The SCEAS System
Navigation Menu

Conferences in DBLP

Workshop on Security of ad hoc and Sensor Networks (sasn)
2004 (conf/sasn/2004)

  1. Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi
    An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:1-9 [Conf]
  2. Daniele Raffo, Cedric Adjih, Thomas Clausen, Paul Mühlethaler
    An advanced signature system for OLSR. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:10-16 [Conf]
  3. Alvaro A. Cárdenas, Svetlana Radosavac, John S. Baras
    Detection and prevention of MAC layer misbehavior in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:17-22 [Conf]
  4. Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas
    Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:23-28 [Conf]
  5. Dijiang Huang, Manish Mehta, Deep Medhi, Lein Harn
    Location-aware key management scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:29-42 [Conf]
  6. Joengmin Hwang, Yongdae Kim
    Revisiting random key pre-distribution schemes for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:43-52 [Conf]
  7. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan
    Connectivity properties of secure wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:53-58 [Conf]
  8. Ronald J. Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus
    TinyPK: securing sensor networks with public key technology. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:59-64 [Conf]
  9. John A. Stankovic
    Security in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:65- [Conf]
  10. Saurabh Ganeriwal, Mani B. Srivastava
    Reputation-based framework for high integrity sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:66-77 [Conf]
  11. David Wagner
    Resilient aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:78-87 [Conf]
  12. Celal Ozturk, Yanyong Zhang, Wade Trappe
    Source-location privacy in energy-constrained sensor network routing. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:88-93 [Conf]
  13. Levente Buttyán, István Vajda
    Towards provable security for ad hoc routing protocols. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:94-105 [Conf]
  14. Yih-Chun Hu, David B. Johnson
    Securing quality-of-service route discovery in on-demand routing for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:106-117 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002