The SCEAS System
Navigation Menu

Conferences in DBLP

European Workshop on Security in Ad-hoc and Sensor Networks (esas)
2005 (conf/esas/2005)

  1. Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong
    Efficient Verifiable Ring Encryption for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:1-13 [Conf]
  2. Matija Puzar, Jon Andersson, Thomas Plagemann, Yves Roudier
    SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:14-26 [Conf]
  3. Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, Yongdae Kim
    Remote Software-Based Attestation for Wireless Sensors. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:27-41 [Conf]
  4. Levente Buttyán, Tamás Holczer, Péter Schaffer
    Spontaneous Cooperation in Multi-domain Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:42-53 [Conf]
  5. Gergely Ács, Levente Buttyán, István Vajda
    Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:113-127 [Conf]
  6. Levente Buttyán, László Dóra, István Vajda
    Statistical Wormhole Detection in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:128-141 [Conf]
  7. Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won
    RFID System with Fairness Within the Framework of Security and Privacy. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:142-152 [Conf]
  8. Sang Soo Yeo, Sung Kwon Kim
    Scalable and Flexible Privacy Protection Scheme for RFID Systems. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:153-163 [Conf]
  9. Jeonil Kang, DaeHun Nyang
    RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:164-175 [Conf]
  10. Ford-Long Wong, Frank Stajano
    Location Privacy in Bluetooth. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:176-188 [Conf]
  11. Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi
    An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:189-204 [Conf]
  12. Katsuyuki Okeya, Tetsu Iwata
    Side Channel Attacks on Message Authentication Codes. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:205-217 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002