Follow
Matthias Wilhelm
Matthias Wilhelm
Unknown affiliation
Verified email at cs.uni-kl.de
Title
Cited by
Cited by
Year
Bringing up OpenSky: A large-scale ADS-B sensor network for research
M Schäfer, M Strohmeier, V Lenders, I Martinovic, M Wilhelm
IPSN-14 Proceedings of the 13th International Symposium on Information …, 2014
4732014
Short Paper: Reactive Jamming in Wireless Networks--How Realistic is the Threat?
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
Proceedings of the fourth ACM conference on Wireless network security (WiSec …, 2011
3322011
Detection of Reactive Jamming in DSSS-based Wireless Communications
M Spuhler, D Giustiniano, V Lenders, M Wilhelm, J Schmitt
IEEE Transactions on Wireless Communications 13 (3), 1593-1603, 2014
1152014
A practical man-in-the-middle attack on signal-based key generation protocols
S Eberz, M Strohmeier, M Wilhelm, I Martinovic
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
1042012
Secure Key Generation in Sensor Networks Based on Frequency-Selective Channels
M Wilhelm, I Martinovic, JB Schmitt
IEEE Journal on Selected Areas in Communications 31 (9), 1779--1790, 2013
932013
Secret Keys from Entangled Sensor Motes: Implementation and Analysis
M Wilhelm, I Martinovic, JB Schmitt
Proceedings of the third ACM conference on wireless network security (WiSec …, 2010
732010
On the Reception of Concurrent Transmissions in Wireless Sensor Networks
M Wilhelm, V Lenders, JB Schmitt
IEEE Transactions on Wireless Communications, 2014
462014
WiFire: A Firewall for Wireless Networks
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
Proceedings of the ACM SIGCOMM 2011 conference, 456-457, 2011
402011
Practical Message Manipulation Attacks in IEEE 802.15.4 Wireless Networks
M Wilhelm, JB Schmitt, V Lenders
1st Workshop on Physically-augmented Security for Wireless Networks (PILATES …, 2012
382012
Wireless client puzzles in IEEE 802.11 networks: security by wireless
I Martinovic, FA Zdarsky, M Wilhelm, C Wegmann, JB Schmitt
Proceedings of the first ACM conference on Wireless network security (WiSec …, 2008
362008
On key agreement in wireless sensor networks based on radio transmission properties
M Wilhelm, I Martinovic, JB Schmitt
5th IEEE Workshop on Secure Network Protocols (NPSec 2009), 37-42, 2009
332009
Detection of Reactive Jamming in DSSS-based Wireless Networks
D Giustiniano, V Lenders, JB Schmitt, M Spuhler, M Wilhelm
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless …, 2013
292013
Interconnecting Smart Cities by Vehicles: How feasible is it?
F Hagenauer, C Sommer, R Onishi, M Wilhelm, F Dressler, O Altintas
SmartCity16: The 2nd IEEE INFOCOM Workshop on Smart Cities and Urban …, 2016
192016
SUDOKU: Secure and usable deployment of keys on wireless sensors
M Wilhelm, I Martinovic, E Uzun, JB Schmitt
6th IEEE Workshop on Secure Network Protocols (NPSec 2010), 1-6, 2010
152010
WiSec 2011 demo: RFReact---a real-time capable and channel-aware jamming platform
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
ACM SIGMOBILE Mobile Computing and Communications Review 15 (3), 41-42, 2011
112011
Geo-spatial resource allocation for heterogeneous vehicular communications: Poster
M Wilhelm, T Higuchi, O Altintas
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc …, 2016
102016
Design, implementation, and performance analysis of discosec—service pack for securing WLANs
I Martinovic, P Pichota, M Wilhelm, FA Zdarsky, JB Schmitt
2008 International Symposium on a World of Wireless, Mobile and Multimedia …, 2008
92008
Key generation in wireless sensor networks based on frequency-selective channels-design, implementation, and analysis
M Wilhelm, I Martinovic, JB Schmitt
arXiv preprint arXiv:1005.0712, 2010
82010
Wireless communication apparatus and wireless communication method
H Kremo, O Altintas, MS Wilhelm
US Patent 10,098,175, 2018
72018
Air dominance in sensor networks: Guarding sensor motes using selective interference
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
arXiv preprint arXiv:1305.4038, 2013
72013
The system can't perform the operation now. Try again later.
Articles 1–20