default search action
3. ESAS 2006: Hamburg, Germany
- Levente Buttyán, Virgil D. Gligor, Dirk Westhoff:
Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4357, Springer 2006, ISBN 978-3-540-69172-3
Abstracts of Invited Talks
- Jean-Pierre Hubaux:
Security and Cooperation in Wireless Networks. 1-2 - Pim Tuyls:
Grey-Box Cryptography: Physical Unclonable Functions. 3-5
Regular Papers
- Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede:
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. 6-17 - Frederik Armknecht, Joao Girão, Marc Ph. Stoecklin, Dirk Westhoff:
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. 18-31 - Sepideh Fouladgar, Bastien Mainaud, Khaled Masmoudi, Hossam Afifi:
Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks. 32-42 - Elmar Schoch, Frank Kargl, Tim Leinmüller, Stefan Schlott, Panos Papadimitratos:
Impact of Pseudonym Changes on Geographic Routing in VANETs. 43-57 - Gina Kounga, Thomas Walter:
Identification in Infrastructureless Networks. 58-69 - Joao Girão, Miquel Martin:
Two's Company, Three Is a Crowd: A Group-Admission Protocol for WSNs. 70-82 - Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore:
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. 83-97 - Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens:
Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol. 98-112 - Julien Bringer, Hervé Chabanne:
On the Wiretap Channel Induced by Noisy Tags. 113-120 - Subhas Kumar Ghosh:
On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks. 121-135 - Samuel Galice, Marine Minier, John Mullins, Stéphane Ubéda:
Cryptographic Protocol to Establish Trusted History of Interactions. 136-149 - Jukka Valkonen, N. Asokan, Kaisa Nyberg:
Ad Hoc Security Associations for Groups. 150-164 - Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner:
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. 165-178 - Bartlomiej Sieka:
Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks. 179-192
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.