Cargando…

Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers /

Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, intelligent homes, environmental monitoring or inter-vehicle communications: there is almost nothing left that is not going to be smart and networked. While a great amount of res...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Castelluccia, Claude (Editor ), Hartenstein, Hannes (Editor ), Paar, Christof (Editor ), Westhoff, Dirk (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Computer Communication Networks and Telecommunications, 3313
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • New Research Challenges for the Security of Ad Hoc and Sensor Networks
  • Public Key Cryptography in Sensor Networks-Revisited
  • Exploring Message Authentication in Sensor Networks
  • Secure Initialization in Single-Hop Radio Networks
  • Some Methods for Privacy in RFID Communication
  • Ring Signature Schemes for General Ad-Hoc Access Structures
  • Linking Ad Hoc Charging Schemes to AAAC Architectures
  • Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups
  • Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems
  • Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
  • Secure Overlay for Service Centric Wireless Sensor Networks
  • IKE in Ad-Hoc IP Networking
  • Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
  • A Security Architecture for Mobile Wireless Sensor Networks
  • Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-on
  • Key Management in Wireless Sensor Networks
  • SDD: Secure Directed Diffusion Protocol for Sensor Networks
  • Secure AES Hardware Module for Resource Constrained Devices.