Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected PapersSpringer Science & Business Media, 2005. gada 13. dec. - 217 lappuses It was a pleasure to take part in the 2005 European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005), held on July 13–14 in Visegrad (Hungary) in conjunction with the First International Conference on Wireless Internet (WICON) . As Program Co-chairs, we are very happy with the outcome of this year’s ESAS workshop. It clearly demonstrates the continued importance, popularity andtimeliness oftheworkshop’stopic: securityandprivacy inadhocandsensor networks.Atotalof51fullpapersweresubmitted.Eachsubmissionwasreviewed by at least three expert referees. After a short period of intense discussions and deliberations, the Program Committee selected 17 papers for presentation and subsequent publication in the workshop proceedings. This corresponds to an acceptance rate of 33% — a respectable rate by any measure. First and foremost, we thank the authors of ALL submitted papers. Your con?dence in this venue is much appreciated. We hope that you will continue patronizing ESAS as authors and attendees. We are also very grateful to our colleagues in the research community who served on the ESAS Program C- mittee. Your sel?ess dedication is what makes the workshop a success. Finally, we are very grateful to the ESAS Steering Group: Levente Buttyan, Claude Castelluccia, Dirk Westho? and Susanne Wetzel. They had the vision and the drive to create this workshopin the ?rst place; they also provided many insightsandlotsofhelpwiththisyear’sevent.Weespeciallyacknowledgeand- preciate the work of Levente Buttyan whose dedication (as Steering Committee member, PC member and Local Arrangements Chair) played a very important role in the success of the workshop. |
Saturs
Efficient Verifiable Ring Encryption for Ad Hoc Groups | 1 |
A Simple Key Management Protocol for MANETs | 14 |
Remote SoftwareBased Attestation for Wireless Sensors | 27 |
Spontaneous Cooperation in Multidomain Sensor Networks | 42 |
Improving Sensor Network Security with Information Quality | 68 |
Randomized Grid Based Scheme for Wireless Sensor Network | 91 |
Provable Security of OnDemand Distance Vector Routing in Wireless | 113 |
Statistical Wormhole Detection in Sensor Networks | 128 |
RFID System with Fairness Within the Framework of Security | 142 |
Scalable and Flexible Privacy Protection Scheme for RFID Systems | 153 |
Location Privacy in Bluetooth | 176 |
An Advanced Method for Joint Scalar Multiplications on Memory | 189 |
Side Channel Attacks on Message Authentication Codes | 205 |
Citi izdevumi - Skatīt visu
Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop ... Refik Molva,Gene Tsudik,Dirk Westhoff Ierobežota priekšskatīšana - 2005 |
Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop ... Refik Molva Ierobežota priekšskatīšana - 2005 |
Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop ... Refik Molva,Gene Tsudik,Dirk Westhoff Priekšskatījums nav pieejams - 2005 |
Bieži izmantoti vārdi un frāzes
ad hoc networks adversary algorithm analysis approach assume attacker attestation routine Authenticated Querying authentication protocol back-end database back-end server base station bits block cipher Bluetooth ciphertext column communication compromised cooperation cryptography decrypt denote detection devices digit set distribution encryption establish a pairwise hash function hash tree hoc networks ideal-world identifier IEEE implementation Interleave method LNCS location privacy ltar MACs mechanisms Mobile Nash equilibria neighbors number of nodes OMAC one-time sensors oracle Ot,i output packet pairwise key paper parameters perform PK}N polynomial precomputed points pseudonyms Pt,i public key quality profile radio range random number randomly reader received recoding requires RFID system RFID tag routing protocol routing table SAODV scalars scenario Section sensor nodes Shamir method side channel attacks signature simulation Springer-Verlag strategy Sybil attack tamper resistance verifiable encryption Wireless Sensor Networks Workshop wormhole