Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_9
M. Roughan, J. Arnold
{"title":"Multiple Target Localisation in Sensor Networks with Location Privacy","authors":"M. Roughan, J. Arnold","doi":"10.1007/978-3-540-73275-4_9","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_9","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125112258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_4
Jani Suomalainen, Jukka Valkonen, N. Asokan
{"title":"Security Associations in Personal Networks: A Comparative Analysis","authors":"Jani Suomalainen, Jukka Valkonen, N. Asokan","doi":"10.1007/978-3-540-73275-4_4","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_4","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_5
Gelareh Taban, R. Safavi-Naini
{"title":"Key Establishment in Heterogeneous Self-organized Networks","authors":"Gelareh Taban, R. Safavi-Naini","doi":"10.1007/978-3-540-73275-4_5","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_5","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"414 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116136998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_15
C. Krauß, F. Stumpf, C. Eckert
{"title":"Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques","authors":"C. Krauß, F. Stumpf, C. Eckert","doi":"10.1007/978-3-540-73275-4_15","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_15","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133200223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_8
Dave Singelée, B. Preneel
{"title":"Distance Bounding in Noisy Environments","authors":"Dave Singelée, B. Preneel","doi":"10.1007/978-3-540-73275-4_8","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_8","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129125427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_13
U. Großmann, Enrik Berkhan, L. Jatoba, J. Ottenbacher, W. Stork, K. Müller-Glaser
{"title":"Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules","authors":"U. Großmann, Enrik Berkhan, L. Jatoba, J. Ottenbacher, W. Stork, K. Müller-Glaser","doi":"10.1007/978-3-540-73275-4_13","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_13","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130963007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_16
B. Smyth, M. Ryan, Liqun Chen
{"title":"Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators","authors":"B. Smyth, M. Ryan, Liqun Chen","doi":"10.1007/978-3-540-73275-4_16","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_16","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121634867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-07-02DOI: 10.1007/978-3-540-73275-4_2
D. Kirovski, M. Sinclair, David Wilson
{"title":"The Martini Synch: Joint Fuzzy Hashing Via Error Correction","authors":"D. Kirovski, M. Sinclair, David Wilson","doi":"10.1007/978-3-540-73275-4_2","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4_2","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks","authors":"B. Sieka","doi":"10.1007/11964254_16","DOIUrl":"https://doi.org/10.1007/11964254_16","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121558386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks","authors":"Jolyon Clulow, G. Hancke, M. Kuhn, T. Moore","doi":"10.1007/11964254_9","DOIUrl":"https://doi.org/10.1007/11964254_9","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131923359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}