


default search action
Search dblp for Publications
export results for "toc:db/conf/esas/esas2006.bht:"
@inproceedings{DBLP:conf/esas/ArmknechtGSW06, author = {Frederik Armknecht and Joao Gir{\~{a}}o and Marc Ph. Stoecklin and Dirk Westhoff}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {18--31}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_4}, doi = {10.1007/11964254\_4}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/ArmknechtGSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/AwerbuchCCHR06, author = {Baruch Awerbuch and Robert G. Cole and Reza Curtmola and David Holmer and Herbert Rubens}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {98--112}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_10}, doi = {10.1007/11964254\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/AwerbuchCCHR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/BatinaMSPV06, author = {Lejla Batina and Nele Mentens and Kazuo Sakiyama and Bart Preneel and Ingrid Verbauwhede}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {6--17}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_3}, doi = {10.1007/11964254\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/BatinaMSPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/BenensonFPRW06, author = {Zinaida Benenson and Felix C. Freiling and Birgit Pfitzmann and Christian Rohner and Michael Waidner}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {165--178}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_15}, doi = {10.1007/11964254\_15}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/BenensonFPRW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/BringerC06, author = {Julien Bringer and Herv{\'{e}} Chabanne}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {On the Wiretap Channel Induced by Noisy Tags}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {113--120}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_11}, doi = {10.1007/11964254\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/BringerC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ClulowHKM06, author = {Jolyon Clulow and Gerhard P. Hancke and Markus G. Kuhn and Tyler Moore}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {83--97}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_9}, doi = {10.1007/11964254\_9}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/ClulowHKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/FouladgarMMA06, author = {Sepideh Fouladgar and Bastien Mainaud and Khaled Masmoudi and Hossam Afifi}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Tiny 3-TLS: {A} Trust Delegation Protocol for Wireless Sensor Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {32--42}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_5}, doi = {10.1007/11964254\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/FouladgarMMA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/GaliceMMU06, author = {Samuel Galice and Marine Minier and John Mullins and St{\'{e}}phane Ub{\'{e}}da}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Cryptographic Protocol to Establish Trusted History of Interactions}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {136--149}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_13}, doi = {10.1007/11964254\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/GaliceMMU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/Ghosh06, author = {Subhas Kumar Ghosh}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {121--135}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_12}, doi = {10.1007/11964254\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/Ghosh06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/GiraoM06, author = {Joao Gir{\~{a}}o and Miquel Martin}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Two's Company, Three Is a Crowd: {A} Group-Admission Protocol for WSNs}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {70--82}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_8}, doi = {10.1007/11964254\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/GiraoM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/Hubaux06, author = {Jean{-}Pierre Hubaux}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Security and Cooperation in Wireless Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {1--2}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_1}, doi = {10.1007/11964254\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/Hubaux06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/KoungaW06, author = {Gina Kounga and Thomas Walter}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Identification in Infrastructureless Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {58--69}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_7}, doi = {10.1007/11964254\_7}, timestamp = {Thu, 21 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esas/KoungaW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/SchochKLSP06, author = {Elmar Schoch and Frank Kargl and Tim Leinm{\"{u}}ller and Stefan Schlott and Panos Papadimitratos}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Impact of Pseudonym Changes on Geographic Routing in VANETs}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {43--57}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_6}, doi = {10.1007/11964254\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/SchochKLSP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/Sieka06, author = {Bartlomiej Sieka}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {179--192}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_16}, doi = {10.1007/11964254\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/Sieka06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/Tuyls06, author = {Pim Tuyls}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Grey-Box Cryptography: Physical Unclonable Functions}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {3--5}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_2}, doi = {10.1007/11964254\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/Tuyls06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ValkonenAN06, author = {Jukka Valkonen and N. Asokan and Kaisa Nyberg}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Ad Hoc Security Associations for Groups}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {150--164}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_14}, doi = {10.1007/11964254\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esas/ValkonenAN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esas/2006, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254}, doi = {10.1007/11964254}, isbn = {978-3-540-69172-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.