Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_13
F. Kargl, A. Klenk, S. Schlott, M. Weber
{"title":"Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks","authors":"F. Kargl, A. Klenk, S. Schlott, M. Weber","doi":"10.1007/978-3-540-30496-8_13","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_13","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130898199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_6
Javier Herranz, Germán Sáez
{"title":"Ring Signature Schemes for General Ad-Hoc Access Structures","authors":"Javier Herranz, Germán Sáez","doi":"10.1007/978-3-540-30496-8_6","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_6","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131228185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_12
K. Nyberg
{"title":"IKE in Ad Hoc IP Networking","authors":"K. Nyberg","doi":"10.1007/978-3-540-30496-8_12","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_12","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131259014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_15
Prakash Reddy, Eamonn O'Brien-Strain, Jim Rowson
{"title":"Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-on","authors":"Prakash Reddy, Eamonn O'Brien-Strain, Jim Rowson","doi":"10.1007/978-3-540-30496-8_15","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_15","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128392904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_9
Seamus Moloney, Philip Ginzboorg
{"title":"Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems","authors":"Seamus Moloney, Philip Ginzboorg","doi":"10.1007/978-3-540-30496-8_9","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_9","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125244213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_11
H. Hof, Erik-Oliver Blass, M. Zitterbart
{"title":"Secure Overlay for Service Centric Wireless Sensor Networks","authors":"H. Hof, Erik-Oliver Blass, M. Zitterbart","doi":"10.1007/978-3-540-30496-8_11","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_11","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127255814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_5
K. Fishkin, Sumit Roy, B. Jiang
{"title":"Some Methods for Privacy in RFID Communication","authors":"K. Fishkin, Sumit Roy, B. Jiang","doi":"10.1007/978-3-540-30496-8_5","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_5","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"12 35","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113980075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_14
S. Schmidt, Holger Krahn, Stefan Fischer, D. Wätjen
{"title":"A Security Architecture for Mobile Wireless Sensor Networks","authors":"S. Schmidt, Holger Krahn, Stefan Fischer, D. Wätjen","doi":"10.1007/978-3-540-30496-8_14","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_14","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128946795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_10
M. Manulis, Jörg Schwenk
{"title":"Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH","authors":"M. Manulis, Jörg Schwenk","doi":"10.1007/978-3-540-30496-8_10","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_10","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130930724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_2
G. Gaubatz, J. Kaps, B. Sunar
{"title":"Public Key Cryptography in Sensor Networks - Revisited","authors":"G. Gaubatz, J. Kaps, B. Sunar","doi":"10.1007/978-3-540-30496-8_2","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_2","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124736032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}