What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Wade Trappe
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2018
conf/cns
ROSTER: Radio Context Attestation in Cognitive Radio Network.
Ning Zhang
Wenhai Sun
Wenjing Lou
Y. Thomas Hou
Wade Trappe
2017
journals/tifs
Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities.
Andrey Garnaev
Wade Trappe
2017
journals/tifs
Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications.
Andrey Garnaev
Wade Trappe
2017
conf/cns
An OFDM-based dual radar/communication system facing uncertain jamming power.
Andrey Garnaev
Wade Trappe
2016
journals/tifs
A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary's Activity.
Andrey Garnaev
Wade Trappe
2016
conf/cns
Bargaining over secrecy and reliability for low SNR OFDM communications.
Wade Trappe
Andrey Garnaev
2015
journals/tifs
One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious.
Andrey Garnaev
Wade Trappe
2014
conf/cns
Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence.
Andrey Garnaev
Wade Trappe
2013
conf/cns
Welcome message.
Sushil Jajodia
Wenjing Lou
Wade Trappe
2011
journals/tifs
BIT-TRAPS: Building Information-Theoretic Traffic Privacy Into Packet Streams.
Suhas Mathur
Wade Trappe
2011
journals/tifs
Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems.
Wade Trappe
H. Vincent Poor
Hisato Iwai
Aylin Yener
Paul R. Prucnal
João Barros
2011
conf/wisec
Short paper: ACE: authenticating the channel estimation process in wireless communication systems.
Robert D. Miller
Wade Trappe
2010
journals/tifs
Information-theoretically secret key generation for fading wireless channels.
Chunxuan Ye
Suhas Mathur
Alex Reznik
Yogendra Shah
Wade Trappe
Narayan B. Mandayam
2010
conf/uss
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
Ishtiaq Rouf
Robert D. Miller
Hossen Asiful Mustafa
Travis Taylor
Sangho Oh
Wenyuan Xu
Marco Gruteser
Wade Trappe
Ivan Seskar
2010
conf/wisec
Subverting MIMO wireless systems by jamming the channel estimation procedure.
Robert D. Miller
Wade Trappe
2009
journals/tifs
Channel-based detection of Sybil attacks in wireless networks.
Liang Xiao
Larry J. Greenstein
Narayan B. Mandayam
Wade Trappe
2008
journals/tifs
Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems.
Yu Zhang
Zang Li
Wade Trappe
2008
conf/ccs
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.
Qing Li
Yih-Chun Hu
Meiyuan Zhao
Adrian Perrig
Jesse Walker
Wade Trappe
2008
conf/wisec
Anti-jamming timing channels for wireless networks.
Wenyuan Xu
Wade Trappe
Yanyong Zhang
2007
journals/tifs
Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships.
Qing Li
Wade Trappe
2006
journals/tifs
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security.
Qing Li
Wade Trappe
Coauthors
Adrian Perrig
(1)
Alex Reznik
(1)
Andrey Garnaev
(7)
Aylin Yener
(1)
Chunxuan Ye
(1)
H. Vincent Poor
(1)
Hisato Iwai
(1)
Hossen Asiful Mustafa
(1)
Ishtiaq Rouf
(1)
Ivan Seskar
(1)
Jesse Walker
(1)
João Barros
(1)
Larry J. Greenstein
(1)
Liang Xiao
(1)
Marco Gruteser
(1)
Meiyuan Zhao
(1)
Narayan B. Mandayam
(2)
Ning Zhang
(1)
Paul R. Prucnal
(1)
Qing Li
(3)
Robert D. Miller
(3)
Sangho Oh
(1)
Suhas Mathur
(2)
Sushil Jajodia
(1)
Travis Taylor
(1)
Wade Trappe
(21)
Wenhai Sun
(1)
Wenjing Lou
(2)
Wenyuan Xu
(2)
Y. Thomas Hou
(1)
Yanyong Zhang
(1)
Yih-Chun Hu
(1)
Yogendra Shah
(1)
Yu Zhang
(1)
Zang Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to