The SCEAS System
Navigation Menu

Conferences in DBLP

Workshop on Security of ad hoc and Sensor Networks (sasn)
2005 (conf/sasn/2005)

  1. Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas
    A quantitative trust establishment framework for reliable data packet delivery in MANETs. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:1-10 [Conf]
  2. Maxim Raya, Jean-Pierre Hubaux
    The security of vehicular ad hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:11-21 [Conf]
  3. Shouhuai Xu
    On the security of group communication schemes based on symmetric key cryptosystems. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:22-31 [Conf]
  4. Radha Poovendran
    Information assurance in manets and wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:32- [Conf]
  5. Ronggong Song, Larry Korba, George Yee
    AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:33-42 [Conf]
  6. Weichao Wang, Bharat K. Bhargava
    Key distribution and update for secure inter-group multicast communication. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:43-52 [Conf]
  7. Giovanni Di Crescenzo, Renwei Ge, Gonzalo R. Arce
    Improved topology assumptions for threshold cryptography in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:53-62 [Conf]
  8. Sindhu Karthikeyan, Mikhail Nesterenko
    RFID security without extensive cryptography. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:63-67 [Conf]
  9. Virgil D. Gligor
    Advances in sensor and ad-hoc network security: perspective and status. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:68- [Conf]
  10. Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi Yoneda
    A key pre-distribution scheme for secure sensor networks using probability density function of node deployment. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:69-75 [Conf]
  11. Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga
    Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:76-88 [Conf]
  12. Jing Deng, Richard Han, Shivakant Mishra
    Defending against path-based DoS attacks in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:89-96 [Conf]
  13. Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla
    Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:97-106 [Conf]
  14. Michael Manzo, Tanya Roosta, Shankar Sastry
    Time synchronization attacks in sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:107-116 [Conf]
  15. Yinian Mao, Min Wu
    Coordinated sensor deployment for improving secure communications and sensing coverage. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:117-128 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002