default search action
Diethelm Ostry
2020 – today
- 2022
- [j16]Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay K. Jha, Robert H. Deng, Elisa Bertino:
Orchestration or Automation: Authentication Flaw Detection in Android Apps. IEEE Trans. Dependable Secur. Comput. 19(4): 2165-2178 (2022) - 2021
- [c26]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021: 1671-1682 - [i2]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. CoRR abs/2103.05758 (2021)
2010 – 2019
- 2019
- [c25]Siqi Ma, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal, Diethelm Ostry, Elisa Bertino, Robert H. Deng, Zhuo Ma, Sanjay Jha:
An empirical study of SMS one-time password authentication in Android apps. ACSAC 2019: 339-354 - [c24]Siqi Ma, Elisa Bertino, Surya Nepal, Juanru Li, Diethelm Ostry, Robert H. Deng, Sanjay Jha:
Finding Flaws from Password Authentication Code in Android Apps. ESORICS (1) 2019: 619-637 - 2018
- [c23]Hailun Tan, Diet Ostry, Sanjay Jha:
Exploiting multiple side channels for secret key agreement in Wireless Networks. ICDCN 2018: 39:1-39:10 - 2017
- [c22]Mohammad Hossein Chinaei, Diethelm Ostry, Vijay Sivaraman:
A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems. CANS 2017: 436-455 - [c21]Mohammad Hossein Chinaei, Vijay Sivaraman, Diethelm Ostry:
An experimental study of secret key generation for passive Wi-Fi wearable devices. WoWMoM 2017: 1-9 - 2016
- [j15]Vijay Sivaraman, Arun Vishwanath, Diethelm Ostry, Marina Thottan:
Greening Router Line-Cards via Dynamic Management of Packet Memory. IEEE J. Sel. Areas Commun. 34(12): 3843-3853 (2016) - 2014
- [j14]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring. Future Gener. Comput. Syst. 35: 80-90 (2014) - [j13]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Gene Tsudik, Sanjay K. Jha:
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints. IEEE Trans. Inf. Forensics Secur. 9(12): 2193-2204 (2014) - [j12]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices. IEEE Trans. Mob. Comput. 13(12): 2763-2776 (2014) - [j11]Branislav Kusy, David Abbott, Christian Richter, Cong Huynh, Mikhail Afanasyev, Wen Hu, Michael Brünig, Diethelm Ostry, Raja Jurdak:
Radio diversity for reliable communication in sensor networks. ACM Trans. Sens. Networks 10(2): 32:1-32:29 (2014) - 2013
- [j10]Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha:
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. Comput. Secur. 32: 36-55 (2013) - [j9]Oliver Obst, Adrian Trinchi, Simon G. Hardin, Matthew Chadwick, Ivan Cole, Tim H. Muster, Nigel Hoschke, Diet Ostry, Don Price, Khoa N. Pham, Tim Wark:
Nano-scale reservoir computing. Nano Commun. Networks 4(4): 189-196 (2013) - [j8]Prasant Misra, Navinda Kottege, Branislav Kusy, Diethelm Ostry, Sanjay K. Jha:
Acoustical ranging techniques in embedded wireless sensor networked devices. ACM Trans. Sens. Networks 10(1): 15:1-15:38 (2013) - [c20]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay K. Jha:
Securing data provenance in body area networks using lightweight wireless link fingerprints. TrustED@CCS 2013: 65-72 - [c19]Oliver Obst, Adrian Trinchi, Simon G. Hardin, Matthew Chadwick, Ivan Cole, Tim H. Muster, Nigel Hoschke, Diet Ostry, Don Price, Khoa N. Pham, Tim Wark:
Nano-scale reservoir computing. ICC Workshops 2013: 804-808 - [c18]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay K. Jha:
Securing data provenance in body area networks using lightweight wireless link fingerprints. SenSys 2013: 85:1-85:2 - [i1]Oliver Obst, Adrian Trinchi, Simon G. Hardin, Matthew Chadwick, Ivan Cole, Tim H. Muster, Nigel Hoschke, Diet Ostry, Don Price, Khoa N. Pham, Tim Wark:
Nano-scale reservoir computing. CoRR abs/1309.1521 (2013) - 2012
- [c17]Linjia Yao, Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Decorrelating secret bit extraction via channel hopping in body area networks. PIMRC 2012: 1454-1459 - [c16]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Authentication of lossy data in body-sensor networks for healthcare monitoring. SECON 2012: 470-478 - [c15]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Zero reconciliation secret key generation for body-worn health monitoring devices. WISEC 2012: 39-50 - 2011
- [j7]Vijay Sivaraman, Diethelm Ostry, Jaleel Shaheen, Antoni Junior Hianto, Sanjay K. Jha:
Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j6]Hailun Tan, John Zic, Sanjay K. Jha, Diethelm Ostry:
Secure Multihop Network Programming with Multiple One-Way Key Chains. IEEE Trans. Mob. Comput. 10(1): 16-31 (2011) - [c14]Linjia Yao, Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Improving secret key generation performance for on-body devices. BODYNETS 2011: 19-22 - [c13]Prasant Misra, Nadeem Ahmed, Diethelm Ostry, Sanjay K. Jha:
Characterization of Asymmetry in Low-Power Wireless Links: An Empirical Study. ICDCN 2011: 340-351 - [c12]Branislav Kusy, Christian Richter, Wen Hu, Mikhail Afanasyev, Raja Jurdak, Michael Brünig, David Abbott, Cong Huynh, Diethelm Ostry:
Radio diversity for reliable communication in WSNs. IPSN 2011: 270-281 - [c11]Prasant Misra, Diethelm Ostry, Navinda Kottege, Sanjay K. Jha:
TWEET: an envelope detection based broadband ultrasonic ranging system. MSWiM 2011: 409-416 - [c10]Prasant Misra, Sanjay K. Jha, Diethelm Ostry:
Improving the coverage range of ultrasound-based localization systems. WCNC 2011: 605-610 - 2010
- [j5]Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, Diethelm Ostry:
Secure key loss recovery for network broadcast in single-hop wireless sensor networks. Ad Hoc Networks 8(6): 668-679 (2010) - [j4]Prasant Misra, Salil S. Kanhere, Diethelm Ostry, Sanjay K. Jha:
Safety assurance and rescue communication systems in high-stress environments: A mining case study. IEEE Commun. Mag. 48(4): 66-73 (2010) - [c9]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks. EUC 2010: 644-650 - [c8]Prasant Misra, Sanjay K. Jha, Diethelm Ostry:
Long-range detection in acoustic sensor networks. IPSN 2010: 372-373
2000 – 2009
- 2009
- [j3]Xiaotong Tang, Meng Ma, Diethelm Ostry, Bingli Jiao, Y. Jay Guo:
Characterizing impulsive network traffic using truncated α-stable processes. IEEE Commun. Lett. 13(12): 980-982 (2009) - [j2]Vijay Sivaraman, Hossam A. ElGindy, David Moreland, Diethelm Ostry:
Packet pacing in small buffer optical packet switched networks. IEEE/ACM Trans. Netw. 17(4): 1066-1079 (2009) - [c7]Prasant Misra, Sanjay K. Jha, Diethelm Ostry:
Analysis of an omni-directional narrowband ultrasonic receiver and CSS-based broadband transmission. SenSys 2009: 361-362 - [c6]Nadeem Ahmed, Prasant Misra, Sanjay K. Jha, Diethelm Ostry:
Characterization of link asymmetry in wireless sensor networks. SenSys 2009: 373-374 - [c5]Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha:
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. WISEC 2009: 245-252 - 2008
- [c4]Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, Diethelm Ostry:
A key loss recovery scheme for secure broadcasts in wireless sensor networks. PIMRC 2008: 1-5 - [c3]Hailun Tan, Sanjay K. Jha, Diethelm Ostry, John Zic, Vijay Sivaraman:
Secure multi-hop network programming with multiple one-way key chains. WISEC 2008: 183-193 - 2007
- [c2]Jaleel Shaheen, Diethelm Ostry, Vijay Sivaraman, Sanjay K. Jha:
Confidential and Secure Broadcast in Wireless Sensor Networks. PIMRC 2007: 1-5 - 2006
- [j1]D. I. Ostry:
Synthesis of accurate fractional Gaussian noise by filtering. IEEE Trans. Inf. Theory 52(4): 1609-1623 (2006) - [c1]Vijay Sivaraman, Hossam A. ElGindy, David Moreland, Diethelm Ostry:
Packet Pacing in Short Buffer Optical Packet Switched Networks. INFOCOM 2006
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint