Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_3
Harald Vogt
{"title":"Exploring Message Authentication in Sensor Networks","authors":"Harald Vogt","doi":"10.1007/978-3-540-30496-8_3","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_3","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128272795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_18
E. Trichina, T. Korkishko
{"title":"Secure AES Hardware Module for Resource Constrained Devices","authors":"E. Trichina, T. Korkishko","doi":"10.1007/978-3-540-30496-8_18","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_18","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-08-06DOI: 10.1007/978-3-540-30496-8_8
Tony K. Chan, Karyin Fung, Joseph K. Liu, V. Wei
{"title":"Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups","authors":"Tony K. Chan, Karyin Fung, Joseph K. Liu, V. Wei","doi":"10.1007/978-3-540-30496-8_8","DOIUrl":"https://doi.org/10.1007/978-3-540-30496-8_8","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131440383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-540-73275-4
F. Stajano
{"title":"Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings","authors":"F. Stajano","doi":"10.1007/978-3-540-73275-4","DOIUrl":"https://doi.org/10.1007/978-3-540-73275-4","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128560232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers","authors":"R. Molva, G. Tsudik, D. Westhoff","doi":"10.1007/11601494","DOIUrl":"https://doi.org/10.1007/11601494","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116488144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers","authors":"L. Buttyán, V. Gligor, D. Westhoff","doi":"10.1007/11964254","DOIUrl":"https://doi.org/10.1007/11964254","url":null,"abstract":"","PeriodicalId":318428,"journal":{"name":"European Workshop on Security in Ad-hoc and Sensor Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127697347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}