Abstract is missing.
- Integrity regions: authentication through presence in wireless networksSrdjan Capkun, Mario Cagalj. 1-10 [doi]
- Location privacy in wireless personal area networksDave Singelée, Bart Preneel. 11-18 [doi]
- Location dependent key management using random key-predistribution in sensor networksFarooq Anjum. 21-30 [doi]
- RFID security and privacy concernsNicholas Tsougas. 31 [doi]
- Securing wireless systems via lower layer enforcementsZang Li, Wenyuan Xu, Rob Miller, Wade Trappe. 33-42 [doi]
- Detecting identity-based attacks in wireless networks using signalprintsDaniel B. Faria, David R. Cheriton. 43-52 [doi]
- Security in sensor networks: industry trends, present and future research directionsAdrian Perrig. 53 [doi]
- Modeling Ad-hoc rushing attack in a negligibility-based security frameworkJiejun Kong, Xiaoyan Hong, Mario Gerla. 55-64 [doi]
- Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systemsDijiang Huang. 65-74 [doi]
- Impact of paging channel overloads or attacks on a cellular networkJérémy Serror, Hui Zang, Jean-Chrysostome Bolot. 75-84 [doi]
- SCUBA: Secure Code Update By Attestation in sensor networksArvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla. 85-94 [doi]
- Proactive security for mobile messaging networksAbhijit Bose, Kang G. Shin. 95-104 [doi]
- Using uncertainty in reputation methods to enforce cooperation in ad-hoc networksKevin Kane, James C. Browne. 105-113 [doi]