The SCEAS System
Navigation Menu

Conferences in DBLP

European Workshop on Security in Ad-hoc and Sensor Networks (esas)
2004 (conf/esas/2004)

  1. Jean-Pierre Hubaux
    New Research Challenges for the Security of Ad Hoc and Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:1- [Conf]
  2. Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
    Public Key Cryptography in Sensor Networks - Revisited. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:2-18 [Conf]
  3. Harald Vogt
    Exploring Message Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:19-30 [Conf]
  4. Miroslaw Kutylowski, Wojciech Rutkowski
    Secure Initialization in Single-Hop Radio Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:31-41 [Conf]
  5. Kenneth P. Fishkin, Sumit Roy, Bing Jiang
    Some Methods for Privacy in RFID Communication. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:42-53 [Conf]
  6. Javier Herranz, Germán Sáez
    Ring Signature Schemes for General Ad-Hoc Access Structures. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:54-65 [Conf]
  7. Joao Girão, Bernd Lamparter, Dirk Westhoff, Rui L. Aguiar, Joao P. Barraca
    Linking Ad Hoc Charging Schemes to AAAC Architectures. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:66-81 [Conf]
  8. Tony K. Chan, Karyin Fung, Joseph K. Liu, Victor K. Wei
    Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:82-94 [Conf]
  9. Seamus Moloney, Philip Ginzboorg
    Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:95-106 [Conf]
  10. Mark Manulis, Jörg Schwenk
    Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:107-124 [Conf]
  11. Hans-Joachim Hof, Erik-Oliver Blaß, Martina Zitterbart
    Secure Overlay for Service Centric Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:125-138 [Conf]
  12. Kaisa Nyberg
    IKE in Ad Hoc IP Networking. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:139-151 [Conf]
  13. Frank Kargl, Andreas Klenk, Stefan Schlott, Michael Weber
    Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:152-165 [Conf]
  14. Stefan Schmidt, Holger Krahn, Stefan Fischer, Dietmar Wätjen
    A Security Architecture for Mobile Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:166-177 [Conf]
  15. Prakash Reddy, Eamonn O'Brien-Strain, Jim Rowson
    Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-on. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:178-189 [Conf]
  16. Yann-Hang Lee, Vikram Phadke, Amit Deshmukh, Jin Wook Lee
    Key Management in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:190-204 [Conf]
  17. Xiaoyun Wang, Lizhen Yang, Kefei Chen
    SDD: Secure Distributed Diffusion Protocol for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:205-214 [Conf]
  18. Elena Trichina, Tymur Korkishko
    Secure AES Hardware Module for Resource Constrained Devices. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:215-230 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002