Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2009
- Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng:
Attacks and improvements to an RIFD mutual authentication protocol and its extensions. WISEC 2009: 51-58 - Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu:
Secure and precise location verification using distance bounding and simultaneous multilateration. WISEC 2009: 181-192 - Jared Cordasco, Susanne Wetzel:
An attacker model for MANET routing security. WISEC 2009: 87-94 - Emiliano De Cristofaro, Jens-Matthias Bohli, Dirk Westhoff:
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks. WISEC 2009: 253-260 - Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. WISEC 2009: 111-122 - Christopher Ferguson, Qijun Gu, Hongchi Shi:
Self-healing control flow protection in sensor applications. WISEC 2009: 213-224 - Morten Tranberg Hansen:
Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks. WISEC 2009: 13-20 - Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, Jinhui Xu:
Towards a theory for securing time synchronization in wireless sensor networks. WISEC 2009: 201-212 - Florian Kerschbaum, Alessandro Sorniotti:
RFID-based supply chain partner authentication and key agreement. WISEC 2009: 41-50 - William Kozma, Loukas Lazos:
REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. WISEC 2009: 103-110 - Loukas Lazos, Sisi Liu, Marwan Krunz:
Mitigating control-channel jamming attacks in multi-channel ad hoc networks. WISEC 2009: 169-180 - Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, Michael Roe:
Privacy-preserving 802.11 access-point discovery. WISEC 2009: 123-130 - Joseph K. Liu, Joonsang Baek, Jianying Zhou:
Certificate-based sequential aggregate signature. WISEC 2009: 21-28 - Ivan Martinovic, Paul Pichota, Jens B. Schmitt:
Jamming for good: a fresh approach to authentic communication in WSNs. WISEC 2009: 161-168 - Yossef Oren, Martin Feldhofer:
A low-resource public-key identification scheme for RFID tags and sensor nodes. WISEC 2009: 59-68 - Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Collaborative authentication in unattended WSNs. WISEC 2009: 237-244 - Sevil Sen, John Andrew Clark:
A grammatical evolution approach to intrusion detection on mobile ad hoc networks. WISEC 2009: 95-102 - Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, Jean-Pierre Hubaux:
A practical secure neighbor verification protocol for wireless sensor networks. WISEC 2009: 193-200 - David Slater, Patrick Tague, Radha Poovendran, Brian J. Matt:
A coding-theoretic approach for efficient message verification over insecure channels. WISEC 2009: 151-160 - Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan:
Securing network access in wireless sensor networks. WISEC 2009: 261-268 - Petr Svenda, Lukás Sekanina, Václav Matyás:
Evolutionary design of secrecy amplification protocols for wireless sensor networks. WISEC 2009: 225-236 - Piotr Szczechowiak, Anton Kargl, Michael Scott, Martin Collier:
On the application of pairing based cryptography to wireless sensor networks. WISEC 2009: 1-12 - Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha:
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. WISEC 2009: 245-252 - Erik Tews, Martin Beck:
Practical attacks against WEP and WPA. WISEC 2009: 79-86 - Osman Ugus, Dirk Westhoff, Jens-Matthias Bohli:
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme. WISEC 2009: 29-40 - Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia, Dong Xuan, Jin Teng:
Stealthy video capturer: a new video-based spyware in 3G smartphones. WISEC 2009: 69-78 - Guanhua Yan, Stephan J. Eidenbenz, Bo Sun:
Mobi-watchdog: you can steal, but you can't run! WISEC 2009: 139-150 - Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan:
Link-layer protection in 802.11i WLANS with dummy authentication. WISEC 2009: 131-138 - David A. Basin, Srdjan Capkun, Wenke Lee:
Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009. ACM 2009, ISBN 978-1-60558-460-7 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-20 18:27 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint