A Coding-Theoretic Approach for Efficient Message Verification Over Insecure Channels, David Slater (University of Washington, Seattle, US), Patrick Tague (University of Washington, Seattle, US), Radha Poovendran (University of Washington, Seattle, US), Brian J Matt (Johns Hopkins University, US)
A Confidential and DoS-Resistant Multi-hop Code Dissemination Protocol for Wireless Sensor Networks, Hailun Tan (University of New South Wales, AU), Diet Ostry (CSIRO, AU), John Zic (CSIRO,AU), Sanjay Jha (University of New South Wales, AU)
A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad Hoc Networks, Sevil Sen, John A. Clark (University of York, UK)
A Low-Resource Public-Key Identification Scheme for RFID Tags and Sensor Nodes, Yossef Oren (Tel-Aviv University, Israel), Martin Feldhofer, (Graz University of Technology, Austria)
A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks, Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, Jean-Pierre Hubaux (EPFL, Switzerland)
A ROM-friendly Secure Code Update mechanism for WSNs using a stateful-verifier T-time Signature Scheme, Osman Ugus (NEC Europe Ltd., Germany), Dirk Westhoff (NEC Europe Ltd., Germany), Jens-Matthias Bohli (NEC Europe Ltd., Germany)
An Attacker Model for MANET Routing Security, Jared Cordasco, Susanne Wetzel (Stevens Institute of Technology)
Asynchronous Group Key Distribution on top of the CC2420 Security Mechanisms for Sensor Networks, Morten Tranberg Hansen (Aarhus University, Denmark)
Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions, Cai Shaoying (Singapore Management University), Yingjiu Li (Singapore Management University), Tieyan Li (Institute for Infocomm Research, Singapore), Robert Deng (Singapore Management University)
Certificate-Based Sequential Aggregate Signature, Joseph K. Liu, Joonsang Baek, Jianying Zhou (Institute for Infocomm Research, Singapore)
Collaborative Authentication In Unattended WSNs, Roberto Di Pietro (Università di Roma Tre, Italy), Claudio Soriente (University of California Irvine, US), Angelo Spognardi (INRIA Rhône-Alpes, France), Gene Tsudik (University of California Irvine, US)
FAIR: Fuzzy based Aggregation providing In-network Resilience for real-time Wireless Sensor Networks, Emiliano De Cristofaro (University of California Irvine, US), Jens-Matthias Bohli (NEC Europe Ltd., Germany), Dirk Westhoff (NEC Europe Ltd., Germany)
Jamming for Good: A Fresh Approach to Authentic Communication in WSNs, Ivan Martinovic, Paul Pichota, Jens B. Schmitt (University of Kaiserslautern, Germany)
Link-Layer Protection in 802.11i WLANs with Dummy Authentication, Zhimin Yang, Adam Champion, Boxuan Gu, Xiaole Bai, Dong Xuan (Ohio State University, US)
Mitigating Control-Channel Jamming Attacks in Multi-channel Ad Hoc Networks, Loukas Lazos, Sisi Liu, Marwan Krunz (University of Arizona, Tucson, US)
Mobi-Watchdog: You Can Steal, But You Can't Run!, Guanhua Yan, (Los Alamos National Laboratory, USA), Stephan Eidenbenz (Los Alamos National Laboratory, USA), Bo Sun (Lamar University, USA)
On the Application of Pairing Based Cryptography to Wireless Sensor Networks, Piotr Szczechowiak (Dublin City University, Ireland), Anton Kargl (Siemens AG, Germany), Michael Scott (Dublin City University, Ireland), Martin Collier (Dublin City University, Ireland)
Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks, Jing Dong (Purdue University, US), Reza Curtmola (New Jersey Institute of Technology, US) Cristina Nita-Rotaru (Purdue University, US)
Practical attacks against WEP and WPA, Erik Tews (TU Darmstadt, Germany), Martin Beck (TU Dresden, Germany)
Privacy-Preserving 802.11 Access-Point Discovery, Janne Lindqvist, Helsinki University of Technology, Finland Tuomas Aura (Microsoft Research, UK), George Danezis (Microsoft Research, UK), Teemu Koponen (Helsinki Institute for Information Technology, Finland), Annu Myllyniemi (Helsinki University of Technology, Finland), Jussi Mäki (Helsinki University of Technology, Finland), Michael Roe (Microsoft Research, UK)
REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits, William Kozma, Loukas Lazos (University of Arizona, Tucson, AZ)
RFID-Based Supply Chain Partner Authentication and Key Agreement, Florian Kerschbaum (SAP Research, Germany), Alessandro Sorniotti (SAP Research, France)
Secrecy Amplification Protocols for Wireless Sensor Networks, Petr Svenda (Masaryk University, Czech Republic), Lukas Sekanina (Brno University of Technology, Czech Republic), Vashek Matyas (Masaryk University, Czech Republic)
Secure and Precise Location Verification Using Distance Bounding and Simultaneous Multilateration, Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu (University of Illinois at Urbana - Champaign, US)
Securing Network Access in Wireless Sensor Networks, Kun Sun (Intelligent Automation Inc., US), An Liu (North Carolina State University, US), Peng Ning (North Carolina State University, US), Roger Xu (Intelligent Automation, Inc, US), Douglas Maughan (DHS International)
Self-healing Control Flow Protection in Sensor Applications, Christopher Ferguson, Qijun Gu, Hongchi Shi (Texas State University at San Marcos, US)
Stealthy Video Capturer: A New Video-based Spyware in 3G Smartphones, Nan Xu (City University of Hong Kong), Fan Zhang (City University of Hong Kong and Huazhong University of Science and Technology), Yisha Luo (City University of Hong Kong), Weijia Jia (City University of Hong Kong), Dong Xuan (Ohio State University, US) and Jin Teng (City University of Hong Kong)
Towards a Theory for Securing Time Synchronization in Wireless Sensor Networks, Murtuza Jadliwala (EPFL, Switzerland), Qi Duan (State University of New York at Buffalo, USA), Shambhu Upadhyaya (State University of New York at Buffalo, USA), Jinhui Xu (State University of New York at Buffalo, USA)