Secure mobile ad-hoc networks and sensors : first international workshop, MADNES 2005, Singapore, September 20 - 22, 2005 ; revised selected papers (English)
- New search for: MADNES
- Further information on MADNES:
- http://d-nb.info/gnd/6511757-8
- New search for: Burmester, Mike
- New search for: Yasinsac, Alec
- New search for: MADNES
- Further information on MADNES:
- http://d-nb.info/gnd/6511757-8
2006
-
ISBN:
- Conference Proceedings / Print
-
Title:Secure mobile ad-hoc networks and sensors : first international workshop, MADNES 2005, Singapore, September 20 - 22, 2005 ; revised selected papers
-
Contributors:
-
Conference:MADNES 2005 ; 1 ; 2005 ; Singapore
International Workshop on Secure Mobile Ad-hoc Networks and Sensors ; 1 ; 2005 ; Singapore -
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin , Heidelberg [u.a.]
-
Publication date:2006
-
Size:X, 191 S.
-
Remarks:graph. Darst.
Literaturangaben
Digital preservation by Badische Landesbibliothek -
ISBN:
-
Type of media:Conference Proceedings
-
Type of material:Print
-
Language:English
-
Contract number:2006929197
- New search for: 005.8
- Further information on Dewey Decimal Classification
- New search for: 53.74 / 54.32
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc NetworksGligor, V. D. et al. | 2006
- 2
-
A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor NetworkPark, J. S. / Sadi, M. G. / Kim, D. S. / Song, Y. D. et al. | 2006
- 14
-
Key Management for Mobile Sensor NetworksSanchez, D. S. / Baldus, H. et al. | 2006
- 27
-
Server-Aided RSA Key Generation Against Collusion AttackChen, Y. / Safavi-Naini, R. / Baek, J. / Chen, X. et al. | 2006
- 38
-
Hybrid Approach for Secure Mobile Agent ComputationsMcDonald, J. T. et al. | 2006
- 54
-
An XML Standards Based Authorization Framework for Mobile AgentsNavarro, G. / Borrell, J. et al. | 2006
- 67
-
Distributed Data Mining Protocols for Privacy: A Review of Some Recent ResultsWright, R. N. / Yang, Z. / Zhong, S. et al. | 2006
- 80
-
Detecting Impersonation Attacks in Future Wireless and Mobile NetworksBarbeau, M. / Hall, J. / Kranakis, E. et al. | 2006
- 96
-
Anonymous Distribution of Encryption Keys in Cellular Broadcast SystemsCichon, J. / Krzywiecki, L. / Kutylowski, M. / Wlaz, P. et al. | 2006
- 110
-
Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless NetworksJeon, J.-C. / Kim, K.-W. / Yoo, K.-Y. et al. | 2006
- 117
-
Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc NetworksZheng, Y. et al. | 2006
- 118
-
How to Generate Universally Verifiable Signatures in Ad-Hoc NetworksLee, K. / Oh, J. / Moon, S. et al. | 2006
- 132
-
"Fair" Authentication in Pervasive ComputingLi, J. / Christianson, B. / Loomes, M. et al. | 2006
- 144
-
Cryptanalysis of the Energy Efficient Stream Ciphers SSC2Liu, Y. / Qin, T. / Ni, W. / Zhang, S. et al. | 2006
- 158
-
ARMS: An Authenticated Routing Message in Sensor NetworksLee, S.-B. / Choi, Y.-H. et al. | 2006
- 174
-
Security Analysis and Improvement of Return Routability ProtocolQiu, Y. / Zhou, J. / Deng, R. et al. | 2006
- 182
-
Dark Encounter Computations (and Musings on Biological Networks)Peralta, R. et al. | 2006
- 186
-
Panel: Authentication in Constrained EnvironmentsBurmester, M. / Gligor, V. / Kranakis, E. / Tygar, D. / Zheng, Y. et al. | 2006