Loukas Lazos
Orcid: 0000-0002-6187-7063
According to our database1,
Loukas Lazos
authored at least 76 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ZITA: Zero-Interaction Two-Factor Authentication Using Contact Traces and In-Band Proximity Verification.
IEEE Trans. Mob. Comput., May, 2024
2023
IEEE Trans. Mob. Comput., August, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
2022
IEEE Trans. Mob. Comput., 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
2021
Proceedings of the MobiHoc '21: The Twenty-second International Symposium on Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
2020
IEEE Trans. Parallel Distributed Syst., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
IEEE Trans. Cogn. Commun. Netw., 2019
Proceedings of the 2019 Spring Simulation Conference, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018
2017
IEEE Trans. Mob. Comput., 2017
IEEE Trans. Mob. Comput., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
2016
IEEE Trans. Mob. Comput., 2016
Swift Jamming Attack on Frequency Offset Estimation: The Achilles' Heel of OFDM Systems.
IEEE Trans. Mob. Comput., 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Proceedings of the 11th Workshop on Visualization for Cyber Security, 2014
FD-MMAC: Combating multi-channel hidden and exposed terminals using a single transceiver.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Security vulnerability and countermeasures of frequency offset correction in 802.11a systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE Global Communications Conference, 2014
2013
IEEE Netw., 2013
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
2012
IEEE Trans. Mob. Comput., 2012
IEEE Trans. Mob. Comput., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Ad Hoc Networks, 2012
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
2011
IEEE Netw., 2011
J. Comput. Secur., 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
2010
Proceedings of IEEE International Conference on Communications, 2010
2009
Detection of mobile targets on the plane and in space using heterogeneous sensor networks.
Wirel. Networks, 2009
ACM Trans. Sens. Networks, 2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009
2008
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008
2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks.
Wirel. Networks, 2007
Wirel. Networks, 2007
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach.
IEEE/ACM Trans. Netw., 2007
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007
Proceedings of the Information Security and Cryptology, 2007
2006
ACM Trans. Sens. Networks, 2006
IEEE J. Sel. Areas Commun., 2006
Proceedings of the 4th International Symposium on Modeling and Optimization in Mobile, 2006
2005
ACM Trans. Sens. Networks, 2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005
2004
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004
Proceedings of the 60th IEEE Vehicular Technology Conference, 2004
Cross-layer design for energy-efficient secure multicast communications in ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2004
2003
Energy-aware secure multicast communication in ad-hoc networks using geographic location information.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003