Stop the war!
Остановите войну!
for scientists:
default search action
MADNES 2005: Singapore
- Mike Burmester, Alec Yasinsac:
Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers. Lecture Notes in Computer Science 4074, Springer 2006, ISBN 3-540-36646-6 - Virgil D. Gligor:
Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks. 1 - Jong Sou Park, Mohammed Golam Sadi, Dong Seong Kim, Young Deog Song:
A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network. 2-13 - David Sánchez Sánchez, Heribert Baldus:
Key Management for Mobile Sensor Networks. 14-26 - Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen:
Server-Aided RSA Key Generation Against Collusion Attack. 27-37 - Jeffrey Todd McDonald:
Hybrid Approach for Secure Mobile Agent Computations. 38-53 - Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong:
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results. 67-79 - Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis:
Detecting Impersonation Attacks in Future Wireless and Mobile Networks. 80-95 - Jacek Cichon, Lukasz Krzywiecki, Miroslaw Kutylowski, Pawel Wlaz:
Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems. 96-109 - Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. 110-116 - Yuliang Zheng:
Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks. 117 - KyungKeun Lee, JoongHyo Oh, Sang-Jae Moon:
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks. 118-131 - Jun Li, Bruce Christianson, Martin J. Loomes:
"Fair" Authentication in Pervasive Computing. 132-143 - Yunyi Liu, Tuanfa Qin, Wansun Ni, Shuyi Zhang:
Cryptanalysis of the Energy Efficient Stream Ciphers SSC2. 144-157 - Suk-Bok Lee, Yoon-Hwa Choi:
ARMS: An Authenticated Routing Message in Sensor Networks. 158-173 - Ying Qiu, Jianying Zhou, Robert H. Deng:
Security Analysis and Improvement of Return Routability Protocol. 174-181 - René Peralta:
Dark Encounter Computations. 182-185 - Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng:
Panel: Authentication in Constrained Environments. 186-191
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.