MooreTylerWireless.bib

@inproceedings{MooreRCPAH08secon,
  author = {Tyler Moore and
               Maxim Raya and
               Jolyon Clulow and
               Panagiotis Papadimitratos and
               Ross Anderson and
               Jean-Pierre Hubaux},
  title = {Fast Exclusion of Errant Devices from Vehicular Networks},
  booktitle = {SECON},
  year = {2008},
  pages = {135-143},
  puburl = {http://dx.doi.org/10.1109/SAHCN.2008.26},
  url = {http://lyle.smu.edu/~tylerm/secon.pdf},
  crossref = {2008secon}
}
@proceedings{2008secon,
  title = {Proceedings of the Fifth Annual IEEE Communications Society
               Conference on Sensor, Mesh and Ad Hoc Communications and
               Networks, SECON 2008, June 16-20, 2008, Crowne Plaza, San
               Francisco International Airport, California, USA},
  booktitle = {SECON},
  publisher = {IEEE},
  year = {2008}
}
@inproceedings{MooreCNA07esas,
  author = {Tyler Moore and
               Jolyon Clulow and
               Shishir Nagaraja and
               Ross Anderson},
  title = {New Strategies for Revocation in Ad-Hoc Networks},
  booktitle = {ESAS},
  year = {2007},
  pages = {232-246},
  puburl = {http://dx.doi.org/10.1007/978-3-540-73275-4_17},
  url = {http://lyle.smu.edu/~tylerm/esas07.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/esas07-pres.pdf},
  crossref = {2007esas}
}
@proceedings{2007esas,
  editor = {Frank Stajano and
               Catherine Meadows and
               Srdjan Capkun and
               Tyler Moore},
  title = {Security and Privacy in Ad-hoc and Sensor Networks, 4th
               European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007,
               Proceedings},
  booktitle = {ESAS},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {4572},
  year = {2007},
  isbn = {978-3-540-73274-7}
}
@inproceedings{MooreC07sec,
  author = {Tyler Moore and
               Jolyon Clulow},
  title = {Secure Path-Key Revocation for Symmetric Key Pre-distribution
               Schemes in Sensor Networks},
  booktitle = {SEC},
  year = {2007},
  pages = {157-168},
  puburl = {http://dx.doi.org/10.1007/978-0-387-72367-9_14},
  url = {http://lyle.smu.edu/~tylerm/ifipsec2007-path.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/ifipsec-pres.pdf},
  crossref = {2007sec}
}
@proceedings{2007sec,
  editor = {Hein S. Venter and
               Mariki M. Eloff and
               Les Labuschagne and
               Jan H. P. Eloff and
               Rossouw von Solms},
  title = {New Approaches for Security, Privacy and Trust in Complex
               Environments, Proceedings of the IFIP TC-11 22nd International
               Information Security Conference (SEC 2007), 14-16 May 2007,
               Sandton, South Africa},
  booktitle = {SEC},
  publisher = {Springer},
  series = {IFIP},
  volume = {232},
  year = {2007},
  isbn = {978-0-387-72366-2}
}
@article{ClulowM06sigops,
  author = {Jolyon Clulow and
               Tyler Moore},
  title = {Suicide for the common good: a new strategy for credential
               revocation in self-organizing systems},
  journal = {Operating Systems Review},
  volume = {40},
  number = {3},
  year = {2006},
  pages = {18-21},
  puburl = {http://doi.acm.org/10.1145/1151374.1151381}
}
@inproceedings{ClulowHKM06esas,
  author = {Jolyon Clulow and
               Gerhard P. Hancke and
               Markus G. Kuhn and
               Tyler Moore},
  title = {So Near and Yet So Far: Distance-Bounding Attacks in Wireless
               Networks},
  booktitle = {ESAS},
  year = {2006},
  pages = {83-97},
  puburl = {http://dx.doi.org/10.1007/11964254_9},
  url = {http://lyle.smu.edu/~tylerm/esas2006-distance.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/esas-pres.pdf},
  crossref = {2006esas}
}
@proceedings{2006esas,
  editor = {Levente Butty{\'a}n and
               Virgil D. Gligor and
               Dirk Westhoff},
  title = {Security and Privacy in Ad-Hoc and Sensor Networks, Third
               European Workshop, ESAS 2006, Hamburg, Germany, September
               20-21, 2006, Revised Selected Papers},
  booktitle = {ESAS},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {4357},
  year = {2006},
  isbn = {978-3-540-69172-3}
}
@incollection{SwensonMS06ifip11-9,
  year = {2006},
  isbn = {978-0-387-36890-0},
  booktitle = {Advances in Digital Forensics II},
  volume = {222},
  series = {IFIP Advances in Information and Communication},
  editor = {Olivier, Martin and Shenoi, Sujeet},
  doi = {10.1007/978-0-387-36891-7_21},
  title = {GSM Cell Site Forensics},
  puburl = {http://dx.doi.org/10.1007/978-0-387-36891-7_21},
  publisher = {Springer},
  keywords = {GSM networks; cell site forensics; subscriber location estimation},
  author = {Swenson, Christopher and Moore, Tyler and Shenoi, Sujeet},
  pages = {259-272},
  language = {English}
}
@inproceedings{Moore06percom,
  author = {Tyler Moore},
  title = {A Collusion Attack on Pairwise Key Predistribution Schemes
               for Distributed Sensor Networks},
  booktitle = {PerCom Workshops},
  year = {2006},
  pages = {251-255},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/PERCOMW.2006.3},
  url = {http://lyle.smu.edu/~tylerm/persec06-moore.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/persec06-moore-pres.pdf},
  crossref = {2006wpercom}
}
@proceedings{2006wpercom,
  title = {4th IEEE Conference on Pervasive Computing and Communications
               Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa,
               Italy},
  booktitle = {PerCom Workshops},
  publisher = {IEEE Computer Society},
  year = {2006},
  isbn = {0-7695-2520-2}
}

This file was generated by bibtex2html 1.96.