{"title":"Scalable and Flexible Privacy Protection Scheme for RFID Systems","authors":"Sang-Soo Yeo, Sung Kwon Kim","doi":"10.1007/11601494_13","DOIUrl":"https://doi.org/10.1007/11601494_13","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130672613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Side Channel Attacks on Message Authentication Codes","authors":"K. Okeya, Tetsu Iwata","doi":"10.1007/11601494_17","DOIUrl":"https://doi.org/10.1007/11601494_17","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114243246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical Wormhole Detection in Sensor Networks","authors":"L. Buttyán, László Dóra, I. Vajda","doi":"10.1007/11601494_11","DOIUrl":"https://doi.org/10.1007/11601494_11","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121472220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks","authors":"G. Ács, L. Buttyán, I. Vajda","doi":"10.1007/11601494_10","DOIUrl":"https://doi.org/10.1007/11601494_10","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131760956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_1
J. Hubaux
{"title":"New Research Challenges for the Security of Ad Hoc and Sensor Networks","authors":"J. Hubaux","doi":"10.1007/978-3-540-30496-8_1","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_1","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124999837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_4
Mirosław Kutyłowski, Wojciech Rutkowski
{"title":"Secure Initialization in Single-Hop Radio Networks","authors":"Mirosław Kutyłowski, Wojciech Rutkowski","doi":"10.1007/978-3-540-30496-8_4","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_4","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125067718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_16
Yann-Hang Lee, V. Phadke, Amit Deshmukh, J. Lee
{"title":"Key Management in Wireless Sensor Networks","authors":"Yann-Hang Lee, V. Phadke, Amit Deshmukh, J. Lee","doi":"10.1007/978-3-540-30496-8_16","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_16","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123792403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_7
J. Girão, B. Lamparter, D. Westhoff, R. Aguiar, J. Barraca
{"title":"Linking Ad Hoc Charging Schemes to AAAC Architectures","authors":"J. Girão, B. Lamparter, D. Westhoff, R. Aguiar, J. Barraca","doi":"10.1007/978-3-540-30496-8_7","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_7","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128618598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}