Author:
Kuriakose Jeril,Amruth V,Jaya Krishna R,Srivastava Devesh Kumar
Reference14 articles.
1. Francillon, Castelluccia, C.: Code injection attacks on harvard-architecture devices. In: Proceedings of the 15th ACM Conference on Computer and communications security, Alexandria, Virginia, USA (2008)
2. Reza, S., et al.: Quantifying location privacy: the case of sporadic location exposure. Privacy Enhancing Technologies. Springer, Berlin (2011)
3. Yingying, C., et al.: The robustness of localization algorithms to signal strength attacks: a comparative study. Distributed Computing in Sensor Systems, pp. 546–563. Springer, Berlin (2006)
4. Hu, Yih-Chun, Perrig, Adrian, Johnson, David B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)
5. Dimitris, G., et al.: Preventing impersonation attacks in MANET with multi-factor authentication. In: Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2005. Third International Symposium on IEEE WIOPT (2005)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献