Abstract is missing.
- On the application of pairing based cryptography to wireless sensor networksPiotr Szczechowiak, Anton Kargl, Michael Scott, Martin Collier. 1-12 [doi]
- Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networksMorten Tranberg Hansen. 13-20 [doi]
- Certificate-based sequential aggregate signatureJoseph K. Liu, Joonsang Baek, Jianying Zhou. 21-28 [doi]
- A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature schemeOsman Ugus, Dirk Westhoff, Jens-Matthias Bohli. 29-40 [doi]
- RFID-based supply chain partner authentication and key agreementFlorian Kerschbaum, Alessandro Sorniotti. 41-50 [doi]
- Attacks and improvements to an RIFD mutual authentication protocol and its extensionsShaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng. 51-58 [doi]
- A low-resource public-key identification scheme for RFID tags and sensor nodesYossef Oren, Martin Feldhofer. 59-68 [doi]
- Stealthy video capturer: a new video-based spyware in 3G smartphonesNan Xu, Fan Zhang, Yisha Luo, Weijia Jia, Dong Xuan, Jin Teng. 69-78 [doi]
- Practical attacks against WEP and WPAErik Tews, Martin Beck. 79-86 [doi]
- An attacker model for MANET routing securityJared Cordasco, Susanne Wetzel. 87-94 [doi]
- A grammatical evolution approach to intrusion detection on mobile ad hoc networksSevil Sen, John Andrew Clark. 95-102 [doi]
- REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random auditsWilliam Kozma, Loukas Lazos. 103-110 [doi]
- Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networksJing Dong, Reza Curtmola, Cristina Nita-Rotaru. 111-122 [doi]
- Privacy-preserving 802.11 access-point discoveryJanne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, Michael Roe. 123-130 [doi]
- Link-layer protection in 802.11i WLANS with dummy authenticationZhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan. 131-138 [doi]
- Mobi-watchdog: you can steal, but you can t run!Guanhua Yan, Stephan Eidenbenz, Bo Sun. 139-150 [doi]
- A coding-theoretic approach for efficient message verification over insecure channelsDavid Slater, Patrick Tague, Radha Poovendran, Brian J. Matt. 151-160 [doi]
- Jamming for good: a fresh approach to authentic communication in WSNsIvan Martinovic, Paul Pichota, Jens B. Schmitt. 161-168 [doi]
- Mitigating control-channel jamming attacks in multi-channel ad hoc networksLoukas Lazos, Sisi Liu, Marwan Krunz. 169-180 [doi]
- Secure and precise location verification using distance bounding and simultaneous multilaterationJerry T. Chiang, Jason J. Haas, Yih-Chun Hu. 181-192 [doi]
- A practical secure neighbor verification protocol for wireless sensor networksReza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, Jean-Pierre Hubaux. 193-200 [doi]
- Towards a theory for securing time synchronization in wireless sensor networksMurtuza Jadliwala, Qi Duan, Shambhu Upadhyaya, Jinhui Xu. 201-212 [doi]
- Self-healing control flow protection in sensor applicationsChristopher Ferguson, Qijun Gu, Hongchi Shi. 213-224 [doi]
- Evolutionary design of secrecy amplification protocols for wireless sensor networksPetr Svenda, Lukás Sekanina, Václav Matyás. 225-236 [doi]
- Collaborative authentication in unattended WSNsRoberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik. 237-244 [doi]
- A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networksHailun Tan, Diethelm Ostry, John Zic, Sanjay Jha. 245-252 [doi]
- FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networksEmiliano De Cristofaro, Jens-Matthias Bohli, Dirk Westhoff. 253-260 [doi]
- Securing network access in wireless sensor networksKun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan. 261-268 [doi]