|
Conferences in DBLP
- Jean-Pierre Hubaux
New Research Challenges for the Security of Ad Hoc and Sensor Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:1- [Conf]
- Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
Public Key Cryptography in Sensor Networks - Revisited. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:2-18 [Conf]
- Harald Vogt
Exploring Message Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:19-30 [Conf]
- Miroslaw Kutylowski, Wojciech Rutkowski
Secure Initialization in Single-Hop Radio Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:31-41 [Conf]
- Kenneth P. Fishkin, Sumit Roy, Bing Jiang
Some Methods for Privacy in RFID Communication. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:42-53 [Conf]
- Javier Herranz, Germán Sáez
Ring Signature Schemes for General Ad-Hoc Access Structures. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:54-65 [Conf]
- Joao Girão, Bernd Lamparter, Dirk Westhoff, Rui L. Aguiar, Joao P. Barraca
Linking Ad Hoc Charging Schemes to AAAC Architectures. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:66-81 [Conf]
- Tony K. Chan, Karyin Fung, Joseph K. Liu, Victor K. Wei
Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:82-94 [Conf]
- Seamus Moloney, Philip Ginzboorg
Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:95-106 [Conf]
- Mark Manulis, Jörg Schwenk
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:107-124 [Conf]
- Hans-Joachim Hof, Erik-Oliver Blaß, Martina Zitterbart
Secure Overlay for Service Centric Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:125-138 [Conf]
- Kaisa Nyberg
IKE in Ad Hoc IP Networking. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:139-151 [Conf]
- Frank Kargl, Andreas Klenk, Stefan Schlott, Michael Weber
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:152-165 [Conf]
- Stefan Schmidt, Holger Krahn, Stefan Fischer, Dietmar Wätjen
A Security Architecture for Mobile Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:166-177 [Conf]
- Prakash Reddy, Eamonn O'Brien-Strain, Jim Rowson
Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-on. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:178-189 [Conf]
- Yann-Hang Lee, Vikram Phadke, Amit Deshmukh, Jin Wook Lee
Key Management in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:190-204 [Conf]
- Xiaoyun Wang, Lizhen Yang, Kefei Chen
SDD: Secure Distributed Diffusion Protocol for Sensor Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:205-214 [Conf]
- Elena Trichina, Tymur Korkishko
Secure AES Hardware Module for Resource Constrained Devices. [Citation Graph (0, 0)][DBLP] ESAS, 2004, pp:215-230 [Conf]
|