Ahren Studer

According to our database1, Ahren Studer authored at least 23 papers between 2005 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Mobile encryption for laptop data protection (MELP).
IET Inf. Secur., 2012

2011
Verifying Physical Endpoints to Secure Digital Systems.
PhD thesis, 2011

Efficient and secure threshold-based event validation for VANETs.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Flooding-resilient broadcast authentication for VANETs.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
SPATE: Small-Group PKI-Less Authenticated Trust Establishment.
IEEE Trans. Mob. Comput., 2010

Mobile user location-specific encryption (MULE): using your office as your password.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

VANET alert endorsement using multi-source filters.
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010

2009
Flexible, extensible, and efficient VANET authentication.
J. Commun. Networks, 2009

TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

SPATE: small-group PKI-less authenticated trust establishment.
Proceedings of the 7th International Conference on Mobile Systems, 2009

The Coremelt Attack.
Proceedings of the Computer Security, 2009

A Study of User-Friendly Hash Comparison Schemes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Mind your manners: socially appropriate wireless key establishment for groups.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

GAnGS: gather, authenticate 'n group securely.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

A Survey to Guide Group Key Protocol Development.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Miss Rate Prediction Across Program Inputs and Cache Configurations.
IEEE Trans. Computers, 2007

Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

VANET-based approach for parking space availability.
Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, 2007

Intrusion Detection for Encrypted Web Accesses.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Adaptive Detection of Local Scanners.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Empirical Analysis of Rate Limiting Mechanisms.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005


  Loading...