Mario Cagalj

Orcid: 0000-0003-0235-7436

Affiliations:
  • Swiss Federal Institute of Technology in Lausanne, Switzerland


According to our database1, Mario Cagalj authored at least 36 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Analyses of ping-pong handovers in real 4G telecommunication networks.
Comput. Networks, May, 2023

2022
Dynamic monitoring frequency for energy-efficient data collection in Internet of Things.
J. Comput. Sci., 2022

2020
On WPA2-Enterprise Privacy in High Education and Science.
Secur. Commun. Networks, 2020

Predicting Low-Cost Gas Sensor Readings From Transients Using Long Short-Term Memory Neural Networks.
IEEE Internet Things J., 2020

Towards linking social media profiles with user's WiFi preferred network list.
Ad Hoc Networks, 2020

2019
LISA: Visible light based initialization and SMS based authentication of constrained IoT devices.
Future Gener. Comput. Syst., 2019

2018
BlinkComm: Initialization of IoT Devices Using Visible Light Communication.
Wirel. Commun. Mob. Comput., 2018

SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists.
Wirel. Commun. Mob. Comput., 2018

Towards reliable IoT: Testing LoRa communication.
Proceedings of the 26th International Conference on Software, 2018

2016
Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices.
Secur. Commun. Networks, 2016

2015
Timing Attacks on Cognitive Authentication Schemes.
IEEE Trans. Inf. Forensics Secur., 2015

Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks.
Pervasive Mob. Comput., 2015

2013
LIRA: A new key deployment scheme for Wireless Body Area Networks.
Proceedings of the 21st International Conference on Software, 2013

2012
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User.
IEEE Trans. Mob. Comput., 2012

2011
Breaking undercover: exploiting design flaws and nonuniform human behavior.
Proceedings of the Symposium On Usable Privacy and Security, 2011

2010
Integrity Regions: Authentication through Presence in Wireless Networks.
IEEE Trans. Mob. Comput., 2010

Shoulder-Surfing Safe Login in a Partially Observable Attacker Model.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Efficient MAC in cognitive radio systems: A game-theoretic approach.
IEEE Trans. Wirel. Commun., 2009

Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009

Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

On the Usability of Secure Association of Wireless Devices Based on Distance Bounding.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Secure Location Verification with Hidden and Mobile Base Stations.
IEEE Trans. Mob. Comput., 2008

Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels.
IEEE Trans. Dependable Secur. Comput., 2008

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

2007
Wormhole-Based Antijamming Techniques in Sensor Networks.
IEEE Trans. Mob. Comput., 2007

SecNav: secure broadcast localization and time synchronization in wireless networks.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

Border Games in Cellular Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Key Agreement in Peer-to-Peer Wireless Networks.
Proc. IEEE, 2006

Integrity regions: authentication through presence in wireless networks.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Secure Localization with Hidden and Mobile Base Stations.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Multi-radio channel allocation in competitive wireless networks.
Proceedings of the 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 2006

2005
Energy-Efficient Broadcasting in All-Wireless Networks.
Wirel. Networks, 2005

On selfish behavior in CSMA/CA networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2002
Minimum-energy broadcast in all-wireless networks: : NP-completeness and distribution issues.
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, 2002


  Loading...