@inproceedings{MooreRCPAH08secon, author = {Tyler Moore and Maxim Raya and Jolyon Clulow and Panagiotis Papadimitratos and Ross Anderson and Jean-Pierre Hubaux}, title = {Fast Exclusion of Errant Devices from Vehicular Networks}, booktitle = {SECON}, year = {2008}, pages = {135-143}, puburl = {http://dx.doi.org/10.1109/SAHCN.2008.26}, url = {http://lyle.smu.edu/~tylerm/secon.pdf}, crossref = {2008secon} }
@proceedings{2008secon, title = {Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2008, June 16-20, 2008, Crowne Plaza, San Francisco International Airport, California, USA}, booktitle = {SECON}, publisher = {IEEE}, year = {2008} }
@inproceedings{MooreCNA07esas, author = {Tyler Moore and Jolyon Clulow and Shishir Nagaraja and Ross Anderson}, title = {New Strategies for Revocation in Ad-Hoc Networks}, booktitle = {ESAS}, year = {2007}, pages = {232-246}, puburl = {http://dx.doi.org/10.1007/978-3-540-73275-4_17}, url = {http://lyle.smu.edu/~tylerm/esas07.pdf}, presurl = {http://lyle.smu.edu/~tylerm/esas07-pres.pdf}, crossref = {2007esas} }
@proceedings{2007esas, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, booktitle = {ESAS}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4572}, year = {2007}, isbn = {978-3-540-73274-7} }
@inproceedings{MooreC07sec, author = {Tyler Moore and Jolyon Clulow}, title = {Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks}, booktitle = {SEC}, year = {2007}, pages = {157-168}, puburl = {http://dx.doi.org/10.1007/978-0-387-72367-9_14}, url = {http://lyle.smu.edu/~tylerm/ifipsec2007-path.pdf}, presurl = {http://lyle.smu.edu/~tylerm/ifipsec-pres.pdf}, crossref = {2007sec} }
@proceedings{2007sec, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa}, booktitle = {SEC}, publisher = {Springer}, series = {IFIP}, volume = {232}, year = {2007}, isbn = {978-0-387-72366-2} }
@article{ClulowM06sigops, author = {Jolyon Clulow and Tyler Moore}, title = {Suicide for the common good: a new strategy for credential revocation in self-organizing systems}, journal = {Operating Systems Review}, volume = {40}, number = {3}, year = {2006}, pages = {18-21}, puburl = {http://doi.acm.org/10.1145/1151374.1151381} }
@inproceedings{ClulowHKM06esas, author = {Jolyon Clulow and Gerhard P. Hancke and Markus G. Kuhn and Tyler Moore}, title = {So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks}, booktitle = {ESAS}, year = {2006}, pages = {83-97}, puburl = {http://dx.doi.org/10.1007/11964254_9}, url = {http://lyle.smu.edu/~tylerm/esas2006-distance.pdf}, presurl = {http://lyle.smu.edu/~tylerm/esas-pres.pdf}, crossref = {2006esas} }
@proceedings{2006esas, editor = {Levente Butty{\'a}n and Virgil D. Gligor and Dirk Westhoff}, title = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, booktitle = {ESAS}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4357}, year = {2006}, isbn = {978-3-540-69172-3} }
@incollection{SwensonMS06ifip11-9, year = {2006}, isbn = {978-0-387-36890-0}, booktitle = {Advances in Digital Forensics II}, volume = {222}, series = {IFIP Advances in Information and Communication}, editor = {Olivier, Martin and Shenoi, Sujeet}, doi = {10.1007/978-0-387-36891-7_21}, title = {GSM Cell Site Forensics}, puburl = {http://dx.doi.org/10.1007/978-0-387-36891-7_21}, publisher = {Springer}, keywords = {GSM networks; cell site forensics; subscriber location estimation}, author = {Swenson, Christopher and Moore, Tyler and Shenoi, Sujeet}, pages = {259-272}, language = {English} }
@inproceedings{Moore06percom, author = {Tyler Moore}, title = {A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks}, booktitle = {PerCom Workshops}, year = {2006}, pages = {251-255}, puburl = {http://doi.ieeecomputersociety.org/10.1109/PERCOMW.2006.3}, url = {http://lyle.smu.edu/~tylerm/persec06-moore.pdf}, presurl = {http://lyle.smu.edu/~tylerm/persec06-moore-pres.pdf}, crossref = {2006wpercom} }
@proceedings{2006wpercom, title = {4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy}, booktitle = {PerCom Workshops}, publisher = {IEEE Computer Society}, year = {2006}, isbn = {0-7695-2520-2} }
This file was generated by bibtex2html 1.96.