ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06
Latest Publications
TOTAL DOCUMENTS
13
(FIVE YEARS 0)
H-INDEX
8
(FIVE YEARS 0)
Published By ACM Press
1595935576
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06
◽
10.1145/1161289.1161303
◽
2006
◽
Cited By ~ 12
Author(s):
Dijiang Huang
Keyword(s):
Communication Systems
◽
Traffic Analysis
◽
Ieee 802.11B
Download Full-text
Securing wireless systems via lower layer enforcements
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06
◽
10.1145/1161289.1161297
◽
2006
◽
Cited By ~ 97
Author(s):
Zang Li
◽
Wenyuan Xu
◽
Rob Miller
◽
Wade Trappe
Keyword(s):
Lower Layer
◽
Wireless Systems
Download Full-text
Location privacy in wireless personal area networks
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06
◽
10.1145/1161289.1161292
◽
2006
◽
Cited By ~ 6
Author(s):
Dave Singelée
◽
Bart Preneel
Keyword(s):
Location Privacy
◽
Personal Area Networks
◽
Wireless Personal Area Networks
Download Full-text
Detecting identity-based attacks in wireless networks using signalprints
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06
◽
10.1145/1161289.1161298
◽
2006
◽
Cited By ~ 140
Author(s):
Daniel B. Faria
◽
David R. Cheriton
Keyword(s):
Wireless Networks
◽
Identity Based
Download Full-text
RFID security and privacy concerns
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06
◽
10.1145/1161289.1161295
◽
2006
◽
Cited By ~ 1
Author(s):
Nicholas Tsougas
Keyword(s):
Security And Privacy
◽
Privacy Concerns
◽
Rfid Security
Download Full-text
Proactive security for mobile messaging networks
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06
◽
10.1145/1161289.1161307
◽
2006
◽
Cited By ~ 18
Author(s):
Abhijit Bose
◽
Kang G. Shin
Keyword(s):
Proactive Security
Download Full-text
Modeling Ad-hoc rushing attack in a negligibility-based security framework
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06
◽
10.1145/1161289.1161302
◽
2006
◽
Cited By ~ 4
Author(s):
Jiejun Kong
◽
Xiaoyan Hong
◽
Mario Gerla
Keyword(s):
Ad Hoc
◽
Security Framework
Download Full-text
Security in sensor networks
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06
◽
10.1145/1161289.1161300
◽
2006
◽
Author(s):
Adrian Perrig
Keyword(s):
Sensor Networks
Download Full-text
SCUBA
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06
◽
10.1145/1161289.1161306
◽
2006
◽
Cited By ~ 105
Author(s):
Arvind Seshadri
◽
Mark Luk
◽
Adrian Perrig
◽
Leendert van Doorn
◽
Pradeep Khosla
Download Full-text
Integrity regions
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06
◽
10.1145/1161289.1161291
◽
2006
◽
Cited By ~ 6
Author(s):
Srdjan Čapkun
◽
Mario Čagalj
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close