P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux, "Secure Vehicular Communications: Design and Architecture", IEEE Comm. Magazine ,2008 View Artical
P. Papadimitratos and A. Jovanovic, "GNSS-Based Positioning: Attacks and Countermeasures", Proc. IEEE Military Comm. Conf. (MILCOM), View Artical
L. Lazos and R. Poovendran, "HiRLoc: High-Resolution Robust Localization for Wireless Sensor Networks", IEEE J. Selected Areas in Comm. ,2006 View Artical
R. Poovendran and L. Lazos, "A Graph Theoretic Framework for Preventing the Wormhole Attack ,2007 View Artical
S. Zhong, M. Jadliwala, S. Upadhyaya, and C. Qiao, "Towards a Theory of Robust Localization against Malicious Beacon Nodes ,2008 View Artical
P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S.Capkun, and J.-P. Hubaux, "Secure Neighborhood Discovery:AFundamental Element for Mobile Ad Hoc Networks", IEEE Comm. Magazine ,2008 View Artical
Y.-C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks ,2003 View Artical
J. Eriksson, S. Krishnamurthy, and M. Faloutsos, "TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks", IEEE 14th Int?l Conf. Network Protocols (ICNP) ,2006 View Artical
R. Maheshwari, J. Gao, and S. Das, "Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information ,2007 View Artical
R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J.-P. Hubaux, "A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks", Proc. Second ACM Conf. Wireless Network Security ,2009 View Artical
M. Poturalski, P. Papadimitratos, and J.-P. Hubaux, "Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility ,2008 View Artical
E. Ekici, S. Vural, J. McNair, and D. Al-Abri, "Secure Probabilistic Location Verification in Randomly Deployed Wireless Sensor Networks", Elsevier Ad Hoc Networks ,2008 View Artical
J. Chiang, J. Haas, and Y. Hu, "Secure and Precise Location Verification Using Distance Bounding and Simultaneous Multilateration", Second ACM Conf. Wireless Network Security (WiSec) ,2009 View Artical
S. _Capkun, K. Rasmussen, M. Cagalj, and M. Srivastava, "Secure Location Verification with Hidden and Mobile Base Stations", IEEE Trans. Mobile Computing ,Vol.7 ,Issue 4 ,2008 View Artical
S. _Capkun and J.-P. Hubaux, "Secure Positioning in Wireless Networks", IEEE J. Selected Areas in Comm ,Vol.24 ,2006 View Artical
A. Vora and M. Nesterenko, "Secure Location Verification UsingRadio Broadcast", IEEE Trans. Dependable and Secure Computing ,Vol.3 ,2006 View Artical
J. Hwang, T. He, and Y. Kim, "Detecting Phantom Nodes in Wireless Sensor Networks ,2007 View Artical