Search Results - "Cagalj, M."
-
1
Key Agreement in Peer-to-Peer Wireless Networks
Published in Proceedings of the IEEE (01-02-2006)“…We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellmankey…”
Get full text
Journal Article -
2
Efficient MAC in cognitive radio systems: A game-theoretic approach
Published in IEEE transactions on wireless communications (01-04-2009)“…In this paper, we study the problem of efficient medium access control (MAC) among cognitive radio devices that are equipped with multiple radios and thus are…”
Get full text
Journal Article -
3
On selfish behavior in CSMA/CA networks
Published in Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (2005)“…CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, CSMA/CA was designed with the assumption that the nodes…”
Get full text
Conference Proceeding -
4
Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks
Published in IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications (01-01-2007)“…Channel allocation was extensively studied in the framework of cellular networks. But the emergence of new system concepts, such as cognitive radio systems,…”
Get full text
Conference Proceeding -
5
Optimizing Decision Tree Attack on CAS Scheme
Published in Advances in electrical and computer engineering (01-05-2016)“…In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS) scheme. We exploit the weakness of…”
Get full text
Journal Article -
6
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Published in IEEE transactions on dependable and secure computing (01-10-2008)“…Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a…”
Get full text
Journal Article -
7
On WPA2-Enterprise Privacy in High Education and Science
Published in Security and communication networks (2020)“…A plethora of organizations, companies, and foremost universities and educational institutions are using WPA2-Enterprise protocol to allow their end-users to…”
Get full text
Journal Article -
8
Socio-economic characteristics and attitudes of wild olive oil producers from Lun, Croatia, towards labelling with geographical origin
Published in Acta horticulturae (15-05-2018)Get full text
Journal Article -
9
Collecting Information for Biomass Estimation in Mariculture with a Heterogeneous Robotic System
Published in 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO) (27-09-2021)“…In this paper, we address the problem of fish stock estimation in marine fisheries using a heterogeneous robotic system consisting of unmanned aerial vehicles…”
Get full text
Conference Proceeding -
10
Secure Localization with Hidden and Mobile Base Stations
Published in Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications (01-04-2006)Get full text
Conference Proceeding -
11
Review of ethnobotanical research in Croatia
Published in Acta horticulturae (01-12-2023)Get full text
Journal Article -
12
Energy-Efficient Broadcasting in All-Wireless Networks
Published in Wireless networks (01-01-2005)“…In all-wireless networks, minimizing energy consumption is crucial as in most cases the nodes are battery-operated. We focus on the problem of power-optimal…”
Get full text
Journal Article -
13
Morphological variability of Sorbus domestica L. fruits and seeds in the Mediterranean part of Croatia
Published in Acta horticulturae (01-12-2023)Get full text
Journal Article -
14
Secure Location Verification with Hidden and Mobile Base Stations
Published in IEEE transactions on mobile computing (01-04-2008)“…In this work, we propose and analyze a new approach for securing localization and location verification in wireless networks based on hidden and mobile base…”
Get full text
Magazine Article -
15
Wormhole-Based Antijamming Techniques in Sensor Networks
Published in IEEE transactions on mobile computing (01-01-2007)“…Due to their very nature, wireless sensor networks are probably the category of wireless networks most vulnerable to "radio channel jamming"-based…”
Get full text
Magazine Article -
16
Integrity (I) codes: message integrity protection and authentication over insecure channels
Published in 2006 IEEE Symposium on Security and Privacy (S&P'06) (2006)“…Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a…”
Get full text
Conference Proceeding -
17
Border Games in Cellular Networks
Published in IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications (01-05-2007)“…In each country today, cellular networks operate on carefully separated frequency bands. This separation is imposed by the regulators of the given country to…”
Get full text
Conference Proceeding -
18
Multi-radio channel allocation in competitive wireless networks
Published in 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06) (2006)“…Channel allocation has been extensively studied in the framework of cellular networks, but the emergence of new system concepts, such as cognitive radio…”
Get full text
Conference Proceeding -
19
SSSL: Shoulder Surfing Safe Login
Published in SoftCOM 2009 - 17th International Conference on Software, Telecommunications & Computer Networks (01-09-2009)“…Classical PIN-entry methods are vulnerable to a broad class of observation attacks (shoulder surfing, key-logging). A number of alternative PIN-entry methods…”
Get full text
Conference Proceeding -
20
Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads
Published in 2009 Eighth IEEE International Symposium on Network Computing and Applications (01-07-2009)“…Peer-to-peer (P2P) architectures are gaining increasing popularity in disseminating content to a large number of nodes. In this paper, we show that small…”
Get full text
Conference Proceeding