|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 81 occurrences of 62 keywords
|
|
|
Results
Found 67 publication records. Showing 67 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Leif Uhsadel, Axel Poschmann, Christof Paar |
Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
8-bit micro controller, secp160r1, wireless sensor network, elliptic curve cryptography, Micaz |
1 | Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert |
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
generalized El Gamal signatures, LFSR-based PKCs, DSR, secure routing, multisignatures, small-world graphs, PGP |
1 | Ben Smyth, Mark Ryan 0001, Liqun Chen 0002 |
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
privacy, anonymity, cryptographic protocol, trusted computing |
1 | Christoph Krauß, Frederic Stumpf, Claudia Eckert 0001 |
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
Security, Sensor Network, Trusted Computing, Attestation |
1 | Frank Stajano, Catherine Meadows 0001, Srdjan Capkun, Tyler Moore 0001 (eds.) |
Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Roughan, Jon Arnold |
Multiple Target Localisation in Sensor Networks with Location Privacy. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
ad-hoc networks, localization, privacy-preservation |
1 | Jaap-Henk Hoepman |
Private Handshakes. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
pervasive security, authentication, group membership, secret handshakes |
1 | Tyler Moore 0001, Jolyon Clulow, Shishir Nagaraja, Ross J. Anderson |
New Strategies for Revocation in Ad-Hoc Networks. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
credential revocation, sensor networks, key management |
1 | Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald |
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
network level key distribution, Mobile ad hoc networks, key management, data dissemination, trust establishment, wireless network security |
1 | Jani Suomalainen, Jukka Valkonen, N. Asokan |
Security Associations in Personal Networks: A Comparative Analysis. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
survey, security association, Personal networks |
1 | Rene Mayrhofer |
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
context authentication, cryptographic hash, sensor data |
1 | Stephen Farrell, Christian Damsgaard Jensen |
"End-by-Hop" Data Integrity. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
data-integrity service, data-fusion security, end-by-hop security |
1 | Dave Singelée, Bart Preneel |
Distance Bounding in Noisy Environments. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
wireless sensor networks, distance bounding, secure localization, entity authentication |
1 | Ulrich Großmann, Enrik Berkhan, Luciana C. Jatoba, Jörg Ottenbacher, Wilhelm Stork, Klaus D. Müller-Glaser |
Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
Teletherapy of pain, remote controlled infusion pump, platform integrity of resource constrained device |
1 | Darko Kirovski, Mike Sinclair, David Wilson |
The Martini Synch: Joint Fuzzy Hashing Via Error Correction. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
secret generation, fuzzy hashing, error correction, key exchange, device pairing |
1 | Gelareh Taban, Reihaneh Safavi-Naini |
Key Establishment in Heterogeneous Self-organized Networks. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
key pre-distribution, group key, self-organized networks |
1 | Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls |
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
cheap solutions, physics and crypto, privacy, RFID, sensors |
1 | Levente Buttyán, Tamás Holczer, István Vajda |
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
location privacy, vehicular ad hoc network, pseudonym |
1 | Bartlomiej Sieka |
Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Sepideh Fouladgar, Bastien Mainaud, Khaled Masmoudi, Hossam Afifi |
Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Joao Girão, Miquel Martin |
Two's Company, Three Is a Crowd: A Group-Admission Protocol for WSNs. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jukka Valkonen, N. Asokan, Kaisa Nyberg |
Ad Hoc Security Associations for Groups. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
ad hoc group, passkey, numeric comparison, key agreement, security association |
1 | Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner |
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Subhas Kumar Ghosh |
On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jolyon Clulow, Gerhard P. Hancke 0002, Markus G. Kuhn, Tyler Moore 0001 |
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Galice, Marine Minier, John Mullins, Stéphane Ubéda |
Cryptographic Protocol to Establish Trusted History of Interactions. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
trust management framework, cryptographic protocol, Identity based encryption |
1 | Frederik Armknecht, Joao Girão, Marc Ph. Stoecklin, Dirk Westhoff |
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Julien Bringer, Hervé Chabanne |
On the Wiretap Channel Induced by Noisy Tags. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
wiretap channel, noisy tags, RFID, LDPC codes |
1 | Elmar Schoch, Frank Kargl, Tim Leinmüller, Stefan Schlott, Panos Papadimitratos |
Impact of Pseudonym Changes on Geographic Routing in VANETs. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Gina Kounga, Thomas Walter 0001 |
Identification in Infrastructureless Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Pierre Hubaux |
Security and Cooperation in Wireless Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Levente Buttyán, Virgil D. Gligor, Dirk Westhoff (eds.) |
Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Pim Tuyls |
Grey-Box Cryptography: Physical Unclonable Functions. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede |
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, authentication, pervasive computing, Elliptic Curve Cryptography, key-distribution, hardware implementation |
1 | Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens |
Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
MANET Routing, Byzantine Attacks, Security |
1 | Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won |
RFID System with Fairness Within the Framework of Security and Privacy. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
uncheckable, security, privacy, RFID, Fairness, traceability |
1 | Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff (eds.) |
Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jeonil Kang, DaeHun Nyang |
RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Refik Molva, Gene Tsudik, Dirk Westhoff (eds.) |
Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi |
An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
joint sparse form, left-to-right, multi-scalar multiplication, shamir method, elliptic curve cryptosystem |
1 | Levente Buttyán, László Dóra, István Vajda |
Statistical Wormhole Detection in Sensor Networks. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Matija Puzar, Jon Andersson, Thomas Plagemann, Yves Roudier |
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Levente Buttyán, Tamás Holczer, Péter Schaffer |
Spontaneous Cooperation in Multi-domain Sensor Networks. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong |
Efficient Verifiable Ring Encryption for Ad Hoc Groups. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ford-Long Wong, Frank Stajano |
Location Privacy in Bluetooth. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sang-Soo Yeo, Sung Kwon Kim |
Scalable and Flexible Privacy Protection Scheme for RFID Systems. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Katsuyuki Okeya, Tetsu Iwata |
Side Channel Attacks on Message Authentication Codes. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
Selective Forgery, MACs, Side Channel Attacks, DPA, SPA |
1 | Gergely Ács, Levente Buttyán, István Vajda |
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, Yongdae Kim |
Remote Software-Based Attestation for Wireless Sensors. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar |
Public Key Cryptography in Sensor Networks - Revisited. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Schmidt, Holger Krahn, Stefan Fischer 0001, Dietmar Wätjen |
A Security Architecture for Mobile Wireless Sensor Networks. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Javier Herranz, Germán Sáez |
Ring Signature Schemes for General Ad-Hoc Access Structures. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Kaisa Nyberg |
IKE in Ad Hoc IP Networking. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
ad hoc access, ad hoc authentication, ad hoc networking, key management, message authentication code, peer-to-peer communication, security association, IKEv2 |
1 | Seamus Moloney, Philip Ginzboorg |
Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Pierre Hubaux |
New Research Challenges for the Security of Ad Hoc and Sensor Networks. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Miroslaw Kutylowski, Wojciech Rutkowski |
Secure Initialization in Single-Hop Radio Networks. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Harald Vogt |
Exploring Message Authentication in Sensor Networks. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Elena Trichina, Tymur Korkishko |
Secure AES Hardware Module for Resource Constrained Devices. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Mark Manulis, Jörg Schwenk |
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Tony K. Chan, Karyin Fung, Joseph K. Liu, Victor K. Wei |
Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Frank Kargl, Andreas Klenk, Stefan Schlott, Michael Weber 0001 |
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Joao Girão, Bernd Lamparter, Dirk Westhoff, Rui L. Aguiar, João Paulo Barraca |
Linking Ad Hoc Charging Schemes to AAAC Architectures. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth P. Fishkin, Sumit Roy 0001, Bing Jiang |
Some Methods for Privacy in RFID Communication. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyun Wang, Lizhen Yang, Kefei Chen |
SDD: Secure Distributed Diffusion Protocol for Sensor Networks. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Hans-Joachim Hof, Erik-Oliver Blaß, Martina Zitterbart |
Secure Overlay for Service Centric Wireless Sensor Networks. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yann-Hang Lee, Vikram Phadke, Amit Deshmukh, Jin Wook Lee |
Key Management in Wireless Sensor Networks. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Prakash Reddy, Eamonn O'Brien-Strain, Jim Rowson |
Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-on. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
device ensemble, Security, Single sign on, Personal Area Network |
Displaying result #1 - #67 of 67 (100 per page; Change: )
|
|