 | 2009 |
16 |  | Ioannis Krontiris,
Zinaida Benenson,
Thanassis Giannetsos,
Felix C. Freiling,
Tassos Dimitriou:
Cooperative Intrusion Detection in Wireless Sensor Networks.
EWSN 2009: 263-278 |
| 2008 |
15 |  | Zinaida Benenson,
Markus Bestehorn,
Erik Buchmann,
Felix C. Freiling,
Marek Jawurek:
Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks.
ADHOC-NOW 2008: 279-292 |
| 2007 |
14 |  | Zinaida Benenson:
Lower Bounds.
Algorithms for Sensor and Ad Hoc Networks 2007: 117-130 |
13 |  | Matthias R. Brust,
Adrian Andronache,
Steffen Rothkugel,
Zinaida Benenson:
Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks.
COMSWARE 2007 |
12 |  | Zinaida Benenson,
Felix C. Freiling,
Peter M. Cholewinski:
Advanced Evasive Data Storage in Sensor Networks.
MDM 2007: 146-151 |
| 2006 |
11 |  | Zinaida Benenson,
Felix C. Freiling,
Thorsten Holz,
Dogan Kesdogan,
Lucia Draque Penso:
Safety, Liveness, and Information Flow: Dependability Revisited.
ARCS Workshops 2006: 56-65 |
10 |  | Zinaida Benenson,
Felix C. Freiling,
Birgit Pfitzmann,
Christian Rohner,
Michael Waidner:
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
ESAS 2006: 165-178 |
9 |  | Milan Fort,
Felix C. Freiling,
Lucia Draque Penso,
Zinaida Benenson,
Dogan Kesdogan:
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.
ESORICS 2006: 34-48 |
8 |  | Zinaida Benenson,
Lexi Pimenidis,
Felix C. Freiling,
Stefan Lucks:
Authenticated Query Flooding in Sensor Networks.
PerCom Workshops 2006: 644-647 |
7 |  | Zinaida Benenson,
Felix C. Freiling,
Ernest Hammerschmidt,
Stefan Lucks,
Lexi Pimenidis:
Authenticated Query Flooding in Sensor Networks.
SEC 2006: 38-49 |
6 |  | Alexander Becher,
Zinaida Benenson,
Maximillian Dornseif:
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.
SPC 2006: 104-118 |
5 |  | Alexander Becher,
Zinaida Benenson,
Maximillian Dornseif:
Tampering with Motes: Real-World Attacks on Wireless Sensor Networks.
Sicherheit 2006: 26-29 |
| 2005 |
4 |  | Zinaida Benenson,
Ulrich Kühn,
Stefan Lucks:
Cryptographic Attack Metrics.
Dependability Metrics 2005: 133-156 |
3 |  | Zinaida Benenson,
Peter M. Cholewinski,
Felix C. Freiling:
Simple Evasive Data Storage in Sensor Networks.
IASTED PDCS 2005: 779-784 |
2 |  | Zinaida Benenson,
Felix C. Gärtner,
Dogan Kesdogan:
Secure Multi-Party Computation with Security Modules.
Sicherheit 2005: 41-52 |
| 2004 |
1 |  | Zinaida Benenson,
Felix C. Gärtner,
Dogan Kesdogan:
User Authentication in Sensor Networks.
GI Jahrestagung (2) 2004: 385-389 |