Jesse Walker

According to our database1, Jesse Walker authored at least 22 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
MultiK: A Framework for Orchestrating Multiple Specialized Kernels.
CoRR, 2019

2016
Cloud-Based Secure Logger for Medical Devices.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2013
Challenges and Opportunities for Securing Intelligent Transportation System.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2013

Lightweight secure communication protocols for in-vehicle sensor networks.
Proceedings of the CyCAR'13, 2013

2012
Security challenges for the intelligent transportation system.
Proceedings of the First International Conference on Security of Internet of Things, 2012

2011
Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material.
RFC, April, 2011

Access right assignment mechanisms for secure home networks.
J. Commun. Networks, 2011

Defining trust evidence: research directions.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol.
IACR Cryptol. ePrint Arch., 2010

SHA-512/256.
IACR Cryptol. ePrint Arch., 2010

Challenges in Access Right Assignment for Secure Home Networks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

2009
SEAR: a secure efficient <i>ad hoc</i> on demand routing protocol for wireless networks.
Secur. Commun. Networks, 2009

Designing user studies for security applications: a case study with wireless network configuration.
Int. J. Secur. Networks, 2009

2008
Developing a tool to support collaborative decision making via visualizations.
Proceedings of the ECCE 2008, 2008

SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
BSS transition optimizations and analysis for VoIP over WLAN.
Wirel. Pers. Commun., 2007

Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration.
Interactions, 2006

2005
Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs.
RFC, March, 2005

2004
Securing Block Storage Protocols over IP.
RFC, April, 2004

Overview of IEEE 802.16 Security.
IEEE Secur. Priv., 2004

2003
Security flaws in 802.11 data link protocols.
Commun. ACM, 2003


  Loading...