Search dblp for Publications

export results for "stream:streams/conf/esas:"

 download as .bib file

@inproceedings{DBLP:conf/esas/BirdCGMSSTTT07,
  author       = {Neil Bird and
                  Claudine Conrado and
                  Jorge Guajardo and
                  Stefan Maubach and
                  Geert Jan Schrijen and
                  Boris Skoric and
                  Anton M. H. Tombeur and
                  Peter Thueringer and
                  Pim Tuyls},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {{ALGSICS} - Combining Physics and Cryptography to Enhance Security
                  and Privacy in {RFID} Systems},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_14},
  doi          = {10.1007/978-3-540-73275-4\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/BirdCGMSSTTT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ButtyanHV07,
  author       = {Levente Butty{\'{a}}n and
                  Tam{\'{a}}s Holczer and
                  Istv{\'{a}}n Vajda},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {On the Effectiveness of Changing Pseudonyms to Provide Location Privacy
                  in VANETs},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {129--141},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_10},
  doi          = {10.1007/978-3-540-73275-4\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/ButtyanHV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ChakrabartiCSC07,
  author       = {Saikat Chakrabarti and
                  Santosh Chandrasekhar and
                  Mukesh Singhal and
                  Kenneth L. Calvert},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Authenticating {DSR} Using a Novel Multisignature Scheme Based on
                  Cubic {LFSR} Sequences},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_12},
  doi          = {10.1007/978-3-540-73275-4\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/ChakrabartiCSC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/FarrellJ07,
  author       = {Stephen Farrell and
                  Christian Damsgaard Jensen},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {"End-by-Hop" Data Integrity},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {142--155},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_11},
  doi          = {10.1007/978-3-540-73275-4\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/FarrellJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/GrossmannBJOSM07,
  author       = {Ulrich Gro{\ss}mann and
                  Enrik Berkhan and
                  Luciana C. Jatoba and
                  J{\"{o}}rg Ottenbacher and
                  Wilhelm Stork and
                  Klaus D. M{\"{u}}ller{-}Glaser},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Security for Mobile Low Power Nodes in a Personal Area Network by
                  Means of Trusted Platform Modules},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {172--186},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_13},
  doi          = {10.1007/978-3-540-73275-4\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/GrossmannBJOSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/Hoepman07,
  author       = {Jaap{-}Henk Hoepman},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Private Handshakes},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {31--42},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_3},
  doi          = {10.1007/978-3-540-73275-4\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/Hoepman07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/KirovskiSW07,
  author       = {Darko Kirovski and
                  Mike Sinclair and
                  David Wilson},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {The Martini Synch: Joint Fuzzy Hashing Via Error Correction},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_2},
  doi          = {10.1007/978-3-540-73275-4\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/KirovskiSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/KraussSE07,
  author       = {Christoph Krau{\ss} and
                  Frederic Stumpf and
                  Claudia Eckert},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Detecting Node Compromise in Hybrid Wireless Sensor Networks Using
                  Attestation Techniques},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {203--217},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_15},
  doi          = {10.1007/978-3-540-73275-4\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/KraussSE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/Mayrhofer07,
  author       = {Rene Mayrhofer},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {The Candidate Key Protocol for Generating Secret Shared Keys from
                  Similar Sensor Data Streams},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_1},
  doi          = {10.1007/978-3-540-73275-4\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/Mayrhofer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/MerweDM07,
  author       = {Johann van der Merwe and
                  Dawoud S. Dawoud and
                  Stephen McDonald},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {87--100},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_7},
  doi          = {10.1007/978-3-540-73275-4\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/MerweDM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/MooreCNA07,
  author       = {Tyler Moore and
                  Jolyon Clulow and
                  Shishir Nagaraja and
                  Ross J. Anderson},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {New Strategies for Revocation in Ad-Hoc Networks},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {232--246},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_17},
  doi          = {10.1007/978-3-540-73275-4\_17},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/MooreCNA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/RoughanA07,
  author       = {Matthew Roughan and
                  Jon Arnold},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Multiple Target Localisation in Sensor Networks with Location Privacy},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {116--128},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_9},
  doi          = {10.1007/978-3-540-73275-4\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/RoughanA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/SingeleeP07,
  author       = {Dave Singel{\'{e}}e and
                  Bart Preneel},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Distance Bounding in Noisy Environments},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {101--115},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_8},
  doi          = {10.1007/978-3-540-73275-4\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/SingeleeP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/SmythRC07,
  author       = {Ben Smyth and
                  Mark Ryan and
                  Liqun Chen},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Direct Anonymous Attestation {(DAA):} Ensuring Privacy with Corrupt
                  Administrators},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {218--231},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_16},
  doi          = {10.1007/978-3-540-73275-4\_16},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esas/SmythRC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/SuomalainenVA07,
  author       = {Jani Suomalainen and
                  Jukka Valkonen and
                  N. Asokan},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Security Associations in Personal Networks: {A} Comparative Analysis},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {43--57},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_4},
  doi          = {10.1007/978-3-540-73275-4\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esas/SuomalainenVA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/TabanS07,
  author       = {Gelareh Taban and
                  Reihaneh Safavi{-}Naini},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Key Establishment in Heterogeneous Self-organized Networks},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {58--72},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_5},
  doi          = {10.1007/978-3-540-73275-4\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/TabanS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/UhsadelPP07,
  author       = {Leif Uhsadel and
                  Axel Poschmann and
                  Christof Paar},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_6},
  doi          = {10.1007/978-3-540-73275-4\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/UhsadelPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esas/2007,
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4},
  doi          = {10.1007/978-3-540-73275-4},
  isbn         = {978-3-540-73274-7},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ArmknechtGSW06,
  author       = {Frederik Armknecht and
                  Joao Gir{\~{a}}o and
                  Marc Ph. Stoecklin and
                  Dirk Westhoff},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Re-visited: Denial of Service Resilient Access Control for Wireless
                  Sensor Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {18--31},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_4},
  doi          = {10.1007/11964254\_4},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/ArmknechtGSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/AwerbuchCCHR06,
  author       = {Baruch Awerbuch and
                  Robert G. Cole and
                  Reza Curtmola and
                  David Holmer and
                  Herbert Rubens},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Dynamics of Learning Algorithms for the On-Demand Secure Byzantine
                  Routing Protocol},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {98--112},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_10},
  doi          = {10.1007/11964254\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/AwerbuchCCHR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/BatinaMSPV06,
  author       = {Lejla Batina and
                  Nele Mentens and
                  Kazuo Sakiyama and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {6--17},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_3},
  doi          = {10.1007/11964254\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/BatinaMSPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/BenensonFPRW06,
  author       = {Zinaida Benenson and
                  Felix C. Freiling and
                  Birgit Pfitzmann and
                  Christian Rohner and
                  Michael Waidner},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer
                  Ad Hoc Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {165--178},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_15},
  doi          = {10.1007/11964254\_15},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/BenensonFPRW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/BringerC06,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {On the Wiretap Channel Induced by Noisy Tags},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {113--120},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_11},
  doi          = {10.1007/11964254\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/BringerC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ClulowHKM06,
  author       = {Jolyon Clulow and
                  Gerhard P. Hancke and
                  Markus G. Kuhn and
                  Tyler Moore},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {83--97},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_9},
  doi          = {10.1007/11964254\_9},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/ClulowHKM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/FouladgarMMA06,
  author       = {Sepideh Fouladgar and
                  Bastien Mainaud and
                  Khaled Masmoudi and
                  Hossam Afifi},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Tiny 3-TLS: {A} Trust Delegation Protocol for Wireless Sensor Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {32--42},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_5},
  doi          = {10.1007/11964254\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/FouladgarMMA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/GaliceMMU06,
  author       = {Samuel Galice and
                  Marine Minier and
                  John Mullins and
                  St{\'{e}}phane Ub{\'{e}}da},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Cryptographic Protocol to Establish Trusted History of Interactions},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {136--149},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_13},
  doi          = {10.1007/11964254\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/GaliceMMU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/Ghosh06,
  author       = {Subhas Kumar Ghosh},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {On Optimality of Key Pre-distribution Schemes for Distributed Sensor
                  Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_12},
  doi          = {10.1007/11964254\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/Ghosh06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/GiraoM06,
  author       = {Joao Gir{\~{a}}o and
                  Miquel Martin},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Two's Company, Three Is a Crowd: {A} Group-Admission Protocol for
                  WSNs},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {70--82},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_8},
  doi          = {10.1007/11964254\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/GiraoM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/Hubaux06,
  author       = {Jean{-}Pierre Hubaux},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Security and Cooperation in Wireless Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_1},
  doi          = {10.1007/11964254\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/Hubaux06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/KoungaW06,
  author       = {Gina Kounga and
                  Thomas Walter},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Identification in Infrastructureless Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {58--69},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_7},
  doi          = {10.1007/11964254\_7},
  timestamp    = {Thu, 21 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esas/KoungaW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/SchochKLSP06,
  author       = {Elmar Schoch and
                  Frank Kargl and
                  Tim Leinm{\"{u}}ller and
                  Stefan Schlott and
                  Panos Papadimitratos},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Impact of Pseudonym Changes on Geographic Routing in VANETs},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {43--57},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_6},
  doi          = {10.1007/11964254\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/SchochKLSP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/Sieka06,
  author       = {Bartlomiej Sieka},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Using Radio Device Fingerprinting for the Detection of Impersonation
                  and Sybil Attacks in Wireless Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {179--192},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_16},
  doi          = {10.1007/11964254\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/Sieka06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/Tuyls06,
  author       = {Pim Tuyls},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Grey-Box Cryptography: Physical Unclonable Functions},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {3--5},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_2},
  doi          = {10.1007/11964254\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/Tuyls06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ValkonenAN06,
  author       = {Jukka Valkonen and
                  N. Asokan and
                  Kaisa Nyberg},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Ad Hoc Security Associations for Groups},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {150--164},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_14},
  doi          = {10.1007/11964254\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esas/ValkonenAN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esas/2006,
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254},
  doi          = {10.1007/11964254},
  isbn         = {978-3-540-69172-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/AcsBV05,
  author       = {Gergely {\'{A}}cs and
                  Levente Butty{\'{a}}n and
                  Istv{\'{a}}n Vajda},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {Provable Security of On-Demand Distance Vector Routing in Wireless
                  Ad Hoc Networks},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {113--127},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_10},
  doi          = {10.1007/11601494\_10},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/AcsBV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ButtyanDV05,
  author       = {Levente Butty{\'{a}}n and
                  L{\'{a}}szl{\'{o}} D{\'{o}}ra and
                  Istv{\'{a}}n Vajda},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {Statistical Wormhole Detection in Sensor Networks},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {128--141},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_11},
  doi          = {10.1007/11601494\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/ButtyanDV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ButtyanHS05,
  author       = {Levente Butty{\'{a}}n and
                  Tam{\'{a}}s Holczer and
                  P{\'{e}}ter Schaffer},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {Spontaneous Cooperation in Multi-domain Sensor Networks},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {42--53},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_4},
  doi          = {10.1007/11601494\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/ButtyanHS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/DahmenOT05,
  author       = {Erik Dahmen and
                  Katsuyuki Okeya and
                  Tsuyoshi Takagi},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {An Advanced Method for Joint Scalar Multiplications on Memory Constraint
                  Devices},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {189--204},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_16},
  doi          = {10.1007/11601494\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/DahmenOT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/KangN05,
  author       = {Jeonil Kang and
                  DaeHun Nyang},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {{RFID} Authentication Protocol with Strong Resistance Against Traceability
                  and Denial of Service Attacks},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {164--175},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_14},
  doi          = {10.1007/11601494\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/KangN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/KwakROKW05,
  author       = {Jin Kwak and
                  Keunwoo Rhee and
                  Soohyun Oh and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {{RFID} System with Fairness Within the Framework of Security and Privacy},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {142--152},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_12},
  doi          = {10.1007/11601494\_12},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/KwakROKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/LiuTW05,
  author       = {Joseph K. Liu and
                  Patrick P. Tsang and
                  Duncan S. Wong},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {Efficient Verifiable Ring Encryption for Ad Hoc Groups},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_1},
  doi          = {10.1007/11601494\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/LiuTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/OkeyaI05,
  author       = {Katsuyuki Okeya and
                  Tetsu Iwata},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {Side Channel Attacks on Message Authentication Codes},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {205--217},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_17},
  doi          = {10.1007/11601494\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/OkeyaI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/PuzarAPR05,
  author       = {Matija Puzar and
                  Jon Andersson and
                  Thomas Plagemann and
                  Yves Roudier},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {SKiMPy: {A} Simple Key Management Protocol for MANETs in Emergency
                  and Rescue Operations},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {14--26},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_2},
  doi          = {10.1007/11601494\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/PuzarAPR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ShaneckMKK05,
  author       = {Mark Shaneck and
                  Karthikeyan Mahadevan and
                  Vishal Kher and
                  Yongdae Kim},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {Remote Software-Based Attestation for Wireless Sensors},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {27--41},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_3},
  doi          = {10.1007/11601494\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esas/ShaneckMKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/WongS05,
  author       = {Ford{-}Long Wong and
                  Frank Stajano},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {Location Privacy in Bluetooth},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {176--188},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_15},
  doi          = {10.1007/11601494\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/WongS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/YeoK05,
  author       = {Sang{-}Soo Yeo and
                  Sung Kwon Kim},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {Scalable and Flexible Privacy Protection Scheme for {RFID} Systems},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {153--163},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_13},
  doi          = {10.1007/11601494\_13},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/YeoK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esas/2004,
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b105219},
  doi          = {10.1007/B105219},
  isbn         = {3-540-24396-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esas/2005,
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494},
  doi          = {10.1007/11601494},
  isbn         = {3-540-30912-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ChanFLW04,
  author       = {Tony K. Chan and
                  Karyin Fung and
                  Joseph K. Liu and
                  Victor K. Wei},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {82--94},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_8},
  doi          = {10.1007/978-3-540-30496-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/ChanFLW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/FishkinRJ04,
  author       = {Kenneth P. Fishkin and
                  Sumit Roy and
                  Bing Jiang},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Some Methods for Privacy in {RFID} Communication},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {42--53},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_5},
  doi          = {10.1007/978-3-540-30496-8\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/FishkinRJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/GaubatzKS04,
  author       = {Gunnar Gaubatz and
                  Jens{-}Peter Kaps and
                  Berk Sunar},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Public Key Cryptography in Sensor Networks - Revisited},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {2--18},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_2},
  doi          = {10.1007/978-3-540-30496-8\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/GaubatzKS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/GiraoLWAB04,
  author       = {Joao Gir{\~{a}}o and
                  Bernd Lamparter and
                  Dirk Westhoff and
                  Rui L. Aguiar and
                  Jo{\~{a}}o Paulo Barraca},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Linking Ad Hoc Charging Schemes to {AAAC} Architectures},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {66--81},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_7},
  doi          = {10.1007/978-3-540-30496-8\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/GiraoLWAB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/HerranzS04,
  author       = {Javier Herranz and
                  Germ{\'{a}}n S{\'{a}}ez},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Ring Signature Schemes for General Ad-Hoc Access Structures},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {54--65},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_6},
  doi          = {10.1007/978-3-540-30496-8\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/HerranzS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/HofBZ04,
  author       = {Hans{-}Joachim Hof and
                  Erik{-}Oliver Bla{\ss} and
                  Martina Zitterbart},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Secure Overlay for Service Centric Wireless Sensor Networks},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {125--138},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_11},
  doi          = {10.1007/978-3-540-30496-8\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/HofBZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/Hubaux04,
  author       = {Jean{-}Pierre Hubaux},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {New Research Challenges for the Security of Ad Hoc and Sensor Networks},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {1},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_1},
  doi          = {10.1007/978-3-540-30496-8\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/Hubaux04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/KarglKSW04,
  author       = {Frank Kargl and
                  Andreas Klenk and
                  Stefan Schlott and
                  Michael Weber},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {152--165},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_13},
  doi          = {10.1007/978-3-540-30496-8\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/KarglKSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/KutylowskiR04,
  author       = {Miroslaw Kutylowski and
                  Wojciech Rutkowski},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Secure Initialization in Single-Hop Radio Networks},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {31--41},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_4},
  doi          = {10.1007/978-3-540-30496-8\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/KutylowskiR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/LeePDL04,
  author       = {Yann{-}Hang Lee and
                  Vikram Phadke and
                  Amit Deshmukh and
                  Jin Wook Lee},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Key Management in Wireless Sensor Networks},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {190--204},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_16},
  doi          = {10.1007/978-3-540-30496-8\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/LeePDL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ManulisS04,
  author       = {Mark Manulis and
                  J{\"{o}}rg Schwenk},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on
                  {IDH}},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {107--124},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_10},
  doi          = {10.1007/978-3-540-30496-8\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/ManulisS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/MoloneyG04,
  author       = {Seamus Moloney and
                  Philip Ginzboorg},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Security for Interactions in Pervasive Networks: Applicability of
                  Recommendation Systems},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {95--106},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_9},
  doi          = {10.1007/978-3-540-30496-8\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/MoloneyG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/Nyberg04,
  author       = {Kaisa Nyberg},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {{IKE} in Ad Hoc {IP} Networking},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {139--151},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_12},
  doi          = {10.1007/978-3-540-30496-8\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/Nyberg04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ReddyOR04,
  author       = {Prakash Reddy and
                  Eamonn O'Brien{-}Strain and
                  Jim Rowson},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Securely Propagating Authentication in an Ensemble of Personal Devices
                  Using Single Sign-on},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {178--189},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_15},
  doi          = {10.1007/978-3-540-30496-8\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/ReddyOR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/SchmidtKFW04,
  author       = {Stefan Schmidt and
                  Holger Krahn and
                  Stefan Fischer and
                  Dietmar W{\"{a}}tjen},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {A Security Architecture for Mobile Wireless Sensor Networks},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {166--177},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_14},
  doi          = {10.1007/978-3-540-30496-8\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/SchmidtKFW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/TrichinaK04,
  author       = {Elena Trichina and
                  Tymur Korkishko},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Secure {AES} Hardware Module for Resource Constrained Devices},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {215--230},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_18},
  doi          = {10.1007/978-3-540-30496-8\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/TrichinaK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/Vogt04,
  author       = {Harald Vogt},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Exploring Message Authentication in Sensor Networks},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {19--30},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_3},
  doi          = {10.1007/978-3-540-30496-8\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/Vogt04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/WangYC04,
  author       = {Xiaoyun Wang and
                  Lizhen Yang and
                  Kefei Chen},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {{SDD:} Secure Distributed Diffusion Protocol for Sensor Networks},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {205--214},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_17},
  doi          = {10.1007/978-3-540-30496-8\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/WangYC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics