default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 61 matches
- 2019
- Chen Song, Zhengxiong Li, Wenyao Xu:
Cardiac biometrics for continuous and non-contact mobile authentication: poster. WiSec 2019: 306-307 - Aysajan Abidin:
Quantum distance bounding. WiSec 2019: 233-238 - Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen:
Breaking graph-based IoT malware detection systems using adversarial examples: poster. WiSec 2019: 290-291 - Noga Agmon, Asaf Shabtai, Rami Puzis:
Deployment optimization of IoT devices through attack graph analysis. WiSec 2019: 192-202 - Shoukat Ali, Koray Karabina, Emrah Karagoz:
Biometric data transformation for cryptographic domains and its application: poster. WiSec 2019: 304-305 - Seth Andrews, Ryan M. Gerdes, Ming Li:
Crowdsourced measurements for device fingerprinting. WiSec 2019: 72-82 - Vashish Baboolal, Kemal Akkaya, Nico Saputro, Khaled Rabieh:
Preserving privacy of drone videos using proxy re-encryption technique: poster. WiSec 2019: 336-337 - Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac:
A digital forensics framework for smart settings: poster. WiSec 2019: 332-333 - Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
Are you secure in your car?: poster. WiSec 2019: 308-309 - Shubhendu Bhardwaj:
Secure THz communication with multiplexed orbital angular momentum beams: poster. WiSec 2019: 310-311 - Jasmine D. Bowers, Imani N. Sherman, Kevin R. B. Butler, Patrick Traynor:
Characterizing security and privacy practices in emerging digital credit applications. WiSec 2019: 94-107 - Eyuphan Bulut, Ismail Güvenç, Kemal Akkaya:
Privacy preserving distributed matching for device-to-device IoT communications: poster. WiSec 2019: 316-317 - Mumin Cebe, Kemal Akkaya:
Performance evaluation of key management schemes for wireless legacy smart grid environments: poster. WiSec 2019: 334-335 - Guillaume Celosia, Mathieu Cunche:
Himiko: A human interface for monitoring and inferring knowledge on bluetooth-low-energy objects: demo. WiSec 2019: 292-293 - Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper:
LTE security disabled: misconfiguration in commercial networks. WiSec 2019: 261-266 - Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Analyzing endpoints in the internet of things malware: poster. WiSec 2019: 288-289 - Joseph I. Choi, Dave (Jing) Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong:
Enclave-based privacy-preserving localization: poster. WiSec 2019: 312-313 - Timothy Claeys, Franck Rousseau, Boris Simunovic, Bernard Tourancheau:
Thermal covert channel in bluetooth low energy networks. WiSec 2019: 267-276 - T. Charles Clancy, Robert W. McGwier, Lidong Chen:
Post-quantum cryptography and 5G security: tutorial. WiSec 2019: 285 - Jiska Classen, Matthias Hollick:
Inside job: diagnosing bluetooth lower layers using off-the-shelf devices. WiSec 2019: 186-191 - Kyle Denney, Enes Erdin, Leonardo Babun, A. Selcuk Uluagac:
Dynamically detecting USB attacks in hardware: poster. WiSec 2019: 328-329 - Karim Eldefrawy, Gene Tsudik:
Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion. WiSec 2019: 45-48 - Yuzhou Feng, Liangdong Deng, Dong Chen:
IoT devices discovery and identification using network traffic data: poster. WiSec 2019: 338-339 - David Gabay, Mumin Cebe, Kemal Akkaya:
On the overhead of using zero-knowledge proofs for electric vehicle authentication: poster. WiSec 2019: 347-348 - David Gérault, Ioana Boureanu:
Distance bounding under different assumptions: opinion. WiSec 2019: 245-248 - Sigmund Albert Gorski III, William Enck:
ARF: identifying re-delegation vulnerabilities in Android system services. WiSec 2019: 151-161 - Sanket Goutam, William Enck, Bradley Reaves:
Hestia: simple least privilege network policies for smart homes. WiSec 2019: 215-220 - Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo:
Protecting mobile devices from physical memory attacks with targeted encryption. WiSec 2019: 34-44 - Zhitao He, Martin Furuhed, Shahid Raza:
Indraj: digital certificate enrollment for battery-powered wireless devices. WiSec 2019: 117-127 - Christopher Hensler, Patrick Tague:
Using bluetooth low energy spoofing to dispute device details: demo. WiSec 2019: 340-342
skipping 31 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-17 12:41 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint