ISBN-10:
3540366466
ISBN-13:
9783540366461
Pub. Date:
09/14/2006
Publisher:
Springer Berlin Heidelberg
Secure Mobile Ad-hoc Networks and Sensors: First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers / Edition 1

Secure Mobile Ad-hoc Networks and Sensors: First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers / Edition 1

by Mike Burmester, Alec Yasinsac

Paperback

Current price is , Original price is $89.99. You
Select a Purchase Option (2006)
  • purchase options
    $60.66 $89.99 Save 33% Current price is $60.66, Original price is $89.99. You Save 33%.
  • purchase options

Product Details

ISBN-13: 9783540366461
Publisher: Springer Berlin Heidelberg
Publication date: 09/14/2006
Series: Lecture Notes in Computer Science , #4074
Edition description: 2006
Pages: 193
Product dimensions: 6.10(w) x 9.25(h) x 0.36(d)

Table of Contents

Mobile Ad-Hoc Networks and Sensors.- Keynote:On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.- Key Management for Mobile Sensor Networks.- Server-Aided RSA Key Generation Against Collusion Attack.- Hybrid Approach for Secure Mobile Agent Computations.- An XML Standards Based Authorization Framework for Mobile Agents.- Distributed Data Mining Prools for Privacy: A Review of Some Recent Results.- Detecting Impersonation Attacks in Future Wireless and Mobile Networks.- Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.- Keynote:Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.- “Fair” Authentication in Pervasive Computing.- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.- ARMS: An Authenticated Routing Message in Sensor Networks.- Security Analysis and Improvement of Return Routability Prool.- Dark Encounter Computations.- Panel: Authentication in Constrained Environments.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews