Exploring message authentication in sensor networks (English)
- New search for: Vogt, Harald
- New search for: Vogt, Harald
In:
ESAS, European Workshop, Security in Ad-hoc and Sensor Networks, 1
;
19-30
;
2005
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Exploring message authentication in sensor networks
-
Contributors:Vogt, Harald ( author )
-
Published in:Lecture Notes in Computer Science ; 3313 ; 19-30
-
Publisher:
-
Publication date:2005
-
Size:12 Seiten, 17 Quellen
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
New Research Challenges for the Security of Ad Hoc and Sensor NetworksHubaux, J.-P. et al. | 2005
- 2
-
Public Key Cryptography in Sensor Networks-RevisitedGaubatz, G. / Kaps, J.-P. / Sunar, B. et al. | 2005
- 19
-
Exploring Message Authentication in Sensor NetworksVogt, H. et al. | 2005
- 31
-
Secure Initialization in Single-Hop Radio NetworksKutylowski, M. / Rutkowski, W. et al. | 2005
- 42
-
Some Methods for Privacy in RFID CommunicationFishkin, K. P. / Roy, S. / Jiang, B. et al. | 2005
- 54
-
Ring Signature Schemes for General Ad-Hoc Access StructuresHerranz, J. / Saez, G. et al. | 2005
- 66
-
Linking Ad Hoc Charging Schemes to AAAC ArchitecturesGirao, J. / Lamparter, B. / Weshoff, D. / Aguiar, R. L. / Barraca, J. P. et al. | 2005
- 82
-
Blind Spontaneous Anonymous Group Signatures for Ad Hoc GroupsChan, T. K. / Fung, K. / Liu, J. K. / Wei, V. K. et al. | 2005
- 95
-
Security for Interactions in Pervasive Networks: Applicability of Recommendation SystemsMoloney, S. / Ginzboorg, P. et al. | 2005
- 107
-
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDHManulis, M. / Schwenk, J. et al. | 2005
- 125
-
Secure Overlay for Service Centric Wireless Sensor NetworksHof, H.-J. / Blass, E.-O. / Zitterbart, M. et al. | 2005
- 139
-
IKE in Ad Hoc IP NetworkingNyberg, K. et al. | 2005
- 152
-
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc NetworksKargl, F. / Klenk, A. / Schlott, S. / Weber, M. et al. | 2005
- 166
-
A Security Architecture for Mobile Wireless Sensor NetworksSchmidt, S. / Krahn, H. / Fischer, S. / Watjen, D. et al. | 2005
- 178
-
Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-onReddy, P. / O Brien-Strain, E. / Rowson, J. et al. | 2005
- 190
-
Key Management in Wireless Sensor NetworksLee, Y.-H. / Phadke, V. / Deshmukh, A. / Lee, J. W. et al. | 2005
- 205
-
SDD:Secure Distributed Diffusion Protocol for Sensor NetworksWang, X. / Yang, L. / Chen, K. et al. | 2005
- 205
-
SDD: Secure Directed Diffusion Protocol for sensor networksWang, Xiaoyun / Yang, Lizhen / Chen, Kefei et al. | 2005
- 215
-
Secure AES Hardware Module for Resource Constrained DevicesTrichina, E. / Korkishko, T. et al. | 2005