Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 41 matches
- 2017
- Moreno Ambrosin, Stefano Cecconello, Mauro Conti, Daniele Lain:
A roaming-based denial of service attack on LTE networks: poster. WISEC 2017: 283-284 - Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise:
Toward secure and efficient attestation for highly dynamic swarms: poster. WISEC 2017: 281-282 - S. Abhishek Anand, Nitesh Saxena:
Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping. WISEC 2017: 173-183 - Benjamin Andow, Akhil Acharya, Dengfeng Li, William Enck, Kapil Singh, Tao Xie:
UiRef: analysis of sensitive user inputs in Android applications. WISEC 2017: 23-34 - Amira Barki, Nicolas Desmoulins, Saïd Gharout, Jacques Traoré:
Anonymous attestations made practical. WISEC 2017: 87-98 - Kenneth Block, Sashank Narain, Guevara Noubir:
An autonomic and permissionless Android covert channel. WISEC 2017: 184-194 - Ioana Boureanu, David Gérault, Pascal Lafourcade, Cristina Onete:
Breaking and fixing the HB+DB protocol. WISEC 2017: 241-246 - Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Bao Anh N. Tran, Sreejaya Viswanathan, Younghee Park, Yih-Chun Hu:
Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks. WISEC 2017: 52-57 - Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiao-yong Zhou, Michael Grace:
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps. WISEC 2017: 122-133 - Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik:
HYDRA: hybrid design for remote attestation (using a formally verified microkernel). WISEC 2017: 99-110 - C. Eun, J. Moon, Im Young Jung, D. Lee, J. Park, E. Kim:
Secure infotainment infrastructure of connected car: poster. WISEC 2017: 267-268 - Lilatul Ferdouse, Lutful Karim, Alagan Anpalagan:
Reliability model for multimedia cloud networks: poster. WISEC 2017: 265-266 - Akinobu Fukuzaki, Noriaki Koide, Noboru Sonehara:
TTPP method for validation of k-anonymity on wi-fi association log data: poster. WISEC 2017: 275-276 - Peizhao Hu, Sherman S. M. Chow, Asma Aloufi:
Geosocial query with user-controlled privacy. WISEC 2017: 163-172 - Peter Iannucci, Hari Balakrishnan:
Challenges to PHY anonymity for wi-fi. WISEC 2017: 259-264 - Ahmad Ibrahim, Ahmad-Reza Sadeghi, Shaza Zeitouni:
SeED: secure non-interactive attestation for embedded devices. WISEC 2017: 64-74 - Vittorio P. Illiano, Rodrigo Vieira Steiner, Emil C. Lupu:
Unity is strength!: combining attestation and measurements inspection to handle malicious data injections in WSNs. WISEC 2017: 134-144 - RhongHo Jang, DongGyu Cho, Aziz Mohaisen, Youngtae Noh, DaeHun Nyang:
Two-level network monitoring and management in WLAN using software-defined networking: poster. WISEC 2017: 279-280 - RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Highly-accurate rogue access point detection using intentional channel interference: poster. WISEC 2017: 277-278 - Kai Jansen, Christina Pöpper:
Advancing attacker models of satellite-based localization systems: the case of multi-device attackers. WISEC 2017: 156-159 - Hongyu Jin, Panos Papadimitratos:
Resilient privacy protection for location-based services through decentralization. WISEC 2017: 253-258 - Hongyu Jin, Panos Papadimitratos:
Bloom filter based certificate validation for VANET: poster. WISEC 2017: 273-274 - Joshua Joy, Dylan Gray, Ciaran McGoldrick, Mario Gerla:
Scalable privacy: poster. WISEC 2017: 271-272 - Joshua Joy, Martin Verde, Keshav Tadimeti, Tyler Lindberg, Mario Gerla:
CrowdZen privacy: poster. WISEC 2017: 269-270 - Mohammed Shafiul Alam Khan, Chris J. Mitchell:
Trashing IMSI catchers in mobile networks. WISEC 2017: 207-218 - Jun Young Kim, Wen Hu, Dilip Sarkar, Sanjay Jha:
ESIoT: enabling secure management of the internet of things. WISEC 2017: 219-229 - Florian Kohnhäuser, Niklas Büscher, Sebastian Gabmeyer, Stefan Katzenbeisser:
SCAPI: a scalable attestation protocol to detect software and physical attacks. WISEC 2017: 75-86 - Virendra Kumar, Jonathan Petit, William Whyte:
Binary hash tree based certificate access management for connected vehicles. WISEC 2017: 145-155 - Minzhao Lyu, Daniel Sherratt, Arunan Sivanathan, Hassan Habibi Gharakheili, Adam Radford, Vijay Sivaraman:
Quantifying the reflective DDoS attack capability of household IoT devices. WISEC 2017: 46-51 - Philipp Morgner, Stephan Mattejat, Zinaida Benenson, Christian Müller, Frederik Armknecht:
Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning. WISEC 2017: 230-240
skipping 11 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 07:51 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint