


default search action
4. ESAS 2007: Cambridge, UK
- Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore:

Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings. Lecture Notes in Computer Science 4572, Springer 2007, ISBN 978-3-540-73274-7
Device Pairing
- Rene Mayrhofer

:
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams. 1-15 - Darko Kirovski, Mike Sinclair, David Wilson:

The Martini Synch: Joint Fuzzy Hashing Via Error Correction. 16-30 - Jaap-Henk Hoepman:

Private Handshakes. 31-42 - Jani Suomalainen

, Jukka Valkonen, N. Asokan:
Security Associations in Personal Networks: A Comparative Analysis. 43-57
Key Management
- Gelareh Taban, Reihaneh Safavi-Naini:

Key Establishment in Heterogeneous Self-organized Networks. 58-72 - Leif Uhsadel, Axel Poschmann, Christof Paar:

Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. 73-86 - Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald:

Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying. 87-100
Location Verification and Location Privacy
- Dave Singelée, Bart Preneel:

Distance Bounding in Noisy Environments. 101-115 - Matthew Roughan, Jon Arnold:

Multiple Target Localisation in Sensor Networks with Location Privacy. 116-128 - Levente Buttyán, Tamás Holczer, István Vajda:

On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. 129-141
Secure Routing and Forwarding
- Stephen Farrell, Christian Damsgaard Jensen:

"End-by-Hop" Data Integrity. 142-155 - Saikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert:

Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences. 156-171
Physical Security
- Ulrich Großmann, Enrik Berkhan, Luciana C. Jatoba, Jörg Ottenbacher, Wilhelm Stork, Klaus D. Müller-Glaser:

Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules. 172-186 - Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen

, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls:
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. 187-202
Detection of Compromise, and Revocation
- Christoph Krauß

, Frederic Stumpf, Claudia Eckert:
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. 203-217 - Ben Smyth, Mark Ryan

, Liqun Chen
:
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. 218-231 - Tyler Moore

, Jolyon Clulow, Shishir Nagaraja, Ross J. Anderson:
New Strategies for Revocation in Ad-Hoc Networks. 232-246

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














