| 2009 |
16 | | Ioannis Krontiris,
Zinaida Benenson,
Thanassis Giannetsos,
Felix C. Freiling,
Tassos Dimitriou:
Cooperative Intrusion Detection in Wireless Sensor Networks.
EWSN 2009: 263-278 |
| 2008 |
15 | | Zinaida Benenson,
Markus Bestehorn,
Erik Buchmann,
Felix C. Freiling,
Marek Jawurek:
Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks.
ADHOC-NOW 2008: 279-292 |
| 2007 |
14 | | Zinaida Benenson:
Lower Bounds.
Algorithms for Sensor and Ad Hoc Networks 2007: 117-130 |
13 | | Matthias R. Brust,
Adrian Andronache,
Steffen Rothkugel,
Zinaida Benenson:
Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks.
COMSWARE 2007 |
12 | | Zinaida Benenson,
Felix C. Freiling,
Peter M. Cholewinski:
Advanced Evasive Data Storage in Sensor Networks.
MDM 2007: 146-151 |
| 2006 |
11 | | Zinaida Benenson,
Felix C. Freiling,
Thorsten Holz,
Dogan Kesdogan,
Lucia Draque Penso:
Safety, Liveness, and Information Flow: Dependability Revisited.
ARCS Workshops 2006: 56-65 |
10 | | Zinaida Benenson,
Felix C. Freiling,
Birgit Pfitzmann,
Christian Rohner,
Michael Waidner:
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
ESAS 2006: 165-178 |
9 | | Milan Fort,
Felix C. Freiling,
Lucia Draque Penso,
Zinaida Benenson,
Dogan Kesdogan:
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.
ESORICS 2006: 34-48 |
8 | | Zinaida Benenson,
Lexi Pimenidis,
Felix C. Freiling,
Stefan Lucks:
Authenticated Query Flooding in Sensor Networks.
PerCom Workshops 2006: 644-647 |
7 | | Zinaida Benenson,
Felix C. Freiling,
Ernest Hammerschmidt,
Stefan Lucks,
Lexi Pimenidis:
Authenticated Query Flooding in Sensor Networks.
SEC 2006: 38-49 |
6 | | Alexander Becher,
Zinaida Benenson,
Maximillian Dornseif:
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.
SPC 2006: 104-118 |
5 | | Alexander Becher,
Zinaida Benenson,
Maximillian Dornseif:
Tampering with Motes: Real-World Attacks on Wireless Sensor Networks.
Sicherheit 2006: 26-29 |
| 2005 |
4 | | Zinaida Benenson,
Ulrich Kühn,
Stefan Lucks:
Cryptographic Attack Metrics.
Dependability Metrics 2005: 133-156 |
3 | | Zinaida Benenson,
Peter M. Cholewinski,
Felix C. Freiling:
Simple Evasive Data Storage in Sensor Networks.
IASTED PDCS 2005: 779-784 |
2 | | Zinaida Benenson,
Felix C. Gärtner,
Dogan Kesdogan:
Secure Multi-Party Computation with Security Modules.
Sicherheit 2005: 41-52 |
| 2004 |
1 | | Zinaida Benenson,
Felix C. Gärtner,
Dogan Kesdogan:
User Authentication in Sensor Networks.
GI Jahrestagung (2) 2004: 385-389 |