Loukas Lazos

Orcid: 0000-0002-6187-7063

According to our database1, Loukas Lazos authored at least 76 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ZITA: Zero-Interaction Two-Factor Authentication Using Contact Traces and In-Band Proximity Verification.
IEEE Trans. Mob. Comput., May, 2024

2023
Misbehavior Detection in Wi-Fi/LTE Coexistence Over Unlicensed Bands.
IEEE Trans. Mob. Comput., August, 2023

SecBeam: Securing mmWave Beam Alignment against Beam-Stealing Attacks.
CoRR, 2023

Secret-Free Device Pairing in the mmWave Band.
CoRR, 2023

Wiggle: Physical Challenge-Response Verification of Vehicle Platooning.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

2022
In-Band Secret-Free Pairing for COTS Wireless Devices.
IEEE Trans. Mob. Comput., 2022

PoF: Proof-of-Following for Vehicle Platoons.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
Asymmetric Leaky Private Information Retrieval.
IEEE Trans. Inf. Theory, 2021

Repair Strategies for Mobile Storage Systems.
IEEE Trans. Cloud Comput., 2021

Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization.
Proceedings of the MobiHoc '21: The Twenty-second International Symposium on Theory, 2021

On the Capacity of Latent Variable Private Information Retrieval.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
Proofs of Physical Reliability for Cloud Storage Systems.
IEEE Trans. Parallel Distributed Syst., 2020

Misbehavior in Multi-Channel MAC Protocols.
IEEE Trans. Dependable Secur. Comput., 2020

Latent-variable Private Information Retrieval.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Energy-efficient LTE/Wi-Fi Coexistence.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Trading Privacy for Utility in Database-Assisted Dynamic Spectrum Access.
IEEE Trans. Cogn. Commun. Netw., 2019

Multimodal Graph Analysis of Cyber Attacks.
Proceedings of the 2019 Spring Simulation Conference, 2019

On the Capacity of Leaky Private Information Retrieval.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Optimum Priority Class Selection Under Wi-Fi/LTE Coexistence.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Secure Physical Layer Voting.
IEEE Trans. Mob. Comput., 2018

LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

SFIRE: Secret-Free-in-band Trust Establishment for COTS Wireless Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

On the Privacy and Utility Tradeoff in Database-Assisted Dynamic Spectrum Access.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

2017
Multi-Channel Medium Access without Control Channels: A Full Duplex MAC Design.
IEEE Trans. Mob. Comput., 2017

Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs.
IEEE Trans. Mob. Comput., 2017

Repair Strategies for Storage on Mobile Clouds.
CoRR, 2017

HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2016

Swift Jamming Attack on Frequency Offset Estimation: The Achilles' Heel of OFDM Systems.
IEEE Trans. Mob. Comput., 2016

Threshold-Based File Maintenance Strategies for Mobile Cloud Storage Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Time-Delayed Broadcasting for Defeating Inside Jammers.
IEEE Trans. Dependable Secur. Comput., 2015

PHYVOS: Physical layer voting for secure and fast cooperation.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
IMap: visualizing network activity over internet maps.
Proceedings of the 11th Workshop on Visualization for Cyber Security, 2014

FD-MMAC: Combating multi-channel hidden and exposed terminals using a single transceiver.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Security vulnerability and countermeasures of frequency offset correction in 802.11a systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Collusion-resistant query anonymization for location-based services.
Proceedings of the IEEE International Conference on Communications, 2014

Network anomaly detection using autonomous system flow aggregates.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Vulnerabilities of cognitive radio MAC protocols and countermeasures.
IEEE Netw., 2013

Welcome message from the D-SPAN 2013 chairs.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Perfect contextual information privacy in WSNs undercolluding eavesdroppers.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Countering selfish misbehavior in multi-channel MAC protocols.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Cluster-Based Control Channel Allocation in Opportunistic Cognitive Radio Networks.
IEEE Trans. Mob. Comput., 2012

Thwarting Control-Channel Jamming Attacks from Inside Jammers.
IEEE Trans. Mob. Comput., 2012

Packet-Hiding Methods for Preventing Selective Jamming Attacks.
IEEE Trans. Dependable Secur. Comput., 2012

Graph-based criteria for spectrum-aware clustering in cognitive radio networks.
Ad Hoc Networks, 2012

Hiding contextual information in WSNs.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

2011
Selective jamming/dropping insider attacks in wireless mesh networks.
IEEE Netw., 2011

Securing low-cost RFID systems: An unconditionally secure approach.
J. Comput. Secur., 2011

Thwarting inside jamming attacks on wireless broadcast communications.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

2010
Selective Jamming Attacks in Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2010

2009
Detection of mobile targets on the plane and in space using heterogeneous sensor networks.
Wirel. Networks, 2009

Analytic evaluation of target detection in heterogeneous wireless sensor networks.
ACM Trans. Sens. Networks, 2009

Mitigating control-channel jamming attacks in multi-channel ad hoc networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games.
Proceedings of the Security and Privacy in Communication Networks, 2009

Spectrum Opportunity-Based Control Channel Assignment in Cognitive Radio Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

2008
Reactive Identification of Misbehavior in Ad Hoc Networks Based on Random Audits.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

2007
Secure Localization for Wireless Sensor Networks using Range-Independent Methods.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks.
Wirel. Networks, 2007

Power proximity based key management for secure multicast in ad hoc networks.
Wirel. Networks, 2007

Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach.
IEEE/ACM Trans. Netw., 2007

On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targets.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

Probabilistic detection of mobile targets in heterogeneous sensor networks.
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007

Passive Attacks on a Class of Authentication Protocols for RFID.
Proceedings of the Information Security and Cryptology, 2007

2006
Stochastic coverage in heterogeneous sensor networks.
ACM Trans. Sens. Networks, 2006

HiRLoc: high-resolution robust localization for wireless sensor networks.
IEEE J. Sel. Areas Commun., 2006

Coverage in heterogeneous sensor networks.
Proceedings of the 4th International Symposium on Modeling and Optimization in Mobile, 2006

2005
SeRLoc: Robust localization for wireless sensor networks.
ACM Trans. Sens. Networks, 2005

Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Rope: robust position estimation in wireless sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

2004
SeRLoc: secure range-independent localization for wireless sensor networks.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

VP3: using vertex path and power proximity for energy efficient key distribution.
Proceedings of the 60th IEEE Vehicular Technology Conference, 2004

Cross-layer design for energy-efficient secure multicast communications in ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2004

2003
Energy-aware secure multicast communication in ad-hoc networks using geographic location information.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003


  Loading...