Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Proxy-based security protocols in networked mobile devices
Proceedings of the 2002 ACM symposium on Applied computing
Handbook of wireless networks and mobile computing
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Securing ad hoc services, a Jini view: extended abstract
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
SPINS: security protocols for sensor networks
Wireless Networks
System Software for Ubiquitous Computing
IEEE Pervasive Computing
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
The Resurrecting Duckling - What Next?
Revised Papers from the 8th International Workshop on Security Protocols
A Ubiquitous Control Architecture for Low Power Systems
ARCS '02 Proceedings of the International Conference on Architecture of Computing Systems: Trends in Network and Pervasive Computing
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Relationship Management: Secure Collaboration in a Ubiquitous Environment
IEEE Pervasive Computing
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Authenticity in a reliable protocol for mobile computing
Proceedings of the 2003 ACM symposium on Applied computing
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Crypto-based identifiers (CBIDs): Concepts and applications
ACM Transactions on Information and System Security (TISSEC)
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Secure long term communities in ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Quality of service in mobile ad hoc networks
The handbook of ad hoc wireless networks
Unicast routing techniques for mobile ad hoc networks
The handbook of ad hoc wireless networks
Security in wireless ad hoc networks
The handbook of ad hoc wireless networks
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Security issues in ad hoc networks
The handbook of ad hoc wireless networks
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Key distribution techniques for sensor networks
Wireless sensor networks
Peer-to-Peer Security in Mobile Devices: A User Perspective
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
A framework of secure location service for position-based ad hoc routing
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
The Implications of Pervasive Computing on Network Design
BT Technology Journal
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
Wireless Personal Communications: An International Journal
An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mobile Phones as Computing Devices: The Viruses are Coming!
IEEE Pervasive Computing
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Preventing Impersonation Attacks in MANET with Multi-Factor Authentication
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Facilitating secure ad hoc service discovery in public environments
Journal of Systems and Software - Special issue: Computer software & applications
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Hotspot-based traceback for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
Deeply embedded XML communication: towards an interoperable and seamless world
Proceedings of the 5th ACM international conference on Embedded software
The claim tool kit for ad hoc recognition of peer entities
Science of Computer Programming - Special issue on principles and practice of programming in java (PPPJ 2003)
Authentication protocols for ad hoc networks: taxonomy and research issues
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Security and usability engineering with particular attention to electronic mail
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols
IEEE Transactions on Mobile Computing
An efficient key establishment scheme for secure aggregating sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Performance Comparison of Trust-Based Reactive Routing Protocols
IEEE Transactions on Mobile Computing
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
The Green Card Protocol: An Identification Protocol for Decentralized Systems
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Protecting domestic power-line communications
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Scheduling sleeping nodes in high density cluster-based sensor networks
Mobile Networks and Applications
Integrity regions: authentication through presence in wireless networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Location privacy in wireless personal area networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Using Battery Constraints within Mobile Hosts to Improve Network Security
IEEE Security and Privacy
Security awareness in service discovery for multimedia collaboration
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
A platform for dynamic spectrum access network experimentation
TAPAS '06 Proceedings of the first international workshop on Technology and policy for accessing spectrum
Design and implementation of a secure wide-area object middleware
Computer Networks: The International Journal of Computer and Telecommunications Networking
Context-aware access to public shared devices
Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
Plug-and-play PKI: a PKI your mother can use
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Network-in-a-box: how to set up a secure wireless network in under a minute
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
A canonical seed assignment model for key predistribution in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A software-based trust framework for distributed industrial management systems
Journal of Systems and Software
Integrating a trust framework with a distributed certificate validation scheme for MANETs
EURASIP Journal on Wireless Communications and Networking
Toward secure and scalable time synchronization in ad hoc networks
Computer Communications
Sahnet: a secure system for ad-hoc networking using ecc
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Multichannel Security Protocols
IEEE Pervasive Computing
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes
Proceedings of the 5th international conference on Embedded networked sensor systems
Authenticating ad hoc networks by comparison of short digests
Information and Computation
Wireless client puzzles in IEEE 802.11 networks: security by wireless
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Mind your manners: socially appropriate wireless key establishment for groups
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Simple and effective defense against evil twin access points
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Analysis of routing security-energy trade-offs in wireless sensor networks
International Journal of Security and Networks
Collaborative Dynamic Source Routing using transitional trust filters
International Journal of Information and Computer Security
Service sharing with trust in pervasive environment: now it's time to break the jinx
Proceedings of the 2008 ACM symposium on Applied computing
Securing wireless communication against wormhole attacks
EHAC'05 Proceedings of the 4th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
A security policy system for mobile autonomic networks
Proceedings of the 1st international conference on Autonomic computing and communication systems
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
Computer Communications
Seamless service interworking of ad-hoc networks and the Internet
Computer Communications
Enhanced intrusion detection systems in ad hoc networks using a grid based agnostic middleware
Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing
Anonymous Routing for Mobile Wireless Ad Hoc Networks
International Journal of Distributed Sensor Networks - Heterogenous Wireless Ad Hoc and Sensor Networks
Secure communication over radio channels
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
Universal device pairing using an auxiliary device
Proceedings of the 4th symposium on Usable privacy and security
GAnGS: gather, authenticate 'n group securely
Proceedings of the 14th ACM international conference on Mobile computing and networking
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
Mixed Key Management Using Hamming Distance for Mobile Ad-Hoc Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part II
Trust-Rated Authentication for Domain-Structured Distributed Systems
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
A Demonstrative Ad Hoc Attestation System
ISC '08 Proceedings of the 11th international conference on Information Security
HAPADEP: Human-Assisted Pure Audio Device Pairing
ISC '08 Proceedings of the 11th international conference on Information Security
Cognitive security for personal devices
Proceedings of the 1st ACM workshop on Workshop on AISec
Spontaneous mobile device authentication based on sensor data
Information Security Tech. Report
Delay management in delay-tolerant networks
International Journal of Network Management
Automated Device Pairing for Asymmetric Pairing Scenarios
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Concrete Security for Entity Recognition: The Jane Doe Protocol
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Absence makes the heart grow fonder: new directions for implantable medical device security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Unidirectional key distribution across time and space with applications to RFID security
SS'08 Proceedings of the 17th conference on Security symposium
ACM Transactions on Computer-Human Interaction (TOCHI)
Proximity-based authentication of mobile devices
International Journal of Security and Networks
Secure pairing of interface constrained devices
International Journal of Security and Networks
Secure pairing with biometrics
International Journal of Security and Networks
Seeing-Is-Believing: using camera phones for human-verifiable authentication
International Journal of Security and Networks
Standards for security associations in personal networks: a comparative analysis
International Journal of Security and Networks
Security and privacy issues in mobile learning
International Journal of Mobile Learning and Organisation
Information Systems Frontiers
Auxiliary channel Diffie-Hellman encrypted key-exchange authentication
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
SPATE: small-group PKI-less authenticated trust establishment
Proceedings of the 7th international conference on Mobile systems, applications, and services
Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
LoCA '09 Proceedings of the 4th International Symposium on Location and Context Awareness
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Serial hook-ups: a comparative usability study of secure device pairing methods
Proceedings of the 5th Symposium on Usable Privacy and Security
Information protection via environmental data tethers
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
A Secure Spontaneous Ad-Hoc Network to Share Internet Access
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
Mitigating routing vulnerabilities in ad hoc networks using reputations
International Journal of Information and Computer Security
An on-demand key establishment protocol for MANETs
International Journal of Wireless and Mobile Computing
Balanced-energy sleep scheduling scheme for high-density cluster-based sensor networks
Computer Communications
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
A framework for seamless service interworking in ad-hoc networks
Computer Communications
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
A comparative study of secure device pairing methods
Pervasive and Mobile Computing
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
CIIT '07 The Sixth IASTED International Conference on Communications, Internet, and Information Technology
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
CIIT '07 The Sixth IASTED International Conference on Communications, Internet, and Information Technology
On attack-resilient wireless sensor networks with novel recovery strategies
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Usable key agreement in home networks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
User-centered design of a secure P2P personal and social networking platform
HCI '08 Proceedings of the Third IASTED International Conference on Human Computer Interaction
Mobile user location-specific encryption (MULE): using your office as your password
Proceedings of the third ACM conference on Wireless network security
REDMAN: An optimistic replication middleware for read-only resources in dense MANETs
Pervasive and Mobile Computing
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
A practical study on security of agent-based ubiquitous computing
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
An efficient certificate authority for ad hoc networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
The candidate key protocol for generating secret shared keys from similar sensor data streams
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
ALGSICS: combining physics and cryptography to enhance security and privacy in RFID systems
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Network coding protocols for secret key distribution
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Efficient device pairing using "Human-comparable" synchronized audiovisual patterns
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Steel, cast iron and concrete: security engineering for real world wireless sensor networks
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
A visual way to talk to strangers: authentication in wireless pervasive computing
International Journal of Ad Hoc and Ubiquitous Computing
Repairing the bluetooth pairing protocol
Proceedings of the 13th international conference on Security protocols
Proceedings of the 13th international conference on Security protocols
A secure communication scheme for mobile wireless sensor networks using hamming distance
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
On the connectivity of key-distribution strategies in wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Ensemble: cooperative proximity-based authentication
Proceedings of the 8th international conference on Mobile systems, applications, and services
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
IEEE Journal on Selected Areas in Communications
A Serverless Instant Messaging Protocol for Mobile Ad Hoc Networks
C5 '10 Proceedings of the 2010 Eighth International Conference on Creating, Connecting and Collaborating through Computing
Energy efficient learning solution for intrusion detection in wireless sensor networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Group device pairing based secure sensor association and key management for body area networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Survivable RFID systems: issues, challenges, and techniques
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
GesturePIN: using discrete gestures for associating mobile devices
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
Groupthink: usability of secure group association for wireless devices
Proceedings of the 12th ACM international conference on Ubiquitous computing
Proceedings of the 17th ACM conference on Computer and communications security
Interconnecting Smart Objects with IP: The Next Internet
Interconnecting Smart Objects with IP: The Next Internet
Cryptanalysis of a message recognition protocol by Mashatan and Stinson
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Authenticated key agreement with key re-use in the short authenticated strings model
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
A message recognition protocol based on standard assumptions
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Fault-models in wireless communication: towards survivable ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A spontaneous ad hoc network to share WWW access
EURASIP Journal on Wireless Communications and Networking
COSR: a reputation-based secure route protocol in MANET
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
inTUIt: simple identification on tangible user interfaces
Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction
Multi-channel key agreement using encrypted public key exchange
Proceedings of the 15th international conference on Security protocols
A framework for secure device pairing by demonstration of physical proximity
Proceedings of the 8th International Conference on Frontiers of Information Technology
A decentralized approach to secure management of nodes in distributed sensor networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
Shared RSA key generation in a mobile ad hoc network
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
Journal of Computer Security
How users associate wireless devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Pairing devices for social interactions: a comparative usability evaluation
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
On the (im)possibility of perennial message recognition protocols without public-key cryptography
Proceedings of the 2011 ACM Symposium on Applied Computing
Home-network threats and access controls
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Secure in-band wireless pairing
SEC'11 Proceedings of the 20th USENIX conference on Security
Spatial co-location for device association: the connected object way
Proceedings of the 2011 international workshop on Networking and object memories for the internet of things
Secure negotiation for manual authentication protocols
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
ACS'11 Proceedings of the 11th WSEAS international conference on Applied computer science
Using mobile device screens for authentication
Proceedings of the 23rd Australian Computer-Human Interaction Conference
Trust extension as a mechanism for secure code execution on commodity computers
Trust extension as a mechanism for secure code execution on commodity computers
Proceedings of the 27th Annual Computer Security Applications Conference
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Decentralised access control in 802.11 networks
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
RAMP: a reputation-aware multi-hop routing protocol in wireless ad-hoc networks
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Body sensor network key distribution using human interactive channels
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Re-identifying anonymous nodes
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Trust-based route selection in dynamic source routing
iTrust'06 Proceedings of the 4th international conference on Trust Management
An efficient authentication and simplified certificate status management for personal area networks
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
Noisy tags: a pretty good key exchange protocol for RFID tags
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
An authentication protocol for pervasive computing
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
SKiMPy: a simple key management protocol for MANETs in emergency and rescue operations
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A two-tier intrusion detection system for mobile ad hoc networks – a friend approach
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Anonymous routing in wireless mobile ad hoc networks to prevent location disclosure attacks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
One user, many hats; and, sometimes, no hat: towards a secure yet usable PDA
SP'04 Proceedings of the 12th international conference on Security Protocols
An efficient key-update scheme for wireless sensor networks
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part I
Usability classification for spontaneous device association
Personal and Ubiquitous Computing
Single sign-on and key establishment for ubiquitous smart environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
An open approach for designing secure electronic immobilizers
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Ephemeral pairing on anonymous networks
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Exploiting empirical engagement in authentication protocol design
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
An efficient access control model for mobile ad-hoc communities
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A security architecture for mobile wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
“Fair” authentication in pervasive computing
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Instant matchmaking: simple and secure integrated ubiquitous computing environments
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Re-visited: denial of service resilient access control for wireless sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Cryptographic protocol to establish trusted history of interactions
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Ad hoc security associations for groups
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Practical schemes for privacy and security enhanced RFID
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
High-Power proxies for enhancing RFID privacy and utility
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
SecureSafe: a highly secure online data safe industrial use case
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
SP'11 Proceedings of the 19th international conference on Security Protocols
When context is better than identity: authentication by context using empirical channels
SP'11 Proceedings of the 19th international conference on Security Protocols
Certified lies: detecting and defeating government interception attacks against SSL (short paper)
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
A review of routing protocols for mobile ad hoc networks
WSEAS TRANSACTIONS on COMMUNICATIONS
An overview of anonymous communications in mobile ad hoc networks
Wireless Communications & Mobile Computing
Key agreement in ad hoc networks
Computer Communications
Distinguishing users with capacitive touch communication
Proceedings of the 18th annual international conference on Mobile computing and networking
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Gone in 360 seconds: Hijacking with Hitag2
Security'12 Proceedings of the 21st USENIX conference on Security symposium
A key-distribution mechanism for wireless sensor networks using Zig-Zag product
International Journal of Ad Hoc and Ubiquitous Computing
Trustworthiness and authentication in ubiquitous computing
Proceedings of the 10th ACM international symposium on Mobility management and wireless access
Self-organizing life cycle management of mobile ad hoc networks
Security and Communication Networks
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
Secure and Private Service Discovery in Pervasive Computing Environments
International Journal of Advanced Pervasive and Ubiquitous Computing
Street-Level trust semantics for attribute authentication (transcript of discussion)
SP'12 Proceedings of the 20th international conference on Security Protocols
Am i in good company? a privacy-protecting protocol for cooperating ubiquitous computing devices
SP'12 Proceedings of the 20th international conference on Security Protocols
Survivability Enhancing Techniques for RFID Systems
International Journal of Handheld Computing Research
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
MultiNet: reducing interaction overhead in domestic wireless networks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Balancing security and utility in medical devices?
Proceedings of the 50th Annual Design Automation Conference
SafeSlinger: easy-to-use and secure public-key exchange
Proceedings of the 19th annual international conference on Mobile computing & networking
Attacks on Confidentiality of Communications Between Stranger Organizations
International Journal of Knowledge-Based Organizations
Heart-to-heart (H2H): authentication for implanted medical devices
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Secure SMS based automatic device pairing approach for mobile phones
ICIC'13 Proceedings of the 9th international conference on Intelligent Computing Theories and Technology
Go anywhere: user-verifiable authentication over distance-free channel for mobile devices
Personal and Ubiquitous Computing
Hi-index | 0.00 |