The SCEAS System
Navigation Menu

Conferences in DBLP

European Workshop on Security in Ad-hoc and Sensor Networks (esas)
2006 (conf/esas/2006)

  1. Jean-Pierre Hubaux
    Security and Cooperation in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:1-2 [Conf]
  2. Pim Tuyls
    Grey-Box Cryptography: Physical Unclonable Functions. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:3-5 [Conf]
  3. Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede
    Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:6-17 [Conf]
  4. Frederik Armknecht, Joao Girão, Marc Stoecklin, Dirk Westhoff
    Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:18-31 [Conf]
  5. Sepideh Fouladgar, Bastien Mainaud, Khaled Masmoudi, Hossam Afifi
    Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:32-42 [Conf]
  6. Elmar Schoch, Frank Kargl, Tim Leinmüller, Stefan Schlott, Panos Papadimitratos
    Impact of Pseudonym Changes on Geographic Routing in VANETs. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:43-57 [Conf]
  7. Gina Kounga, Thomas Walter
    Identification in Infrastructureless Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:58-69 [Conf]
  8. Joao Girão, Miquel Martin
    Two's Company, Three Is a Crowd: A Group-Admission Protocol for WSNs. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:70-82 [Conf]
  9. Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore
    So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:83-97 [Conf]
  10. Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens
    Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:98-112 [Conf]
  11. Julien Bringer, Hervé Chabanne
    On the Wiretap Channel Induced by Noisy Tags. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:113-120 [Conf]
  12. Subhas Kumar Ghosh
    On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:121-135 [Conf]
  13. Samuel Galice, Marine Minier, John Mullins, Stéphane Ubéda
    Cryptographic Protocol to Establish Trusted History of Interactions. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:136-149 [Conf]
  14. Jukka Valkonen, N. Asokan, Kaisa Nyberg
    Ad Hoc Security Associations for Groups. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:150-164 [Conf]
  15. Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner
    Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:165-178 [Conf]
  16. Bartlomiej Sieka
    Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:179-192 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002