The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ESAS"( http://dblp.L3S.de/Venues/ESAS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/esas

Publication years (Num. hits)
2004 (18) 2005 (14) 2006 (17) 2007 (18)
Publication types (Num. hits)
inproceedings(63) proceedings(4)
Venues (Conferences, Journals, ...)
ESAS(67)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 81 occurrences of 62 keywords

Results
Found 67 publication records. Showing 67 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Leif Uhsadel, Axel Poschmann, Christof Paar Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 8-bit micro controller, secp160r1, wireless sensor network, elliptic curve cryptography, Micaz
1Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF generalized El Gamal signatures, LFSR-based PKCs, DSR, secure routing, multisignatures, small-world graphs, PGP
1Ben Smyth, Mark Ryan 0001, Liqun Chen 0002 Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, anonymity, cryptographic protocol, trusted computing
1Christoph Krauß, Frederic Stumpf, Claudia Eckert 0001 Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Sensor Network, Trusted Computing, Attestation
1Frank Stajano, Catherine Meadows 0001, Srdjan Capkun, Tyler Moore 0001 (eds.) Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Matthew Roughan, Jon Arnold Multiple Target Localisation in Sensor Networks with Location Privacy. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ad-hoc networks, localization, privacy-preservation
1Jaap-Henk Hoepman Private Handshakes. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pervasive security, authentication, group membership, secret handshakes
1Tyler Moore 0001, Jolyon Clulow, Shishir Nagaraja, Ross J. Anderson New Strategies for Revocation in Ad-Hoc Networks. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF credential revocation, sensor networks, key management
1Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network level key distribution, Mobile ad hoc networks, key management, data dissemination, trust establishment, wireless network security
1Jani Suomalainen, Jukka Valkonen, N. Asokan Security Associations in Personal Networks: A Comparative Analysis. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF survey, security association, Personal networks
1Rene Mayrhofer The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF context authentication, cryptographic hash, sensor data
1Stephen Farrell, Christian Damsgaard Jensen "End-by-Hop" Data Integrity. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data-integrity service, data-fusion security, end-by-hop security
1Dave Singelée, Bart Preneel Distance Bounding in Noisy Environments. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF wireless sensor networks, distance bounding, secure localization, entity authentication
1Ulrich Großmann, Enrik Berkhan, Luciana C. Jatoba, Jörg Ottenbacher, Wilhelm Stork, Klaus D. Müller-Glaser Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Teletherapy of pain, remote controlled infusion pump, platform integrity of resource constrained device
1Darko Kirovski, Mike Sinclair, David Wilson The Martini Synch: Joint Fuzzy Hashing Via Error Correction. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secret generation, fuzzy hashing, error correction, key exchange, device pairing
1Gelareh Taban, Reihaneh Safavi-Naini Key Establishment in Heterogeneous Self-organized Networks. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key pre-distribution, group key, self-organized networks
1Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cheap solutions, physics and crypto, privacy, RFID, sensors
1Levente Buttyán, Tamás Holczer, István Vajda On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF location privacy, vehicular ad hoc network, pseudonym
1Bartlomiej Sieka Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sepideh Fouladgar, Bastien Mainaud, Khaled Masmoudi, Hossam Afifi Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Joao Girão, Miquel Martin Two's Company, Three Is a Crowd: A Group-Admission Protocol for WSNs. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jukka Valkonen, N. Asokan, Kaisa Nyberg Ad Hoc Security Associations for Groups. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ad hoc group, passkey, numeric comparison, key agreement, security association
1Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Subhas Kumar Ghosh On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jolyon Clulow, Gerhard P. Hancke 0002, Markus G. Kuhn, Tyler Moore 0001 So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Samuel Galice, Marine Minier, John Mullins, Stéphane Ubéda Cryptographic Protocol to Establish Trusted History of Interactions. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trust management framework, cryptographic protocol, Identity based encryption
1Frederik Armknecht, Joao Girão, Marc Ph. Stoecklin, Dirk Westhoff Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Julien Bringer, Hervé Chabanne On the Wiretap Channel Induced by Noisy Tags. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wiretap channel, noisy tags, RFID, LDPC codes
1Elmar Schoch, Frank Kargl, Tim Leinmüller, Stefan Schlott, Panos Papadimitratos Impact of Pseudonym Changes on Geographic Routing in VANETs. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Gina Kounga, Thomas Walter 0001 Identification in Infrastructureless Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jean-Pierre Hubaux Security and Cooperation in Wireless Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Levente Buttyán, Virgil D. Gligor, Dirk Westhoff (eds.) Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Pim Tuyls Grey-Box Cryptography: Physical Unclonable Functions. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, authentication, pervasive computing, Elliptic Curve Cryptography, key-distribution, hardware implementation
1Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MANET Routing, Byzantine Attacks, Security
1Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won RFID System with Fairness Within the Framework of Security and Privacy. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF uncheckable, security, privacy, RFID, Fairness, traceability
1Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff (eds.) Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jeonil Kang, DaeHun Nyang RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Refik Molva, Gene Tsudik, Dirk Westhoff (eds.) Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF joint sparse form, left-to-right, multi-scalar multiplication, shamir method, elliptic curve cryptosystem
1Levente Buttyán, László Dóra, István Vajda Statistical Wormhole Detection in Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Matija Puzar, Jon Andersson, Thomas Plagemann, Yves Roudier SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Levente Buttyán, Tamás Holczer, Péter Schaffer Spontaneous Cooperation in Multi-domain Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong Efficient Verifiable Ring Encryption for Ad Hoc Groups. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ford-Long Wong, Frank Stajano Location Privacy in Bluetooth. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sang-Soo Yeo, Sung Kwon Kim Scalable and Flexible Privacy Protection Scheme for RFID Systems. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Katsuyuki Okeya, Tetsu Iwata Side Channel Attacks on Message Authentication Codes. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Selective Forgery, MACs, Side Channel Attacks, DPA, SPA
1Gergely Ács, Levente Buttyán, István Vajda Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, Yongdae Kim Remote Software-Based Attestation for Wireless Sensors. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar Public Key Cryptography in Sensor Networks - Revisited. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Stefan Schmidt, Holger Krahn, Stefan Fischer 0001, Dietmar Wätjen A Security Architecture for Mobile Wireless Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Javier Herranz, Germán Sáez Ring Signature Schemes for General Ad-Hoc Access Structures. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kaisa Nyberg IKE in Ad Hoc IP Networking. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ad hoc access, ad hoc authentication, ad hoc networking, key management, message authentication code, peer-to-peer communication, security association, IKEv2
1Seamus Moloney, Philip Ginzboorg Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jean-Pierre Hubaux New Research Challenges for the Security of Ad Hoc and Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Miroslaw Kutylowski, Wojciech Rutkowski Secure Initialization in Single-Hop Radio Networks. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Harald Vogt Exploring Message Authentication in Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Elena Trichina, Tymur Korkishko Secure AES Hardware Module for Resource Constrained Devices. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Mark Manulis, Jörg Schwenk Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tony K. Chan, Karyin Fung, Joseph K. Liu, Victor K. Wei Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Frank Kargl, Andreas Klenk, Stefan Schlott, Michael Weber 0001 Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Joao Girão, Bernd Lamparter, Dirk Westhoff, Rui L. Aguiar, João Paulo Barraca Linking Ad Hoc Charging Schemes to AAAC Architectures. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kenneth P. Fishkin, Sumit Roy 0001, Bing Jiang Some Methods for Privacy in RFID Communication. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Xiaoyun Wang, Lizhen Yang, Kefei Chen SDD: Secure Distributed Diffusion Protocol for Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Hans-Joachim Hof, Erik-Oliver Blaß, Martina Zitterbart Secure Overlay for Service Centric Wireless Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yann-Hang Lee, Vikram Phadke, Amit Deshmukh, Jin Wook Lee Key Management in Wireless Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Prakash Reddy, Eamonn O'Brien-Strain, Jim Rowson Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-on. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF device ensemble, Security, Single sign on, Personal Area Network
Displaying result #1 - #67 of 67 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license