{"title":"Security and Cooperation in Wireless Networks","authors":"J. Hubaux","doi":"10.1007/11964254_1","DOIUrl":"https://doi.org/10.1007/11964254_1","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123478915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_12
Saikat Chakrabarti, Santosh Chandrasekhar, M. Singhal, K. Calvert
{"title":"Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences","authors":"Saikat Chakrabarti, Santosh Chandrasekhar, M. Singhal, K. Calvert","doi":"10.1007/978-3-540-73275-4_12","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_12","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117226065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_10
L. Buttyán, T. Holczer, I. Vajda
{"title":"On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs","authors":"L. Buttyán, T. Holczer, I. Vajda","doi":"10.1007/978-3-540-73275-4_10","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_10","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123455609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_17
T. Moore, Jolyon Clulow, Shishir Nagaraja, Ross J. Anderson
{"title":"New Strategies for Revocation in Ad-Hoc Networks","authors":"T. Moore, Jolyon Clulow, Shishir Nagaraja, Ross J. Anderson","doi":"10.1007/978-3-540-73275-4_17","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_17","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123959443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_1
R. Mayrhofer
{"title":"The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams","authors":"R. Mayrhofer","doi":"10.1007/978-3-540-73275-4_1","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_1","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121559008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_6
Leif Uhsadel, A. Poschmann, C. Paar
{"title":"Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes","authors":"Leif Uhsadel, A. Poschmann, C. Paar","doi":"10.1007/978-3-540-73275-4_6","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_6","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_11
S. Farrell, C. Jensen
{"title":"\"End-by-Hop\" Data Integrity","authors":"S. Farrell, C. Jensen","doi":"10.1007/978-3-540-73275-4_11","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_11","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124329016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_7
J. V. D. Merwe, D. Dawoud, Stephen McDonald
{"title":"Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying","authors":"J. V. D. Merwe, D. Dawoud, Stephen McDonald","doi":"10.1007/978-3-540-73275-4_7","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_7","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121165322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_3
J. Hoepman
{"title":"Private Handshakes","authors":"J. Hoepman","doi":"10.1007/978-3-540-73275-4_3","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_3","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115866904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_14
N. Bird, Claudine Conrado, J. Guajardo, S. Maubach, G. Schrijen, B. Škorić, Anton M. H. Tombeur, Peter Thueringer, P. Tuyls
{"title":"ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems","authors":"N. Bird, Claudine Conrado, J. Guajardo, S. Maubach, G. Schrijen, B. Škorić, Anton M. H. Tombeur, Peter Thueringer, P. Tuyls","doi":"10.1007/978-3-540-73275-4_14","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_14","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126551402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}