Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues M Čagalj, JP Hubaux, C Enz Proceedings of the 8th annual international conference on Mobile computing …, 2002 | 689 | 2002 |
On selfish behavior in CSMA/CA networks M Cagalj, S Ganeriwal, I Aad, JP Hubaux Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005 | 435 | 2005 |
Jamming-resistant key establishment using uncoordinated frequency hopping M Strasser, C Popper, S Capkun, M Cagalj 2008 IEEE Symposium on Security and Privacy (sp 2008), 64-78, 2008 | 383 | 2008 |
Wormhole-based antijamming techniques in sensor networks M Cagalj, S Capkun, JP Hubaux IEEE transactions on Mobile Computing 6 (1), 100-114, 2006 | 306 | 2006 |
Key agreement in peer-to-peer wireless networks M Cagalj, S Capkun, JP Hubaux Proceedings of the IEEE 94 (2), 467-478, 2006 | 261 | 2006 |
Securing localization with hidden and mobile base stations S Čapkun, M Čagalj, M Srivastava International Conference on Computer Communication,(INFOCOM 2006), 2006 | 226 | 2006 |
Non-cooperative multi-radio channel allocation in wireless networks M Felegyhazi, M Cagalj, SS Bidokhti, JP Hubaux IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 225 | 2007 |
Secure location verification with hidden and mobile base stations S Capkun, K Rasmussen, M Cagalj, M Srivastava IEEE Transactions on Mobile Computing 7 (4), 470-483, 2008 | 177 | 2008 |
Integrity regions: authentication through presence in wireless networks S Čapkun, M Čagalj Proceedings of the 5th ACM workshop on Wireless security, 1-10, 2006 | 90 | 2006 |
Efficient MAC in cognitive radio systems: A game-theoretic approach M Felegyhazi, M Cagalj, JP Hubaux IEEE Transactions on wireless Communications 8 (4), 1984-1995, 2009 | 88 | 2009 |
On cheating in CSMA/CA ad hoc networks M Cagalj, S Ganeriwal, I Aad, JP Hubaux | 81 | 2004 |
Secnav: secure broadcast localization and time synchronization in wireless networks KB Rasmussen, S Capkun, M Cagalj Proceedings of the 13th annual ACM international conference on Mobile …, 2007 | 74 | 2007 |
Integrity codes: Message integrity protection and authentication over insecure channels S Čapkun, M Čagalj, R Rengaswamy, I Tsigkogiannis, JP Hubaux, ... IEEE Transactions on Dependable and Secure Computing 5 (4), 208-223, 2008 | 73 | 2008 |
SSSL: shoulder surfing safe login T Perković, M Čagalj, N Rakić Journal of communications software and systems 6 (2), 65-73, 2010 | 70 | 2010 |
Energy-efficient broadcasting in all-wireless networks M Čagalj, JP Hubaux, CC Enz Wireless Networks 11, 177-188, 2005 | 70 | 2005 |
Integrity (I) codes: Message integrity protection and authentication over insecure channels M Cagalj, S Capkun, R Rengaswamy, I Tsigkogiannis, M Srivastava, ... 2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-294, 2006 | 66 | 2006 |
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model: (Short Paper) T Perković, M Čagalj, N Saxena Financial Cryptography and Data Security: 14th International Conference, FC …, 2010 | 34 | 2010 |
Secure initialization of multiple constrained wireless devices for an unaided user T Perković, M Čagalj, T Mastelić, N Saxena, D Begušić IEEE transactions on mobile computing 11 (02), 337-351, 2012 | 32 | 2012 |
Breaking undercover: Exploiting design flaws and nonuniform human behavior T Perković, S Li, A Mumtaz, SA Khayam, Y Javed, M Čagalj Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-15, 2011 | 31 | 2011 |
Timing attacks on cognitive authentication schemes M Čagalj, T Perković, M Bugarić IEEE Transactions on Information Forensics and Security 10 (3), 584-596, 2014 | 29 | 2014 |