Conferences in DBLP
Jean-Pierre Hubaux Security and Cooperation in Wireless Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:1-2 [Conf ] Pim Tuyls Grey-Box Cryptography: Physical Unclonable Functions. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:3-5 [Conf ] Lejla Batina , Nele Mentens , Kazuo Sakiyama , Bart Preneel , Ingrid Verbauwhede Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:6-17 [Conf ] Frederik Armknecht , Joao Girão , Marc Stoecklin , Dirk Westhoff Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:18-31 [Conf ] Sepideh Fouladgar , Bastien Mainaud , Khaled Masmoudi , Hossam Afifi Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:32-42 [Conf ] Elmar Schoch , Frank Kargl , Tim Leinmüller , Stefan Schlott , Panos Papadimitratos Impact of Pseudonym Changes on Geographic Routing in VANETs. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:43-57 [Conf ] Gina Kounga , Thomas Walter Identification in Infrastructureless Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:58-69 [Conf ] Joao Girão , Miquel Martin Two's Company, Three Is a Crowd: A Group-Admission Protocol for WSNs. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:70-82 [Conf ] Jolyon Clulow , Gerhard P. Hancke , Markus G. Kuhn , Tyler Moore So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:83-97 [Conf ] Baruch Awerbuch , Robert G. Cole , Reza Curtmola , David Holmer , Herbert Rubens Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:98-112 [Conf ] Julien Bringer , Hervé Chabanne On the Wiretap Channel Induced by Noisy Tags. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:113-120 [Conf ] Subhas Kumar Ghosh On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:121-135 [Conf ] Samuel Galice , Marine Minier , John Mullins , Stéphane Ubéda Cryptographic Protocol to Establish Trusted History of Interactions. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:136-149 [Conf ] Jukka Valkonen , N. Asokan , Kaisa Nyberg Ad Hoc Security Associations for Groups. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:150-164 [Conf ] Zinaida Benenson , Felix C. Freiling , Birgit Pfitzmann , Christian Rohner , Michael Waidner Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:165-178 [Conf ] Bartlomiej Sieka Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:179-192 [Conf ]