Search Results - "Cagalj, M."

Refine Results
  1. 1

    Key Agreement in Peer-to-Peer Wireless Networks by Cagalj, M., Capkun, S., Hubaux, J.-P.

    Published in Proceedings of the IEEE (01-02-2006)
    “…We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellmankey…”
    Get full text
    Journal Article
  2. 2

    Efficient MAC in cognitive radio systems: A game-theoretic approach by Felegyhazi, M., Cagalj, M., Hubaux, J.-P.

    “…In this paper, we study the problem of efficient medium access control (MAC) among cognitive radio devices that are equipped with multiple radios and thus are…”
    Get full text
    Journal Article
  3. 3

    On selfish behavior in CSMA/CA networks by Cagalj, M., Ganeriwal, S., Aad, I., Hubaux, J.-P.

    “…CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, CSMA/CA was designed with the assumption that the nodes…”
    Get full text
    Conference Proceeding
  4. 4

    Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks by Felegyhazi, M., Cagalj, M., Bidokhti, S.S., Hubaux, J.-P.

    “…Channel allocation was extensively studied in the framework of cellular networks. But the emergence of new system concepts, such as cognitive radio systems,…”
    Get full text
    Conference Proceeding
  5. 5

    Optimizing Decision Tree Attack on CAS Scheme by PERKOVIC, T., BUGARIC, M., CAGALJ, M.

    “…In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS) scheme. We exploit the weakness of…”
    Get full text
    Journal Article
  6. 6

    Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels by Capkun, S., Cagalj, M., Rengaswamy, R., Tsigkogiannis, I., Hubaux, J.-P., Srivastava, M.

    “…Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a…”
    Get full text
    Journal Article
  7. 7

    On WPA2-Enterprise Privacy in High Education and Science by Čagalj, M., Bugarić, M., Dagelić, A., Perković, T.

    “…A plethora of organizations, companies, and foremost universities and educational institutions are using WPA2-Enterprise protocol to allow their end-users to…”
    Get full text
    Journal Article
  8. 8
  9. 9

    Collecting Information for Biomass Estimation in Mariculture with a Heterogeneous Robotic System by Rezo, M., Cagalj, K.-M., Usljebrka, I., Kovacic, Z.

    “…In this paper, we address the problem of fish stock estimation in marine fisheries using a heterogeneous robotic system consisting of unmanned aerial vehicles…”
    Get full text
    Conference Proceeding
  10. 10
  11. 11
  12. 12

    Energy-Efficient Broadcasting in All-Wireless Networks by Čagalj, Mario, Hubaux, Jean-Pierre, Enz, Christian C.

    Published in Wireless networks (01-01-2005)
    “…In all-wireless networks, minimizing energy consumption is crucial as in most cases the nodes are battery-operated. We focus on the problem of power-optimal…”
    Get full text
    Journal Article
  13. 13
  14. 14

    Secure Location Verification with Hidden and Mobile Base Stations by Capkun, S., Rasmussen, K.B., Cagalj, M., Srivastava, M.

    Published in IEEE transactions on mobile computing (01-04-2008)
    “…In this work, we propose and analyze a new approach for securing localization and location verification in wireless networks based on hidden and mobile base…”
    Get full text
    Magazine Article
  15. 15

    Wormhole-Based Antijamming Techniques in Sensor Networks by Cagalj, M., Capkun, S., Hubaux, J.-P.

    Published in IEEE transactions on mobile computing (01-01-2007)
    “…Due to their very nature, wireless sensor networks are probably the category of wireless networks most vulnerable to "radio channel jamming"-based…”
    Get full text
    Magazine Article
  16. 16

    Integrity (I) codes: message integrity protection and authentication over insecure channels by Cagalj, M., Capkun, S., Rengaswamy, R., Tsigkogiannis, I., Srivastava, M., Hubaux, J.-P.

    “…Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a…”
    Get full text
    Conference Proceeding
  17. 17

    Border Games in Cellular Networks by Felegyhazi, M., Cagalj, M., Dufour, D., Hubaux, J.-P.

    “…In each country today, cellular networks operate on carefully separated frequency bands. This separation is imposed by the regulators of the given country to…”
    Get full text
    Conference Proceeding
  18. 18

    Multi-radio channel allocation in competitive wireless networks by Felegyhazi, M., Cagalj, M., Hubaux, J.-P.

    “…Channel allocation has been extensively studied in the framework of cellular networks, but the emergence of new system concepts, such as cognitive radio…”
    Get full text
    Conference Proceeding
  19. 19

    SSSL: Shoulder Surfing Safe Login by Perkovic, T., Cagalj, M., Rakic, N.

    “…Classical PIN-entry methods are vulnerable to a broad class of observation attacks (shoulder surfing, key-logging). A number of alternative PIN-entry methods…”
    Get full text
    Conference Proceeding
  20. 20

    Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads by Karame, G., Cagalj, M., Capkun, S.

    “…Peer-to-peer (P2P) architectures are gaining increasing popularity in disseminating content to a large number of nodes. In this paper, we show that small…”
    Get full text
    Conference Proceeding