{"title":"On the Wiretap Channel Induced by Noisy Tags","authors":"J. Bringer, H. Chabanne","doi":"10.1007/11964254_11","DOIUrl":"https://doi.org/10.1007/11964254_11","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123561862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Fouladgar, Bastien Mainaud, K. Masmoudi, H. Afifi
{"title":"Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks","authors":"S. Fouladgar, Bastien Mainaud, K. Masmoudi, H. Afifi","doi":"10.1007/11964254_5","DOIUrl":"https://doi.org/10.1007/11964254_5","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131645353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Awerbuch, R. Cole, Reza Curtmola, D. Holmer, H. Rubens
{"title":"Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol","authors":"B. Awerbuch, R. Cole, Reza Curtmola, D. Holmer, H. Rubens","doi":"10.1007/11964254_10","DOIUrl":"https://doi.org/10.1007/11964254_10","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134415791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ad Hoc Security Associations for Groups","authors":"Jukka Valkonen, N. Asokan, K. Nyberg","doi":"10.1007/11964254_14","DOIUrl":"https://doi.org/10.1007/11964254_14","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"65 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120934213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Schoch, F. Kargl, T. Leinmüller, S. Schlott, Panos Papadimitratos
{"title":"Impact of Pseudonym Changes on Geographic Routing in VANETs","authors":"E. Schoch, F. Kargl, T. Leinmüller, S. Schlott, Panos Papadimitratos","doi":"10.1007/11964254_6","DOIUrl":"https://doi.org/10.1007/11964254_6","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114317776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Frederik Armknecht, J. Girão, M. Stoecklin, D. Westhoff
{"title":"Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks","authors":"Frederik Armknecht, J. Girão, M. Stoecklin, D. Westhoff","doi":"10.1007/11964254_4","DOIUrl":"https://doi.org/10.1007/11964254_4","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123243423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic Protocol to Establish Trusted History of Interactions","authors":"S. Galice, M. Minier, John Mullins, S. Ubéda","doi":"10.1007/11964254_13","DOIUrl":"https://doi.org/10.1007/11964254_13","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"20 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131624091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Benenson, F. Freiling, B. Pfitzmann, C. Rohner, M. Waidner
{"title":"Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks","authors":"Z. Benenson, F. Freiling, B. Pfitzmann, C. Rohner, M. Waidner","doi":"10.1007/11964254_15","DOIUrl":"https://doi.org/10.1007/11964254_15","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"24 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Batina, N. Mentens, K. Sakiyama, B. Preneel, I. Verbauwhede
{"title":"Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks","authors":"L. Batina, N. Mentens, K. Sakiyama, B. Preneel, I. Verbauwhede","doi":"10.1007/11964254_3","DOIUrl":"https://doi.org/10.1007/11964254_3","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121576222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}