


default search action
3. ESAS 2006: Hamburg, Germany
- Levente Buttyán, Virgil D. Gligor, Dirk Westhoff:

Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4357, Springer 2006, ISBN 978-3-540-69172-3
Abstracts of Invited Talks
- Jean-Pierre Hubaux:

Security and Cooperation in Wireless Networks. 1-2 - Pim Tuyls:

Grey-Box Cryptography: Physical Unclonable Functions. 3-5
Regular Papers
- Lejla Batina, Nele Mentens

, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede
:
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. 6-17 - Frederik Armknecht

, Joao Girão, Marc Ph. Stoecklin, Dirk Westhoff:
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. 18-31 - Sepideh Fouladgar, Bastien Mainaud, Khaled Masmoudi, Hossam Afifi:

Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks. 32-42 - Elmar Schoch, Frank Kargl, Tim Leinmüller, Stefan Schlott, Panos Papadimitratos

:
Impact of Pseudonym Changes on Geographic Routing in VANETs. 43-57 - Gina Kounga, Thomas Walter:

Identification in Infrastructureless Networks. 58-69 - Joao Girão, Miquel Martin:

Two's Company, Three Is a Crowd: A Group-Admission Protocol for WSNs. 70-82 - Jolyon Clulow, Gerhard P. Hancke

, Markus G. Kuhn
, Tyler Moore
:
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. 83-97 - Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens:

Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol. 98-112 - Julien Bringer, Hervé Chabanne:

On the Wiretap Channel Induced by Noisy Tags. 113-120 - Subhas Kumar Ghosh:

On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks. 121-135 - Samuel Galice, Marine Minier, John Mullins, Stéphane Ubéda:

Cryptographic Protocol to Establish Trusted History of Interactions. 136-149 - Jukka Valkonen, N. Asokan

, Kaisa Nyberg:
Ad Hoc Security Associations for Groups. 150-164 - Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner

:
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. 165-178 - Bartlomiej Sieka:

Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks. 179-192

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














