Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues M Čagalj, JP Hubaux, C Enz Proceedings of the 8th annual international conference on Mobile computing …, 2002 | 641 | 2002 |
On selfish behavior in CSMA/CA networks M Cagalj, S Ganeriwal, I Aad, JP Hubaux Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005 | 404 | 2005 |
Jamming-resistant key establishment using uncoordinated frequency hopping M Strasser, C Popper, S Capkun, M Cagalj 2008 IEEE Symposium on Security and Privacy (sp 2008), 64-78, 2008 | 329 | 2008 |
Wormhole-based antijamming techniques in sensor networks M Cagalj, S Capkun, JP Hubaux IEEE transactions on Mobile Computing 6 (1), 100-114, 2006 | 281 | 2006 |
Key agreement in peer-to-peer wireless networks M Cagalj, S Capkun, JP Hubaux Proceedings of the IEEE 94 (2), 467-478, 2006 | 245 | 2006 |
Secure localization with hidden and mobile base stations S Čapkun, M Čagalj, M Srivastava in Proceedings of IEEE INFOCOM, 2006 | 223 | 2006 |
Non-cooperative multi-radio channel allocation in wireless networks M Felegyhazi, M Cagalj, SS Bidokhti, JP Hubaux IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 210 | 2007 |
Secure location verification with hidden and mobile base stations S Capkun, K Rasmussen, M Cagalj, M Srivastava IEEE Transactions on Mobile Computing 7 (4), 470-483, 2008 | 154 | 2008 |
Efficient MAC in cognitive radio systems: A game-theoretic approach M Felegyhazi, M Cagalj, JP Hubaux IEEE Transactions on wireless Communications 8 (4), 1984-1995, 2009 | 84 | 2009 |
Integrity regions: authentication through presence in wireless networks S Čapkun, M Čagalj, G Karame, NO Tippenhauer IEEE Transactions on Mobile Computing 9 (11), 1608-1621, 2010 | 82 | 2010 |
On cheating in CSMA/CA ad hoc networks M Cagalj, S Ganeriwal, I Aad, JP Hubaux | 74 | 2004 |
On cheating in CSMA/CA ad hoc networks M Cagalj, S Ganeriwal, I Aad, JP Hubaux | 74 | 2004 |
SSSL: shoulder surfing safe login T Perković, M Čagalj, N Rakić Journal of Communications Software and Systems 6 (2), 65-73, 2010 | 66 | 2010 |
Secnav: secure broadcast localization and time synchronization in wireless networks KB Rasmussen, S Capkun, M Cagalj Proceedings of the 13th annual ACM international conference on Mobile …, 2007 | 64 | 2007 |
Energy-efficient broadcasting in all-wireless networks M Čagalj, JP Hubaux, CC Enz Wireless Networks 11 (1-2), 177-188, 2005 | 63 | 2005 |
Integrity (I) codes: Message integrity protection and authentication over insecure channels M Cagalj, S Capkun, R Rengaswamy, I Tsigkogiannis, M Srivastava, ... 2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-294, 2006 | 55 | 2006 |
Integrity codes: Message integrity protection and authentication over insecure channels S Čapkun, M Čagalj, R Rengaswamy, I Tsigkogiannis, JP Hubaux, ... IEEE Transactions on Dependable and Secure Computing 5 (4), 208-223, 2008 | 49 | 2008 |
Remote attestation for low-end embedded devices: the prover's perspective F Brasser, KB Rasmussen, AR Sadeghi, G Tsudik 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016 | 44 | 2016 |
Indoor positioning via subarea fingerprinting and surface fitting with received signal strength B Wang, S Zhou, LT Yang, Y Mo Pervasive and Mobile Computing 23, 43-58, 2015 | 39* | 2015 |
Shoulder-surfing safe login in a partially observable attacker model T Perković, M Čagalj, N Saxena International Conference on Financial Cryptography and Data Security, 351-358, 2010 | 32 | 2010 |