default search action
1. SecureComm 2005: Athens, Greece
- First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005. IEEE 2005, ISBN 0-7695-2369-2
- Sandro Grech, Pasi Eronen:
Implications of Unlicensed Mobile Access (UMA) for GSM security. 3-12 - Roberto Di Pietro, Stefano Chessa, Piero Maestrini:
Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast. 13-22 - Dhananjay S. Phatak:
Spread-Identity mechanisms for DOS resilience and Security. 23-34 - Xiaoxin Wu, Cristina Nita-Rotaru:
On the Security of Distributed Position Services. 35-46 - Ziv Kfir, Avishai Wool:
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard. 47-58 - Tassos Dimitriou:
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks. 59-66 - Gerhard P. Hancke, Markus G. Kuhn:
An RFID Distance Bounding Protocol. 67-73 - Ari Juels, David Molnar, David A. Wagner:
Security and Privacy Issues in E-passports. 74-88 - Issa M. Khalil, Saurabh Bagchi, Cristina Nita-Rotaru:
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks. 89-100 - Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia:
Securing Topology Maintenance Protocols for Sensor Networks. 101-112 - Jing Deng, Richard Han, Shivakant Mishra:
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. 113-126 - Hahnsang Kim, Kang G. Shin, Walid Dabbous:
Improving Cross-domain Authentication overWireless Local Area Networks. 127-138 - Tuomas Aura, Michael Roe:
Reducing Reauthentication Delay in Wireless Networks. 139-148 - Y. Dong, H. W. Go, Ai Fen Sui, Victor O. K. Li, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks. 149-156 - Danfeng Yao, Roberto Tamassia, Seth Proctor:
On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing. 157-170 - Marco Voss, Andreas Heinemann, Max Mühlhäuser:
A Privacy Preserving Reputation System for Mobile Information Dissemination Networks. 171-181 - Vagner J. do Sacramento Rodrigues, Markus Endler, Fernando N. Nascimento:
A Privacy Service for Context-aware Mobile Computing. 182-193 - Baik Hoh, Marco Gruteser:
Protecting Location Privacy Through Path Confusion. 194-205 - A. Karygiannis, Aggelos Kiayias, Yiannis Tsiounis:
A Solution for Wireless Privacy and Payments based on E-cash. 206-218 - Thomas E. Daniels, Mani Mina, Steve Russell:
Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and Assurance. 219-221 - Rajeev Koodli, Vijay Devarapalli, Hannu Flinck, Charles E. Perkins:
Short Paper: Location Privacy with IP Mobility. 222-224 - Venkatesan Balakrishnan, Vijay Varadharajan:
Short Paper: Fellowship in Mobile Ad hoc Networks. 225-227 - Yen-Chieh Ouyang, Chung-Hua Chu:
Short Paper: A Secure Interworking Scheme for UMTS-WLAN. 228-230 - Svetlana Radosavac, Karl Seamon, John S. Baras:
Short Paper: bufSTAT - a tool for early detection and classification of buffer overflow attacks. 231-233 - Indrakshi Ray, Lijun Yu:
Short Paper: Towards a Location-Aware Role-Based Access Control Model. 234-236 - Khaled Masmoudi, Mureed Hussain, Hossam Afifi, Dominique Seret:
Short paper: Tri-party TLS Adaptation for Trust Delegation in Home Networks. 237-239 - Wassim Itani, Ayman I. Kayssi, Ali Chehab:
Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices. 240-242 - David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation. 243-248 - Jyh-How Huang, Jason Buckingham, Richard Han:
A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network. 249-260 - Amir A. Sayegh, Mahmoud T. El-Hadidi:
A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems. 261-269 - H. Ragab Hassan, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal:
An Efficient Key Management Algorithm for Hierarchical Group Communication. 270-276 - David Sánchez Sánchez, Heribert Baldus:
A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks. 277-288 - Jing Deng, Carl Hartung, Richard Han, Shivakant Mishra:
A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks. 289-302 - Ioannis Pavlosoglou, Mark S. Leeson, Roger J. Green:
Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks. 303-314 - Jukka Ylitalo, Patrik Salmela, Hannes Tschofenig:
SPINAT: Integrating IPsec into Overlay Routing. 315-326 - Baruch Awerbuch, Reza Curtmola, David Holmer, Herbert Rubens, Cristina Nita-Rotaru:
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks. 327-338 - Yongguang Zhang, Yi-an Huang, Wenke Lee:
An Extensible Environment for Evaluating Secure MANET. 339-352 - Caimu Tang, Anthony T. Chronopoulos, Cauligi S. Raghavendra:
Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices. 353-364 - Ophir Levy, Avishai Wool:
Uniform Framework for Cryptanalysis of the Bluetooth E₀ Cipher. 365-373 - Daniele Quercia, Stephen Hailes:
MOTET: Mobile Transactions using Electronic Tickets. 374-383 - Urs Hengartner, Peter Steenkiste:
Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. 384-396 - Li Zhou, Jinfeng Ni, Chinya V. Ravishankar:
Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor Networks. 397-399 - Roberto Di Pietro, Antonio Durante, Luigi V. Mancini, Vishwas Patil:
Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy. 400-402 - Katrin Hoeper, Guang Gong:
Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks. 403-405 - Daniel Socek, Shujun Li, Spyros S. Magliveras, Borko Furht:
Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption. 406-407 - Sachin Garg, Navjot Singh, Timothy K. Tsai:
Short Paper: Schemes for Enhancing the Denial-of-Service Tolerance of SRTP. 409-411 - Timothy W. van der Horst, Kent E. Seamons:
Short Paper: Thor - The Hybrid Online Repository. 412-414 - Stefan Schlott, Frank Kargl, Michael Weber:
Short paper: Random IDs for preserving location privacy. 415-417 - Yu Liu, Yang Li, Hong Man:
Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks. 418-420 - Nicholas Bambos:
Short Paper: Dynamic Risk Mitigation for 'Self-defending' Network Security. 421-424
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.