The SCEAS System
Navigation Menu

Conferences in DBLP

European Workshop on Security in Ad-hoc and Sensor Networks (esas)
2007 (conf/esas/2007)

  1. Rene Mayrhofer
    The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:1-15 [Conf]
  2. Darko Kirovski, Michael Sinclair, David Wilson
    The Martini Synch: Joint Fuzzy Hashing Via Error Correction. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:16-30 [Conf]
  3. Jaap-Henk Hoepman
    Private Handshakes. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:31-42 [Conf]
  4. Jani Suomalainen, Jukka Valkonen, N. Asokan
    Security Associations in Personal Networks: A Comparative Analysis. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:43-57 [Conf]
  5. Gelareh Taban, Reihaneh Safavi-Naini
    Key Establishment in Heterogeneous Self-organized Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:58-72 [Conf]
  6. Leif Uhsadel, Axel Poschmann, Christof Paar
    Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:73-86 [Conf]
  7. Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald
    Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:87-100 [Conf]
  8. Dave Singelée, Bart Preneel
    Distance Bounding in Noisy Environments. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:101-115 [Conf]
  9. Matthew Roughan, Jon Arnold
    Multiple Target Localisation in Sensor Networks with Location Privacy. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:116-128 [Conf]
  10. Levente Buttyán, Tamás Holczer, István Vajda
    On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:129-141 [Conf]
  11. Stephen Farrell, Christian Damsgaard Jensen
    "End-by-Hop" Data Integrity. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:142-155 [Conf]
  12. Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert
    Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:156-171 [Conf]
  13. Ulrich Großmann, Enrik Berkhan, Luciana C. Jatoba, Jörg Ottenbacher, Wilhelm Stork, Klaus D. Müller-Glaser
    Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:172-186 [Conf]
  14. Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls
    ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:187-202 [Conf]
  15. Christoph Krauß, Frederic Stumpf, Claudia M. Eckert
    Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:203-217 [Conf]
  16. Ben Smyth, Mark Ryan, Liqun Chen
    Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:218-231 [Conf]
  17. Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross Anderson
    New Strategies for Revocation in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:232-246 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002