dblp.uni-trier.dewww.uni-trier.de

Wade Trappe

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
49EEYingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin: A security and robustness performance analysis of localization algorithms to signal strength attacks. TOSN 5(1): (2009)
2008
48EEQing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe: SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. ASIACCS 2008: 201-204
47EELiang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe: MIMO-assisted channel-based authentication in wireless networks. CISS 2008: 642-646
46EEAliye Özge Kaya, Larry J. Greenstein, Wade Trappe: Characterizing Indoor Wireless Channels via Ray Tracing, and Validation via Measurements. GLOBECOM 2008: 4170-4174
45EELiang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe: A Physical-Layer Technique to Enhance Authentication for Mobile Terminals. ICC 2008: 1520-1524
44EEShweta Medhekar, Richard Howard, Wade Trappe, Yanyong Zhang, Peter Wolniansky: Mining joules and bits: towards a long-life pervasive system. IPDPS 2008: 1-8
43EESuhas Mathur, Wade Trappe, Narayan B. Mandayam, Chunxuan Ye, Alex Reznik: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. MOBICOM 2008: 128-139
42EEShu Chen, Yingying Chen, Wade Trappe: Exploiting Environmental Properties for Wireless Localization and Location Aware Applications. PerCom 2008: 90-99
41EEWenyuan Xu, Wade Trappe, Yanyong Zhang: Anti-jamming timing channels for wireless networks. WISEC 2008: 203-213
40EEKe Ma, Yanyong Zhang, Wade Trappe: Managing the Mobility of a Mobile Sensor Network Using Network Dynamics. IEEE Trans. Parallel Distrib. Syst. 19(1): 106-120 (2008)
39EEYu Zhang, Zang Li, Wade Trappe: Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems. IEEE Transactions on Information Forensics and Security 3(2): 259-272 (2008)
38EELiang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe: Using the physical layer for wireless authentication in time-variant channels. IEEE Transactions on Wireless Communications 7(7): 2571-2579 (2008)
37EEPandurang Kamat, Arati Baliga, Wade Trappe: Secure, pseudonymous, and auditable communication in vehicular ad hoc networks. Security and Communication Networks 1(3): 233-244 (2008)
36EEWenyuan Xu, Wade Trappe, Yanyong Zhang: Defending wireless sensor networks from radio interference through channel adaptation. TOSN 4(4): (2008)
2007
35EEZang Li, Wade Trappe, Roy D. Yates: Secret Communication via Multi-antenna Transmission. CISS 2007: 905-910
34EEYu Zhang, Zang Li, Wade Trappe: Power-Modulated Challenge-Response Schemes for Verifying Location Claims. GLOBECOM 2007: 39-43
33EEMichael Loiacono, Justinian Rosca, Wade Trappe: The Snowball Effect: DetailingPerformance Anomalies of 802.11 Rate Adaptation. GLOBECOM 2007: 5117-5122
32EELiang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe: Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. ICC 2007: 4646-4651
31EEPandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong Zhang: Temporal Privacy in Wireless Sensor Networks. ICDCS 2007: 23
30EEYingying Chen, Wade Trappe, Richard P. Martin: Attack Detection in Wireless Localization. INFOCOM 2007: 1964-1972
29EEWenyuan Xu, Wade Trappe, Yanyong Zhang: Channel surfing: defending wireless sensor networks from interference. IPSN 2007: 499-508
28EEYingying Chen, Wade Trappe, Richard P. Martin: ADLS: Attack Detection for Wireless Localization Using Least Squares. PerCom Workshops 2007: 610-613
27EEYingying Chen, Wade Trappe, Richard P. Martin: Detecting and Localizing Wireless Spoofing Attacks. SECON 2007: 193-202
26EEYu Zhang, Gautam D. Bhanage, Wade Trappe, Yanyong Zhang, Richard Howard: Facilitating an Active Transmit-only RFID System Through Receiver-based Processing. SECON 2007: 421-430
25EERobert C. Miller, Wenyuan Xu, Pandurang Kamat, Wade Trappe: Service Discovery and Device Identification in Cognitive Radio Networks. SECON 2007: 670-677
24EEMasahiro Kuroda, Ritsu Nomura, Wade Trappe: A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios. SECON 2007: 70-79
23EEQing Li, Wade Trappe: Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships. IEEE Transactions on Information Forensics and Security 2(4): 793-808 (2007)
2006
22EEYingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin: The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study. DCOSS 2006: 546-563
21EEHyukjoon Lee, Seung Hyong Rhee, Dipankar Raychaudhuri, Wade Trappe: Interworking of Self-organizing Hierarchical Ad Hoc Networks and the Internet. International Conference on Computational Science (4) 2006: 930-937
20EEShu Chen, Yu Zhang, Wade Trappe: Inverting sensor networks and actuating the environment for spatio-temporal access control. SASN 2006: 1-12
19EEWenyuan Xu, Wade Trappe, Yanyong Zhang: Channel surfing: defending wireless sensor networks from jamming and interference. SenSys 2006: 403-404
18EEPandurang Kamat, Arati Baliga, Wade Trappe: An identity-based security framework For VANETs. Vehicular Ad Hoc Networks 2006: 94-95
17EEZang Li, Wenyuan Xu, Rob Miller, Wade Trappe: Securing wireless systems via lower layer enforcements. Workshop on Wireless Security 2006: 33-42
16EEWenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang: Jamming sensor networks: attack and defense strategies. IEEE Network 20(3): 41-47 (2006)
15EEQing Li, Wade Trappe: Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. IEEE Transactions on Information Forensics and Security 1(2): 190-204 (2006)
2005
14EEWade Trappe, Yanyong Zhang, Badri Nath: MIAMI: methods and infrastructure for the assurance of measurement information. DMSN 2005: 11-17
13EEPandurang Kamat, Yanyong Zhang, Wade Trappe, Celal Ozturk: Enhancing Source-Location Privacy in Sensor Network Routing. ICDCS 2005: 599-608
12EEZang Li, Wade Trappe, Yanyong Zhang, Badri Nath: Robust statistical methods for securing wireless localization in sensor networks. IPSN 2005: 91-98
11EEWenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wood: The feasibility of launching and detecting jamming attacks in wireless networks. MobiHoc 2005: 46-57
10EEZ. Jane Wang, Min Wu, H. Vicky Zhao, Wade Trappe, K. J. Ray Liu: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Transactions on Image Processing 14(6): 804-821 (2005)
9EEWade Trappe, Yuke Wang, K. J. Ray Liu: Resource-aware conference key establishment for heterogeneous networks. IEEE/ACM Trans. Netw. 13(1): 134-146 (2005)
2004
8EECelal Ozturk, Yanyong Zhang, Wade Trappe: Source-location privacy in energy-constrained sensor network routing. SASN 2004: 88-93
7 Min Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu: Collusion-resistant multimedia fingerprinting: a unified framework. Security, Steganography, and Watermarking of Multimedia Contents 2004: 748-759
6EECelal Ozturk, Yanyong Zhang, Wade Trappe, Maximilian Ott: Source-Location Privacy for Networks of Energy-Constrained Sensors. WSTFEUS 2004: 68-
5EEWenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang: Channel surfing and spatial retreats: defenses against wireless denial of service. Workshop on Wireless Security 2004: 80-89
4EEYan Sun, Wade Trappe, K. J. Ray Liu: A scalable multicast key management scheme for heterogeneous wireless networks. IEEE/ACM Trans. Netw. 12(4): 653-666 (2004)
2003
3EEMathias Bohge, Wade Trappe: An authentication framework for hierarchical ad hoc sensor networks. Workshop on Wireless Security 2003: 79-87
2EEWade Trappe, Jie Song, Radha Poovendran, K. J. Ray Liu: Key management and distribution for secure multimedia multicast. IEEE Transactions on Multimedia 5(4): 544-557 (2003)
2002
1 Wade Trappe, Min Wu, K. J. Ray Liu: Anti-collusion codes: multi-user and multimedia perspectives. ICIP (2) 2002: 149-152

Coauthor Index

1B. R. Badrinath (Badri Nath) [12] [14]
2Arati Baliga [18] [37]
3Gautam D. Bhanage [26]
4Mathias Bohge [3]
5Shu Chen [20] [42]
6Yingying Chen [22] [27] [28] [30] [42] [49]
7Larry J. Greenstein [32] [38] [45] [46] [47]
8Richard Howard [26] [44]
9Yih-Chun Hu [48]
10Pandurang Kamat [13] [18] [25] [31] [37]
11Aliye Özge Kaya [46]
12Konstantinos Kleisouris [22] [49]
13Masahiro Kuroda [24]
14Hyukjoon Lee [21]
15Qing Li [15] [23] [48]
16Xiaoyan Li [22] [49]
17Zang Li [12] [17] [34] [35] [39]
18K. J. Ray Liu [1] [2] [4] [7] [9] [10]
19Michael Loiacono [33]
20Ke Ma [16] [40]
21Narayan B. Mandayam [32] [38] [43] [45] [47]
22Richard P. Martin [22] [27] [28] [30] [49]
23Suhas Mathur [43]
24Shweta Medhekar [44]
25Rob Miller (Robert C. Miller) [17] [25]
26Ritsu Nomura [24]
27Maximilian Ott [6]
28Celal Ozturk [6] [8] [13]
29Adrian Perrig [48]
30Radha Poovendran [2]
31Dipankar Raychaudhuri [21]
32Alex Reznik [43]
33Seung Hyong Rhee [21]
34Justinian Rosca [33]
35Jie Song [2]
36Yan Lindsay Sun (Yan Sun) [4]
37Jesse Walker [48]
38Yuke Wang [9]
39Z. Jane Wang [7] [10]
40Peter Wolniansky [44]
41Timothy Wood [5] [11]
42Min Wu [1] [7] [10]
43Liang Xiao [32] [38] [45] [47]
44Wenyuan Xu [5] [11] [16] [17] [19] [25] [29] [31] [36] [41]
45Roy D. Yates [35]
46Chunxuan Ye [43]
47Yanyong Zhang [5] [6] [8] [11] [12] [13] [14] [16] [19] [26] [29] [31] [36] [40] [41] [44]
48Yu Zhang [20] [26] [34] [39]
49H. Vicky Zhao [10]
50Meiyuan Zhao [48]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)