@article{BabaheidarianSP:TR:2017, author = {Parisa Babaheidarian and Somayeh Salimi and Panos Papadimitratos}, title = {{Preserving Confidentiality in The Gaussian Broadcast Channel Using Compute-and-Forward}}, journal = {CoRR}, volume = {abs/1703.01208}, month = {March}, year = {2017}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/GaussianCh-Confidentiality-Compute-n-Forward.pdf}, url = {http://arxiv.org/abs/1703.01208}, typ = {TR} }
@article{KhodaeiJP:TR:2017, author = {Mohammad Khodaei and Hongyu Jin and Panos Papadimitratos}, title = {{SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems}}, journal = {CoRR}, volume = {abs/1707.05518}, month = {July}, year = {2017}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/scalable-VPKI.pdf}, url = {http://arxiv.org/abs/1707.05518}, typ = {TR} }
@article{DwivediNPH:TR:2017, author = {Satyam Dwivedi and John{-}Olof Nilsson and Panos Papadimitratos and Peter H{\"{a}}ndel}, title = {{CLIMEX: A Wireless Physical Layer Security Protocol Based on Clocked Impulse Exchanges}}, journal = {CoRR}, volume = {abs/1708.04774}, month = {August}, year = {2017}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/climex-phy-security-clocked-impulse.pdf}, url = {http://arxiv.org/abs/1708.04774}, typ = {TR} }
@article{WieseOJPSS:TR:2017, author = {Moritz Wiese and Tobias J. Oechtering and Karl Henrik Johansson and Panos Papadimitratos and Henrik Sandberg and Mikael Skoglund}, title = {{Secure Estimation and Zero-Error Secrecy Capacity}}, journal = {CoRR}, volume = {abs/1612.05552}, month = {July}, year = {2017}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/1612.05552-SecureEstimationZero-ErrorSecrecyCapacity.pdf}, url = {http://arxiv.org/abs/1612.05552}, typ = {TR} }
@article{KhodaeiP:TR:2017, author = {Mohammad Khodaei and Panos Papadimitratos}, title = {{The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems}}, journal = {CoRR}, volume = {abs/1601.00796}, month = {January}, year = {2017}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/key-credential-id-management-VC.pdf}, url = {http://arxiv.org/abs/1601.00796}, typ = {TR} }
@article{KhodaeiJP:TR:2016, author = {Mohammad Khodaei and Hongyu Jin and Panos Papadimitratos}, title = {{Towards Deploying a Scalable {\&} Robust Vehicular Identity and Credential Management Infrastructure}}, journal = {CoRR}, volume = {abs/1601.00846}, month = {January}, year = {2016}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/scalable-robust-vpki.pdf}, url = {http://arxiv.org/abs/1601.00846}, typ = {TR} }
@article{SalimiBGSP:TR:2016, author = {Somayeh Salimi and Matthieu Bloch and Frederic Gabry and Mikael Skoglund and Panos Papadimitratos}, title = {{Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel}}, journal = {CoRR}, volume = {abs/1603.05399}, month = {March}, year = {2016}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/strong-secrecy-pairwise-key-agreement-gmac.pdf}, url = {http://arxiv.org/abs/1603.05399}, typ = {TR} }
@article{BabaheidarianSP:TR:2016, author = {Parisa Babaheidarian and Somayeh Salimi and Panos Papadimitratos}, title = {{Security in The Gaussian Interference Channel: Weak and Moderately Weak Interference Regimes}}, journal = {CoRR}, volume = {abs/1604.07386}, month = {April}, year = {2016}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/security-GaussianCh-weak-modweak-interference.pdf}, url = {http://arxiv.org/abs/1604.07386}, typ = {TR} }
@article{WieseJOPSSa:TR:2016, author = {Moritz Wiese and Karl Henrik Johansson and Tobias J. Oechtering and Panos Papadimitratos and Henrik Sandberg and Mikael Skoglund}, title = {{Uncertain Wiretap Channels and Secure Estimation}}, journal = {CoRR}, volume = {abs/1605.00274}, month = {May}, year = {2016}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/uncertain-wiretap-secure-estimation.pdf}, url = {http://arxiv.org/abs/1605.00274}, typ = {TR} }
@article{KhodaeiP16b:TR:2016, author = {Mohammad Khodaei and Panos Papadimitratos}, title = {{Evaluating On-demand Pseudonym Acquisition Policies in Vehicular Communication Systems}}, journal = {CoRR}, volume = {abs/1607.05868}, month = {July}, year = {2016}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/eval-ondemand-pseudonym-acquisition.pdf}, url = {http://arxiv.org/abs/1607.05868}, typ = {TR} }
@misc{GisdakisGPa:TR:2015, author = {S. Gisdakis and T. Giannetsos and P. Papadimitratos}, title = {{Android Privacy C(R)ache: Reading your External Storage and Sensors for Fun and Profit}}, month = {December}, year = {2015}, howpublished = {KTH DiVA Technical Report 178961}, url = {http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-178961}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/android-privacy-storage-sensors-TR.pdf}, comment = {diva}, typ = {TR} }
@misc{GisdakisGPb:TR:2015, author = {S. Gisdakis and T. Giannetsos and P. Papadimitratos}, title = {{Security, Privacy & Incentive Provision for Mobile Crowd Sensing Systems}}, month = {December}, year = {2015}, howpublished = {KTH DiVA Technical Report 181099}, url = {http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-181099}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/Security-Privacy-Incentive-provision-Crowd-Sensing.pdf}, comment = {diva}, typ = {TR} }
@misc{GisdakisGPc:TR:2015, author = {S. Gisdakis and T. Giannetsos and P. Papadimitratos}, title = {{Data Verification and Privacy-respecting User Remuneration in Mobile Crowd Sensing}}, month = {December}, year = {2015}, howpublished = {KTH DiVA Technical Report 181098}, url = {http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-181098}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/Data-Verification-Privacy-respecting-Remuneration-Crowd-Sensing.pdf}, comment = {diva}, typ = {TR} }
@article{BabaheidarianSP:TR:2015, author = {Parisa Babaheidarian and Somayeh Salimi and Panos Papadimitratos}, title = {{Finite-SNR Regime Analysis of The Gaussian Wiretap Multiple-Access Channel}}, journal = {CoRR}, volume = {abs/1510.01258}, month = {October}, year = {2015}, url = {http://arxiv.org/abs/1510.01258}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/FiniteSNRGaussianWiretapMultipleAccessChannel.pdf}, comment = {}, typ = {TR} }
@article{WieseP:TR:2015, author = {Moritz Wiese and Panos Papadimitratos}, title = {{Frequency Hopping does not Increase Anti-Jamming Resilience of Wireless Channels}}, journal = {CoRR}, volume = {abs/1512.06645}, month = {December}, year = {2015}, url = {http://arxiv.org/abs/1512.06645}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/Frequency-hopping-not-increase-anti-jamming-resilience.pdf}, comment = {}, typ = {TR} }
@article{SalimiP:TR:2015, author = {Somayeh Salimi and Panos Papadimitratos}, title = {{Pairwise Secret Key Agreement based on Location-derived Common Randomness}}, journal = {CoRR}, volume = {abs/1512.08652}, month = {December}, year = {2015}, url = {http://arxiv.org/abs/1512.08652}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/PairwiseSecretKeyAgreementLocationDerivedCommonRandomness.pdf}, comment = {}, typ = {TR} }
@article{SalimiJSP:TR:2015, author = {Somayeh Salimi and Eduard A. Jorswieck and Mikael Skoglund and Panos Papadimitratos}, title = {{Key Agreement over an Interference Channel with Noiseless Feedback: Achievable Region {\&} Distributed Allocation}}, journal = {CoRR}, volume = {abs/1512.08679}, month = {December}, year = {2015}, url = {http://arxiv.org/abs/1512.08679}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/KeyAgreementInterferenceChannelNoiselessFeedback.pdf}, comment = {}, typ = {TR} }
@article{MirmohseniP:TR:2013, title = {{Constrained Colluding Eavesdroppers: An Information-Theoretic Model}}, author = {Mirmohseni, Mahtab and Papadimitratos, Panagiotis}, journal = {CoRR}, volume = {abs/1312.3200}, month = {December}, year = {2013}, url = {https://arxiv.org/abs/1312.3200}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/contrained-colluding-eavesdroppers-1312.3200.pdf}, typ = {TR} }
@techreport{ShokriTPLH:TR:2013, author = {R. Shokri and G. Theodorakopoulos and Papadimitratos, P. and E. Kazemi and Hubaux, J.-P. }, title = {{Hiding in the Mobile Crowd: Location Privacy through Collaboration}}, institution = {EPFL-REPORT-187772}, year = {2013}, month = {July}, comment = {replaced with the camera-ready}, typ = {TR} }
@techreport{PoturalskiPH:TR:2012, author = {Poturalski, M. and Papadimitratos, P. and Hubaux, J.-P. }, title = {{Formal Analysis of Secure Neighbor Discovery in Wireless Networks}}, institution = {KTH}, year = {2012}, month = {November}, webpdf = {http://www.ee.kth.se/~papadim/publications/fulltext/TECH-REPORT-SND-V2.pdf}, typ = {TR} }
@inproceedings{KarglBEPS:TR:2011, author = {Kargl, Frank and Buttyan, Levente and Eckhoff, D. and Papadimitratos, Panos and Schoch, E.}, title = {{10402 Report -- Working Group on Security and Privacy}}, booktitle = {Inter-Vehicular Communication}, month = {January}, year = {2011}, editor = {Falko Dressler and Frank Kargl and J{\"o}rg Ott and Ozan K. Tonguz and Lars Wischhof}, number = {10402}, series = {Dagstuhl Seminar Proceedings}, issn = {1862-4405}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany}, address = {Dagstuhl, Germany}, annote = {Keywords: IVC, C2X, VANET, security, privacy}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/10402.dagstuhl-SecPrivAbstract-2011.pdf}, comment = {}, typ = {TR} }
@article{FioreCCP:TR:2010, author = {Fiore, M. and Casetti, C. and Chiasserini, C.F. and Papadimitratos, P.}, title = {{Secure Neighbor Position Discovery in VANETs}}, journal = {CoRR}, volume = {abs/1006.0806}, month = {June}, year = {2010}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/1006.0806-SecureNeighborPositionDiscoveryVANETs.pdf}, url = {https://arxiv.org/abs/1006.0806}, comment = {}, typ = {TR} }
@techreport{PapadopouliEtAl:TR:2010, author = {M. Papadopouli and A. Årnes and J. A. Bombin and E. Boschi and S. Buchegger and R. B. Cortiñas and F. Gaudino and G. Hogben and T. Karagiannis and C. Manifavas and K. Mitrokotsa and N. Nikiforakis and P. Papadimitratos and G. Roussos and K. Tsakona}, title = {{Mobile Identity Management}}, institution = {ENISA Position Paper}, year = {2010}, month = {April}, comment = {}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/Mobile_identity-management-enisa.pdf}, typ = {TR} }
@techreport{PoturalskiFPHL:TR:2010, author = {Poturalski, M. and Flury, M. and Papadimitratos, P. and Hubaux, J.-P. and Le Boudec, J.-Y. }, title = {{Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures}}, institution = {EPFL-REPORT-150112}, year = {2010}, month = {July}, typ = {TR} }
@techreport{NeubergPFU:TR:2010, author = {Neuberg, C. and Papadimitratos, P. and Fragouli, C. and Urbanke, R.}, title = {{A Mobile World of Security}}, institution = {EPFL-REPORT-150219}, year = {2010}, month = {July}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/mobile-world-security-mobility-key-tech-rep.pdf}, typ = {TR} }
@techreport{GalubaPPADK:TR:2009, author = {Galuba, W. and Papadimitratos, Panos and Poturalski, Marcin and Aberer, K. and Despotovic, Z. and Kellerer, W.}, title = {{More on Castor: the Scalable Secure Routing Protocol for Ad-hoc Networks}}, institution = {EPFL, LSIR-REPORT-2009-002}, month = {July}, year = {2009}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/more-on-castor-manet-secure-routing-communication.pdf}, comment = {}, typ = {TR} }
@article{KafsiPDAH:TR:2009, author = {Kafsi, M. and Papadimitratos, Panos and Dousse, O. and Alpcan, T. and Hubaux, Jean-Pierre}, title = {{VANET Connectivity Analysis}}, journal = {CoRR}, volume = {abs/0912.5527}, month = {December}, year = {2009}, url = {https://arxiv.org/abs/0912.5527}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/vanet-connectivity-analysis-arxiv.pdf}, comment = {}, typ = {TR} }
@techreport{ShokriPRPH:TR:2008, author = {Shokri, Reza and Poturalski, Marcin and Ravot, G. and Papadimitratos, Panos and Hubaux, Jean-Pierre}, title = {A low-cost secure neighbor verification protocol for wireless sensor networks}, institution = {EPFL, LCA-REPORT-2008-020}, month = {October}, year = {2008}, comment = {}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/SND_WSN_O08-TR.pdf}, typ = {TR} }
@techreport{PapadimitratosMH:TR:2008, author = {Papadimitratos, Panos and Mezzour, G. and Hubaux, Jean-Pierre}, title = {{Certificate Revocation List Distribution in Vehicular Communication Systems}}, year = {2008}, institution = {EPFL, LCA-REPORT-2008-019}, month = {July}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/certificate-revocation-list-distribution-vanet.pdf}, typ = {TR} }
@techreport{PoturalskiPH:TR:07, author = {Poturalski, Marcin and Papadimitratos, Panos and Hubaux, Jean-Pierre}, title = {{Secure Neighbor Discovery in Wireless Networks: Is It Possible?}}, institution = {EPFL-LCA Report 2007-004}, year = {2007}, month = {May}, url = {http://infoscience.epfl.ch/getfile.py?recid=110588&mode=best}, webpdf = {http://people.kth.se/~papadim/publications/fulltext/LCA-REPORT-2007-004-snd-formal-investigation-of-possibility.pdf}, typ = {TR} }
@techreport{RayaJPAH:TR:2006, author = {Raya, Maxim and Jungels, D. and Papadimitratos, Panos and Aad, I. and Hubaux, Jean-Pierre}, title = {{Certificate Revocation List Distribution in Vehicular Communication Systems}}, institution = {EPFL Technical Report, LCA-REPORT-2006-006}, year = {2006}, comment = {}, typ = {TR} }
@misc{papadimitratosHS:ID:2002, author = {Papadimitratos, Panos and Haas, Z. J. and Samar, P.}, title = {{The Secure Routing Protocol (SRP) for Ad Hoc Networks}}, howpublished = {IETF Internet Draft draft-papadimitratos-secure-routing-protocol-00.txt}, month = {September}, year = {2002}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/internet-draft-secure-routing-manet.pdf}, comment = {}, typ = {TR} }
This file was generated by bibtex2html 1.98.