Matthias Wilhelm
Matthias Wilhelm
Momentum Engineering Inc., Tokyo
Verified email at cs.uni-kl.de
Title
Cited by
Cited by
Year
Short Paper: Reactive Jamming in Wireless Networks--How Realistic is the Threat?
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
Proceedings of the fourth ACM conference on Wireless network security (WiSec …, 2011
2402011
Bringing up OpenSky: A large-scale ADS-B sensor network for research
M Schäfer, M Strohmeier, V Lenders, I Martinovic, M Wilhelm
IPSN-14 Proceedings of the 13th International Symposium on Information …, 2014
1752014
Detection of Reactive Jamming in DSSS-based Wireless Communications
M Spuhler, D Giustiniano, V Lenders, M Wilhelm, J Schmitt
IEEE Transactions on Wireless Communications 13 (3), 1593-1603, 2014
722014
Secure Key Generation in Sensor Networks Based on Frequency-Selective Channels
M Wilhelm, I Martinovic, JB Schmitt
IEEE Journal on Selected Areas in Communications 31 (9), 1779--1790, 2013
722013
A practical man-in-the-middle attack on signal-based key generation protocols
S Eberz, M Strohmeier, M Wilhelm, I Martinovic
European Symposium on Research in Computer Security, 235-252, 2012
662012
Secret Keys from Entangled Sensor Motes: Implementation and Analysis
M Wilhelm, I Martinovic, JB Schmitt
Proceedings of the third ACM conference on wireless network security (WiSec …, 2010
632010
WiFire: A Firewall for Wireless Networks
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
Proceedings of the ACM SIGCOMM 2011 conference, 456-457, 2011
382011
On the Reception of Concurrent Transmissions in Wireless Sensor Networks
M Wilhelm, V Lenders, JB Schmitt
IEEE Transactions on Wireless Communications, 2014
362014
On key agreement in wireless sensor networks based on radio transmission properties
M Wilhelm, I Martinovic, JB Schmitt
5th IEEE Workshop on Secure Network Protocols (NPSec 2009), 37-42, 2009
312009
Wireless client puzzles in IEEE 802.11 networks: security by wireless
I Martinovic, FA Zdarsky, M Wilhelm, C Wegmann, JB Schmitt
Proceedings of the first ACM conference on Wireless network security (WiSec …, 2008
312008
Practical Message Manipulation Attacks in IEEE 802.15.4 Wireless Networks
M Wilhelm, JB Schmitt, V Lenders
1st Workshop on Physically-augmented Security for Wireless Networks (PILATES …, 2012
232012
Detection of Reactive Jamming in DSSS-based Wireless Networks
D Giustiniano, V Lenders, JB Schmitt, M Spuhler, M Wilhelm
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless …, 2013
222013
Interconnecting Smart Cities by Vehicles: How feasible is it?
F Hagenauer, C Sommer, R Onishi, M Wilhelm, F Dressler, O Altintas
SmartCity16: The 2nd IEEE INFOCOM Workshop on Smart Cities and Urban …, 2016
172016
SUDOKU: Secure and usable deployment of keys on wireless sensors
M Wilhelm, I Martinovic, E Uzun, JB Schmitt
6th IEEE Workshop on Secure Network Protocols (NPSec 2010), 1-6, 2010
122010
WiSec 2011 demo: RFReact---a real-time capable and channel-aware jamming platform
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
ACM SIGMOBILE Mobile Computing and Communications Review 15 (3), 41-42, 2011
112011
Geo-spatial resource allocation for heterogeneous vehicular communications: Poster
M Wilhelm, T Higuchi, O Altintas
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc …, 2016
102016
Design, implementation, and performance analysis of discosec—service pack for securing WLANs
I Martinovic, P Pichota, M Wilhelm, FA Zdarsky, JB Schmitt
2008 International Symposium on a World of Wireless, Mobile and Multimedia …, 2008
92008
Air dominance in sensor networks: Guarding sensor motes using selective interference
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
arXiv preprint arXiv:1305.4038, 2013
72013
An Analytical Model of Packet Collisions in IEEE 802.15.4 Wireless Networks
M Wilhelm, V Lenders, JB Schmitt
arXiv preprint arXiv:1309.4978, 2013
62013
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels-Design, Implementation, and Analysis
M Wilhelm, I Martinovic, JB Schmitt
arXiv preprint arXiv:1005.0712, 2010
62010
The system can't perform the operation now. Try again later.
Articles 1–20