


default search action
1. SecureComm 2005: Athens, Greece
- First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005. IEEE 2005, ISBN 0-7695-2369-2

- Sandro Grech, Pasi Eronen:

Implications of Unlicensed Mobile Access (UMA) for GSM security. 3-12 - Roberto Di Pietro

, Stefano Chessa
, Piero Maestrini:
Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast. 13-22 - Dhananjay S. Phatak:

Spread-Identity mechanisms for DOS resilience and Security. 23-34 - Xiaoxin Wu, Cristina Nita-Rotaru:

On the Security of Distributed Position Services. 35-46 - Ziv Kfir, Avishai Wool

:
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard. 47-58 - Tassos Dimitriou:

A Lightweight RFID Protocol to protect against Traceability and Cloning attacks. 59-66 - Gerhard P. Hancke

, Markus G. Kuhn
:
An RFID Distance Bounding Protocol. 67-73 - Ari Juels, David Molnar, David A. Wagner:

Security and Privacy Issues in E-passports. 74-88 - Issa M. Khalil

, Saurabh Bagchi, Cristina Nita-Rotaru:
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks. 89-100 - Andrea Gabrielli, Luigi V. Mancini

, Sanjeev Setia, Sushil Jajodia:
Securing Topology Maintenance Protocols for Sensor Networks. 101-112 - Jing Deng, Richard Han

, Shivakant Mishra:
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. 113-126 - Hahnsang Kim, Kang G. Shin, Walid Dabbous:

Improving Cross-domain Authentication overWireless Local Area Networks. 127-138 - Tuomas Aura, Michael Roe:

Reducing Reauthentication Delay in Wireless Networks. 139-148 - Y. Dong, H. W. Go, Ai Fen Sui, Victor O. K. Li, Lucas Chi Kwong Hui, Siu-Ming Yiu:

Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks. 149-156 - Danfeng Yao

, Roberto Tamassia, Seth Proctor:
On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing. 157-170 - Marco Voss, Andreas Heinemann, Max Mühlhäuser

:
A Privacy Preserving Reputation System for Mobile Information Dissemination Networks. 171-181 - Vagner J. do Sacramento Rodrigues, Markus Endler, Fernando N. Nascimento:

A Privacy Service for Context-aware Mobile Computing. 182-193 - Baik Hoh, Marco Gruteser:

Protecting Location Privacy Through Path Confusion. 194-205 - A. Karygiannis, Aggelos Kiayias, Yiannis Tsiounis:

A Solution for Wireless Privacy and Payments based on E-cash. 206-218 - Thomas E. Daniels, Mani Mina, Steve Russell:

Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and Assurance. 219-221 - Rajeev Koodli, Vijay Devarapalli, Hannu Flinck, Charles E. Perkins:

Short Paper: Location Privacy with IP Mobility. 222-224 - Venkatesan Balakrishnan, Vijay Varadharajan:

Short Paper: Fellowship in Mobile Ad hoc Networks. 225-227 - Yen-Chieh Ouyang

, Chung-Hua Chu:
Short Paper: A Secure Interworking Scheme for UMTS-WLAN. 228-230 - Svetlana Radosavac, Karl Seamon, John S. Baras:

Short Paper: bufSTAT - a tool for early detection and classification of buffer overflow attacks. 231-233 - Indrakshi Ray, Lijun Yu:

Short Paper: Towards a Location-Aware Role-Based Access Control Model. 234-236 - Khaled Masmoudi, Mureed Hussain, Hossam Afifi, Dominique Seret:

Short paper: Tri-party TLS Adaptation for Trust Delegation in Home Networks. 237-239 - Wassim Itani, Ayman I. Kayssi, Ali Chehab

:
Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices. 240-242 - David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:

Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation. 243-248 - Jyh-How Huang, Jason Buckingham, Richard Han

:
A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network. 249-260 - Amir A. Sayegh, Mahmoud T. El-Hadidi:

A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems. 261-269 - H. Ragab Hassan, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal

:
An Efficient Key Management Algorithm for Hierarchical Group Communication. 270-276 - David Sánchez Sánchez, Heribert Baldus:

A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks. 277-288 - Jing Deng, Carl Hartung, Richard Han

, Shivakant Mishra:
A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks. 289-302 - Ioannis Pavlosoglou, Mark S. Leeson

, Roger J. Green:
Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks. 303-314 - Jukka Ylitalo, Patrik Salmela, Hannes Tschofenig:

SPINAT: Integrating IPsec into Overlay Routing. 315-326 - Baruch Awerbuch, Reza Curtmola, David Holmer, Herbert Rubens, Cristina Nita-Rotaru:

On the Survivability of Routing Protocols in Ad Hoc Wireless Networks. 327-338 - Yongguang Zhang, Yi-an Huang, Wenke Lee:

An Extensible Environment for Evaluating Secure MANET. 339-352 - Caimu Tang, Anthony T. Chronopoulos

, Cauligi S. Raghavendra:
Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices. 353-364 - Ophir Levy, Avishai Wool

:
Uniform Framework for Cryptanalysis of the Bluetooth E₀ Cipher. 365-373 - Daniele Quercia, Stephen Hailes:

MOTET: Mobile Transactions using Electronic Tickets. 374-383 - Urs Hengartner, Peter Steenkiste

:
Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. 384-396 - Li Zhou, Jinfeng Ni, Chinya V. Ravishankar

:
Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor Networks. 397-399 - Roberto Di Pietro

, Antonio Durante, Luigi V. Mancini
, Vishwas Patil:
Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy. 400-402 - Katrin Hoeper, Guang Gong:

Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks. 403-405 - Daniel Socek, Shujun Li, Spyros S. Magliveras, Borko Furht:

Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption. 406-407 - Sachin Garg, Navjot Singh, Timothy K. Tsai:

Short Paper: Schemes for Enhancing the Denial-of-Service Tolerance of SRTP. 409-411 - Timothy W. van der Horst, Kent E. Seamons

:
Short Paper: Thor - The Hybrid Online Repository. 412-414 - Stefan Schlott, Frank Kargl, Michael Weber:

Short paper: Random IDs for preserving location privacy. 415-417 - Yu Liu, Yang Li, Hong Man:

Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks. 418-420 - Nicholas Bambos:

Short Paper: Dynamic Risk Mitigation for 'Self-defending' Network Security. 421-424

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














