Abstract is missing.
- Toward a healthy wireless privacy ecosystemEdward W. Felten. 1-2 [doi]
- On the capacity of rate-adaptive packetized wireless communication links under jammingKoorosh Firouzbakht, Guevara Noubir, Masoud Salehi. 3-14 [doi]
- Physical-layer attacks on chirp-based ranging systemsAanjhan Ranganathan, Boris Danev, Aurélien Francillon, Srdjan Capkun. 15-26 [doi]
- BANA: body area network authentication exploiting channel characteristicsLu Shi, Ming Li, Shucheng Yu, Jiawei Yuan. 27-38 [doi]
- Zero reconciliation secret key generation for body-worn health monitoring devicesSyed Taha Ali, Vijay Sivaraman, Diethelm Ostry. 39-50 [doi]
- Location-aware and safer cards: enhancing RFID security and privacy via location sensingDi Ma, Anudath K. Prasad, Nitesh Saxena, Tuo Xiang. 51-62 [doi]
- A privacy-restoring mechanism for offline RFID systemsGildas Avoine, Iwen Coisel, Tania Martin. 63-74 [doi]
- Private communication detection: a stochastic approachChang-Han Jong, Virgil D. Gligor. 75-86 [doi]
- Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditingTao Shu, Marwan Krunz. 87-98 [doi]
- Security for cyber-physical systems: case studies with medical devices, robots, and automobilesTadayoshi Kohno. 99-100 [doi]
- Unsafe exposure analysis of mobile in-app advertisementsMichael C. Grace, Wu Zhou, Xuxian Jiang, Ahmad-Reza Sadeghi. 101-112 [doi]
- TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensorsZhi Xu, Kun Bai, Sencun Zhu. 113-124 [doi]
- DroidChecker: analyzing android applications for capability leakPatrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu. 125-136 [doi]
- Design of SMS commanded-and-controlled and P2P-structured mobile botnetsYuanyuan Zeng, Kang G. Shin, Xin Hu. 137-148 [doi]
- Tetherway: a framework for tethering camouflageSteffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova, Hossen A. Mustafa, Wenyuan Xu, Vijay Varadharajan. 149-160 [doi]
- Wireless security techniques for coordinated manufacturing and on-line hardware trojan detectionSheng Wei, Miodrag Potkonjak. 161-172 [doi]
- CHECKER: on-site checking in RFID-based supply chainsKaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva. 173-184 [doi]
- Entropy attacks and countermeasures in wireless network codingAndrew Newell, Reza Curtmola, Cristina Nita-Rotaru. 185-196 [doi]
- Congestion lower bounds for secure in-network aggregationRaghav Bhaskar, Ragesh Jaiswal, Sidharth Telang. 197-204 [doi]