Abstract is missing.
- Secure verification of location claimsNaveen Sastry, Umesh Shankar, David Wagner. 1-10 [doi]
- Wireless LAN location-sensing for security applicationsPing Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wallach. 11-20 [doi]
- BISS: building secure routing out of an incomplete set of security associationsSrdjan Capkun, Jean-Pierre Hubaux. 21-29 [doi]
- Rushing attacks and defense in wireless ad hoc network routing protocolsYih-Chun Hu, Adrian Perrig, David B. Johnson. 30-40 [doi]
- Secure data transmission in mobile ad hoc networksPanagiotis Papadimitratos, Zygmunt J. Haas. 41-50 [doi]
- ESCORT: a decentralized and localized access control system for mobile wireless access to secured domainsJiejun Kong, Shirshanka Das, Edward Tsai, Mario Gerla. 51-60 [doi]
- On securely enabling intermediary-based services and performance enhancements for wireless mobile usersSneha Kumar Kasera, Semyon Mizikovsky, Ganapathy S. Sundaram, Thomas Y. C. Woo. 61-68 [doi]
- Alert aggregation in mobile ad hoc networksBo Sun, Kui Wu, Udo W. Pooch. 69-78 [doi]
- An authentication framework for hierarchical ad hoc sensor networksMathias Bohge, Wade Trappe. 79-87 [doi]
- On the security of wireless network access with enhancementsLein Harn, Wen-Jung Hsin. 88-95 [doi]