12, author = {Zhi Xu and Kun Bai and Sencun Zhu}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {113--124}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185465}, doi = {10.1145/2185448.2185465}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/XuBZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZengSH12, author = {Yuanyuan Zeng and Kang G. Shin and Xin Hu}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Design of {SMS} commanded-and-controlled and P2P-structured mobile botnets}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {137--148}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185467}, doi = {10.1145/2185448.2185467}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ZengSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2012, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2185448}, isbn = {978-1-4503-1265-3}, timestamp = {Thu, 19 Apr 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.