


default search action
1. ESAS 2004: Heidelberg, Germany
- Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff:
Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3313, Springer 2005, ISBN 3-540-24396-8 - Jean-Pierre Hubaux:
New Research Challenges for the Security of Ad Hoc and Sensor Networks. 1 - Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar:
Public Key Cryptography in Sensor Networks - Revisited. 2-18 - Harald Vogt:
Exploring Message Authentication in Sensor Networks. 19-30 - Miroslaw Kutylowski, Wojciech Rutkowski:
Secure Initialization in Single-Hop Radio Networks. 31-41 - Kenneth P. Fishkin, Sumit Roy, Bing Jiang:
Some Methods for Privacy in RFID Communication. 42-53 - Javier Herranz, Germán Sáez:
Ring Signature Schemes for General Ad-Hoc Access Structures. 54-65 - Joao Girão, Bernd Lamparter, Dirk Westhoff, Rui L. Aguiar
, João Paulo Barraca:
Linking Ad Hoc Charging Schemes to AAAC Architectures. 66-81 - Tony K. Chan, Karyin Fung, Joseph K. Liu, Victor K. Wei:
Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. 82-94 - Seamus Moloney, Philip Ginzboorg
:
Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems. 95-106 - Mark Manulis, Jörg Schwenk:
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. 107-124 - Hans-Joachim Hof
, Erik-Oliver Blaß, Martina Zitterbart:
Secure Overlay for Service Centric Wireless Sensor Networks. 125-138 - Kaisa Nyberg:
IKE in Ad Hoc IP Networking. 139-151 - Frank Kargl, Andreas Klenk, Stefan Schlott, Michael Weber:
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. 152-165 - Stefan Schmidt, Holger Krahn, Stefan Fischer, Dietmar Wätjen:
A Security Architecture for Mobile Wireless Sensor Networks. 166-177 - Prakash Reddy, Eamonn O'Brien-Strain, Jim Rowson:
Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-on. 178-189 - Yann-Hang Lee, Vikram Phadke, Amit Deshmukh, Jin Wook Lee:
Key Management in Wireless Sensor Networks. 190-204 - Xiaoyun Wang, Lizhen Yang, Kefei Chen:
SDD: Secure Distributed Diffusion Protocol for Sensor Networks. 205-214 - Elena Trichina, Tymur A. Korkishko:
Secure AES Hardware Module for Resource Constrained Devices. 215-230

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.