• A Lightweight RFID Protocol to protect against Traceability and Cloning attacks

  • Picking Virtual Pockets using Relay Attacks on Contactless Smartcard

  • On the Security of Distributed Position Services

  • Spread-Identity mechanisms for DOS resilience and Security.

  • Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast

  • Implications of Unlicensed Mobile Access (UMA) for GSM security

  • A rate adaptation algorithm for IEEE 802.11 WLANs based on MAC-layer loss differentiation

  • Using location information for scheduling in 802.15.3 MAC

  • Evaluating saturation throughput performance of the IEEE 802.11 MAC under fading channels

  • Inter-frame space (IFS)-based distributed fair queuing in IEEE 802.11 WLANs