@inproceedings{JinP:W:2017, author = {Jin, Hongyu and Papadimitratos, Panos}, title = {{Bloom Filter Based Certificate Validation for VANET (poster)}}, booktitle = {{ACM} Conference on Security and Privacy in Wireless and Mobile Networks {(ACM WiSec)}}, month = {July}, year = {2017}, isbn = {978-1-4503-5084-6}, address = {Boston, MA, USA}, pages = {273--274}, doi = {10.1145/3098243.3106020}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/bloom-filter-cert-validation-vanet.pdf}, comment = {}, typ = {W} }
@inproceedings{ZhangP:W:2017, author = {Zhang, Kewei and Papadimitratos, Panos}, title = {{Clustering-based Solution Separation Algorithm against GNSS Spoofing Attacks}}, booktitle = {{DGON} International Symposium on Precision Approach and Performance Based Navigation}, address = {Munich, Germany}, month = {November}, year = {2017}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/}, comment = {}, typ = {W} }
@inproceedings{Papadimitratos:W:2017, author = {Papadimitratos, Panos}, title = {{Secure Communication in Wireless Networks: Scalable Protocols and Fundamental Limits}}, booktitle = {Nordic Workshop on System and Network Optimization for Wireless ({SNOW})}, address = {Riksgränsen, Sweden}, month = {May}, year = {2017}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/snow-2017-PPapadimitratos.pdf}, typ = {W} }
@inproceedings{Papadimitratos:TUT:2016, author = {Panos Papadimitratos}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {{Security on Wheels: Security and Privacy for Vehicular Communication Systems}}, booktitle = {{ACM} {SIGSAC} Conference on Computer and Communications Security (ACM CCS)}, pages = {1855--1856}, month = {October}, year = {2016}, address = {Vienna, Austria}, doi = {10.1145/2976749.2976752}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/acm-ccs-tutorial-security-on-wheels-p1855-papadimitratos.pdf}, typ = {W} }
@misc{Papadimitratos:W:2015, author = {P. Papadimitratos}, title = {{Specification for Secure Routing: towards Formal Reasoning}}, howpublished = {IFIP WG 11.4 Workshop iNetSec}, address = {Zurich, Switzerland}, month = {October}, year = {2015}, comment = {abstract+presentation only}, typ = {W} }
@inproceedings{RistanovicPTHL:W:2009, author = {Ristanovic, N. and Papadimitratos, Panos and Theodorakopoulos, G. and Hubaux, Jean-Pierre and Le Boudec, J.-Y.}, title = {{Adaptive Message Authentication for Vehicular Networks}}, booktitle = {ACM MobiCom Workshop on Vehicular Ad hoc Networks (ACM VANET)}, year = {2009}, pages = {121--122}, address = {Beijing, China}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/adaptive-authentication-vanet-poster.pdf}, doi = {10.1145/1614269.1614291}, keywords = {adaptive scheme, inter-vehicle communication, message authentication, security overhead, vehicular security}, typ = {W} }
@inproceedings{PapadimitratosMH:W:2008, author = {Papadimitratos, Panos and Mezzour, G. and Hubaux, Jean-Pierre}, title = {{Certificate Revocation List Distribution in Vehicular Communication Systems}}, booktitle = {{ACM MobiCom} {W}orkshop on {V}ehicular {A}d {H}oc {N}etworks ({ACM VANET})}, year = {2008}, pages = {86--87}, address = {San Francisco, CA, USA}, month = {September}, comment = {DIVA - Fulltext}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/vanet08-certificate-revocation-list-short.pdf}, typ = {W} }
@inproceedings{ShorkiNYP:W:2007, author = {Shokri, Reza and Nayyeri, A. and Yazdani, N. and Papadimitratos, Panos}, title = {{Efficient and Adjustable Recipient Anonymity in Mobile Ad Hoc Networks}}, booktitle = {IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (IEEE MASS)}, year = {2007}, pages = {1--3}, address = {Pisa, Italy}, abstract = {The privacy of users of mobile devices has been at stake, with emerging systems based on the mobile ad hoc networking technology raising additional concerns. The establishment of a connection between two nodes could readily reveal information to an eavesdropper. One approach to prevent this is to provide receiver anonymity, i.e., conceal the identity of the receiver, during the establishment of a communication path. In this paper, we introduce such a scheme that improves the efficiency of anonymous discovery, balances its cost among network nodes, and can be adaptive, trading off the degree of anonymity for the receiver.}, keywords = {ad hoc networks;mobile radio;radio receivers;adjustable recipient anonymity;anonymous discovery;eavesdropper;mobile ad hoc networks;mobile devices;receiver anonymity;Computer applications;Computer networks;Costs;Laboratories;Mobile ad hoc networks;Mobile communication;Mobile computing;Portable computers;Privacy;Routing protocols}, doi = {10.1109/MOBHOC.2007.4428593}, issn = {2155-6806}, month = {October}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/adjustable-recipient-anonymity-manet.pdf}, typ = {W} }
@inproceedings{piorkowskiRLPGH:W:2007, author = {Piorkowski, M. and Raya, M. and Lugo, A.L. and Papadimitratos, P. and Grossglauser, M. and Hubaux, J.-P. }, title = {{TraNS: Realistic Joint Traffic and Network Simulator for VANETs (poster)} }, booktitle = {ACM SIGMOBILE Conference on Mobile Computing and Networking (ACM MobiCom)}, month = {September}, year = {2007}, month = {September }, address = {Montréal, QC, Canada}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/traffic-network-simulator-vanet-poster.pdf}, typ = {W} }
@conference{RayaPH:W:2006, author = {Raya, M. and Papadimitratos, P. and Hubaux, J.-P. }, title = {{Securing Vehicular Networks (poster)}}, booktitle = {IEEE Conference on Computer Communications (IEEE INFOCOM)}, year = {2006}, month = {April}, comment = {poster}, address = {Barcelona, Spain}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/sevecom-early-2.pdf}, typ = {W} }
@inproceedings{Papadimitratos:W:2005, author = {Papadimitratos, Panos}, title = {{Securing Ad Hoc Networks}}, booktitle = {International Conference on Security in Pervasive Computing (SPC), Lecture Notes in Computer Science (LNCS 3450)}, year = {2005}, pages = {46--47}, publisher = {Springer Berlin/Heidelberg}, isbn = {978-3-540-32004-3}, doi = {10.1007/978-3-540-32004-3_5}, address = {Boppard, Germany}, abstract = {Securing the operation of ad hoc networking protocols is a multifaceted and complex problem that poses new and unique challenges. All network nodes constitute a self-organizing infrastructure, while operating in an inherently unreliable and insecure environment. The boundaries of an ad hoc network are blurred, if not inexistent, and its membership may frequently change. Without security measures, attackers have ample opportunity to control, disrupt, and degrade the services or even disable communications of other users. As a result, applications based on the ad hoc networking technology cannot proliferate, unless such vulnerabilities are eradicated. For example, search-and-rescue, law enforcement, or battlefield networks must guarantee secure and reliable communication, even if a significant fraction of the network nodes are disabled or controlled by an adversary. Similarly, users will not enable their portable devices to join and form ad hoc networks, unless access to the sought services is protected from compromise. This talk discusses threats and security measures, focusing on a comprehensive solution for secure and fault-tolerant communication in ad hoc networks. We discuss our design of a protocol suite that addresses the security of the route discovery and the security of the data transmission in ad hoc networks. The presented material reflects on-going research, as well as research conducted over the past four years at Cornell University under the supervision of Prof. Z. J. Haas.}, webpdf = {https://people.kth.se/~papadim/publications/fulltext/spc05-abstract-manet-security.pdf}, comment = {}, typ = {W} }
@misc{SankaranarayananMP:W:2005, author = {Sankaranarayanan, S. and Papadimitratos, Panos and Mishra, A.}, title = {{A Multi-Channel MAC Protocol for Transparent Wireless Cellular-Ad-hoc Networking (poster)}}, howpublished = {ACM Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc)}, month = {May}, year = {2005}, address = {Urbana-Champaign, IL, USA}, typ = {W} }
@misc{PapadimitratosMR:W:2005, author = {Papadimitratos, Panos and Mishra, A. and Rosenburgh, D.}, title = {{A Cross-Layer Design Approach to Enhance IEEE 802.15.4 (poster)}}, howpublished = {ACM International Conference on Mobile Systems, Applications, and Services (ACM MobiSys)}, month = {June}, year = {2005}, address = {Seattle, WA, USA}, typ = {W} }
@misc{Papadimitratos:W:2002, author = {Papadimitratos, Panos and Haas, Z. J.}, title = {{Performance Evaluation of Secure Routing Protocol for Mobile Ad Hoc Networks (poster)}}, howpublished = {ACM MobiCom Workshop on Wireless Security (ACM WiSe)}, month = {September}, year = {2002}, address = {Atlanta, GA, USA}, note = {poster presentation}, typ = {W} }
This file was generated by bibtex2html 1.98.