Abstract is missing.
- Timing-based localization of in-band wormhole tunnels in MANETsJinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Thomas, Lang Tong. 1-12 [doi]
- RFID survivability quantification and attack modelingYanjun Zuo. 13-18 [doi]
- Subverting MIMO wireless systems by jamming the channel estimation procedureRob Miller, Wade Trappe. 19-24 [doi]
- Preventing multi-query attack in location-based servicesNilothpal Talukder, Sheikh Iqbal Ahamed. 25-36 [doi]
- pBMDS: a behavior-based malware detection system for cellphone devicesLiang Xie, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu. 37-48 [doi]
- Efficient compromising resilient authentication schemes for large scale wireless sensor networksHao Chen. 49-54 [doi]
- Low-cost untraceable authentication protocols for RFIDYong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede. 55-64 [doi]
- A secure and scalable identification for hash-based RFID systems using updatable pre-computationYasunobu Nohara, Sozo Inoue. 65-74 [doi]
- On the tradeoff between trust and privacy in wireless ad hoc networksMaxim Raya, Reza Shokri, Jean-Pierre Hubaux. 75-80 [doi]
- Automating the injection of believable decoys to detect snoopingBrian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo. 81-86 [doi]
- Providing security with insecure systemsAndrew M. Odlyzko. 87-88 [doi]
- Attacks on physical-layer identificationBoris Danev, Heinrich Luecken, Srdjan Capkun, Karim M. El Defrawy. 89-98 [doi]
- Zeroing-in on network metric minima for sink location determinationZhenhua Liu, Wenyuan Xu. 99-104 [doi]
- Privacy-preserving computation of benchmarks on item-level data using RFIDFlorian Kerschbaum, Nina Oertel, Leonardo Weiss Ferreira Chaves. 105-110 [doi]
- On the efficiency of secure beaconing in VANETsElmar Schoch, Frank Kargl. 111-116 [doi]
- Effectiveness of distance-decreasing attacks against impulse radio rangingManuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux, Jean-Yves Le Boudec. 117-128 [doi]
- honeyM: a framework for implementing virtual honeyclients for mobile devicesT. J. O'Connor, Benjamin Sangster. 129-138 [doi]
- Secret keys from entangled sensor motes: implementation and analysisMatthias Wilhelm, Ivan Martinovic, Jens B. Schmitt. 139-144 [doi]
- Efficient code diversification for network reprogramming in sensor networksQijun Gu. 145-150 [doi]
- Mobile user location-specific encryption (MULE): using your office as your passwordAhren Studer, Adrian Perrig. 151-162 [doi]
- Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networksQi Mi, John A. Stankovic, Radu Stoleru. 163-168 [doi]
- On the reliability of wireless fingerprinting using clock skewsChrisil Arackaparambil, Sergey Bratus, Anna Shubina, David Kotz. 169-174 [doi]