Abstract is missing.
- Trust evaluation in ad-hoc networksGeorge Theodorakopoulos, John S. Baras. 1-10 [doi]
- JANUS: towards robust and malicious resilient routing in hybrid wireless networksBogdan Carbunar, Ioannis Ioannidis, Cristina Nita-Rotaru. 11-20 [doi]
- SeRLoc: secure range-independent localization for wireless sensor networksLoukas Lazos, Radha Poovendran. 21-30 [doi]
- RFID: security and privacy for five-cent wireless devicesAri Juels. 31 [doi]
- Security considerations for IEEE 802.15.4 networksNaveen Sastry, David Wagner. 32-42 [doi]
- Analysis of the 802.11i 4-way handshakeChanghua He, John C. Mitchell. 43-50 [doi]
- Visualization of wormholes in sensor networksWeichao Wang, Bharat K. Bhargava. 51-60 [doi]
- Mobility-based anomaly detection in cellular mobile networksBo Sun, Fei Yu, Kui Wu, Victor C. M. Leung. 61-69 [doi]
- A framework for wireless LAN monitoring and its applicationsJihwang Yeo, Moustafa Youssef, Ashok K. Agrawala. 70-79 [doi]
- Channel surfing and spatial retreats: defenses against wireless denial of serviceWenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang. 80-89 [doi]
- A man-in-the-middle attack on UMTSUlrike Meyer, Susanne Wetzel. 90-97 [doi]