ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
Latest Publications
TOTAL DOCUMENTS
10
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By ACM Press
1581137699
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
On the security of wireless network access with enhancements
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
◽
10.1145/941311.941325
◽
2003
◽
Cited By ~ 16
Author(s):
Lein Harn
◽
Wen-Jung Hsin
Keyword(s):
Wireless Network
◽
Network Access
Download Full-text
BISS
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
◽
10.1145/941311.941316
◽
2003
◽
Cited By ~ 22
Author(s):
Srdjan Capkun
◽
Jean-Pierre Hubaux
Download Full-text
ESCORT
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
◽
10.1145/941311.941320
◽
2003
◽
Cited By ~ 2
Author(s):
Jiejun Kong
◽
Shirshanka Das
◽
Edward Tsai
◽
Mario Gerla
Download Full-text
Secure verification of location claims
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
◽
10.1145/941311.941313
◽
2003
◽
Cited By ~ 314
Author(s):
Naveen Sastry
◽
Umesh Shankar
◽
David Wagner
Download Full-text
Wireless LAN location-sensing for security applications
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
◽
10.1145/941311.941314
◽
2003
◽
Cited By ~ 51
Author(s):
Ping Tao
◽
Algis Rudys
◽
Andrew M. Ladd
◽
Dan S. Wallach
Keyword(s):
Wireless Lan
◽
Security Applications
◽
Location Sensing
Download Full-text
On securely enabling intermediary-based services and performance enhancements for wireless mobile users
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
◽
10.1145/941311.941321
◽
2003
◽
Cited By ~ 9
Author(s):
Sneha Kasera
◽
Semyon Mizikovsky
◽
Ganapathy S. Sundaram
◽
Thomas Y. C. Woo
Keyword(s):
Mobile Users
◽
And Performance
◽
Wireless Mobile
Download Full-text
Rushing attacks and defense in wireless ad hoc network routing protocols
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
◽
10.1145/941311.941317
◽
2003
◽
Cited By ~ 89
Author(s):
Yih-Chun Hu
◽
Adrian Perrig
◽
David B. Johnson
Keyword(s):
Routing Protocols
◽
Ad Hoc Network
◽
Ad Hoc
◽
Network Routing
◽
Wireless Ad Hoc Network
Download Full-text
Secure data transmission in mobile ad hoc networks
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
◽
10.1145/941311.941318
◽
2003
◽
Cited By ~ 99
Author(s):
Panagiotis Papadimitratos
◽
Zygmunt J. Haas
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Data Transmission
◽
Ad Hoc
◽
Secure Data
◽
Secure Data Transmission
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
An authentication framework for hierarchical ad hoc sensor networks
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
◽
10.1145/941311.941324
◽
2003
◽
Cited By ~ 23
Author(s):
Mathias Bohge
◽
Wade Trappe
Keyword(s):
Sensor Networks
◽
Ad Hoc
◽
Ad Hoc Sensor Networks
Download Full-text
Alert aggregation in mobile ad hoc networks
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
◽
10.1145/941311.941323
◽
2003
◽
Cited By ~ 30
Author(s):
Bo Sun
◽
Kui Wu
◽
Udo W. Pooch
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close