Cargando…

Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers /

Theseproceedingscontainthepapersofthe3rdEuropeanWorkshoponSecurity and Privacy in Ad Hoc and Sensor Networks (ESAS 2006), which was held in Hamburg, Germany, September 20-21, 2006, in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). This year, a total of...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Buttyan, Levente (Editor ), Gligor, Virgil (Editor ), Westhoff, Dirk (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Computer Communication Networks and Telecommunications, 4357
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Abstracts of Invited Talks
  • Security and Cooperation in Wireless Networks
  • Grey-Box Cryptography: Physical Unclonable Functions
  • Regular Papers
  • Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks
  • Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks
  • Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks
  • Impact of Pseudonym Changes on Geographic Routing in VANETs
  • Identification in Infrastructureless Networks
  • Two's Company, Three Is a Crowd: A Group-Admission Protocol for WSNs
  • So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
  • Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol
  • On the Wiretap Channel Induced by Noisy Tags
  • On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks
  • Cryptographic Protocol to Establish Trusted History of Interactions
  • Ad Hoc Security Associations for Groups
  • Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks
  • Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks.