Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/esas:"
@inproceedings{DBLP:conf/esas/BirdCGMSSTTT07, author = {Neil Bird and Claudine Conrado and Jorge Guajardo and Stefan Maubach and Geert Jan Schrijen and Boris Skoric and Anton M. H. Tombeur and Peter Thueringer and Pim Tuyls}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {{ALGSICS} - Combining Physics and Cryptography to Enhance Security and Privacy in {RFID} Systems}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {187--202}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_14}, doi = {10.1007/978-3-540-73275-4\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/BirdCGMSSTTT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ButtyanHV07, author = {Levente Butty{\'{a}}n and Tam{\'{a}}s Holczer and Istv{\'{a}}n Vajda}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {129--141}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_10}, doi = {10.1007/978-3-540-73275-4\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/ButtyanHV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ChakrabartiCSC07, author = {Saikat Chakrabarti and Santosh Chandrasekhar and Mukesh Singhal and Kenneth L. Calvert}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Authenticating {DSR} Using a Novel Multisignature Scheme Based on Cubic {LFSR} Sequences}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {156--171}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_12}, doi = {10.1007/978-3-540-73275-4\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/ChakrabartiCSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/FarrellJ07, author = {Stephen Farrell and Christian Damsgaard Jensen}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {"End-by-Hop" Data Integrity}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {142--155}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_11}, doi = {10.1007/978-3-540-73275-4\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/FarrellJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/GrossmannBJOSM07, author = {Ulrich Gro{\ss}mann and Enrik Berkhan and Luciana C. Jatoba and J{\"{o}}rg Ottenbacher and Wilhelm Stork and Klaus D. M{\"{u}}ller{-}Glaser}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {172--186}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_13}, doi = {10.1007/978-3-540-73275-4\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/GrossmannBJOSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/Hoepman07, author = {Jaap{-}Henk Hoepman}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Private Handshakes}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {31--42}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_3}, doi = {10.1007/978-3-540-73275-4\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/Hoepman07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/KirovskiSW07, author = {Darko Kirovski and Mike Sinclair and David Wilson}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {The Martini Synch: Joint Fuzzy Hashing Via Error Correction}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {16--30}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_2}, doi = {10.1007/978-3-540-73275-4\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/KirovskiSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/KraussSE07, author = {Christoph Krau{\ss} and Frederic Stumpf and Claudia Eckert}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {203--217}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_15}, doi = {10.1007/978-3-540-73275-4\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/KraussSE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/Mayrhofer07, author = {Rene Mayrhofer}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {1--15}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_1}, doi = {10.1007/978-3-540-73275-4\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/Mayrhofer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/MerweDM07, author = {Johann van der Merwe and Dawoud S. Dawoud and Stephen McDonald}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {87--100}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_7}, doi = {10.1007/978-3-540-73275-4\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/MerweDM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/MooreCNA07, author = {Tyler Moore and Jolyon Clulow and Shishir Nagaraja and Ross J. Anderson}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {New Strategies for Revocation in Ad-Hoc Networks}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {232--246}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_17}, doi = {10.1007/978-3-540-73275-4\_17}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/MooreCNA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/RoughanA07, author = {Matthew Roughan and Jon Arnold}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Multiple Target Localisation in Sensor Networks with Location Privacy}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {116--128}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_9}, doi = {10.1007/978-3-540-73275-4\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/RoughanA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/SingeleeP07, author = {Dave Singel{\'{e}}e and Bart Preneel}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Distance Bounding in Noisy Environments}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {101--115}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_8}, doi = {10.1007/978-3-540-73275-4\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/SingeleeP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/SmythRC07, author = {Ben Smyth and Mark Ryan and Liqun Chen}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Direct Anonymous Attestation {(DAA):} Ensuring Privacy with Corrupt Administrators}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {218--231}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_16}, doi = {10.1007/978-3-540-73275-4\_16}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esas/SmythRC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/SuomalainenVA07, author = {Jani Suomalainen and Jukka Valkonen and N. Asokan}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Security Associations in Personal Networks: {A} Comparative Analysis}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {43--57}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_4}, doi = {10.1007/978-3-540-73275-4\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esas/SuomalainenVA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/TabanS07, author = {Gelareh Taban and Reihaneh Safavi{-}Naini}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Key Establishment in Heterogeneous Self-organized Networks}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {58--72}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_5}, doi = {10.1007/978-3-540-73275-4\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/TabanS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/UhsadelPP07, author = {Leif Uhsadel and Axel Poschmann and Christof Paar}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {73--86}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_6}, doi = {10.1007/978-3-540-73275-4\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/UhsadelPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esas/2007, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4}, doi = {10.1007/978-3-540-73275-4}, isbn = {978-3-540-73274-7}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ArmknechtGSW06, author = {Frederik Armknecht and Joao Gir{\~{a}}o and Marc Ph. Stoecklin and Dirk Westhoff}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {18--31}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_4}, doi = {10.1007/11964254\_4}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/esas/ArmknechtGSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/AwerbuchCCHR06, author = {Baruch Awerbuch and Robert G. Cole and Reza Curtmola and David Holmer and Herbert Rubens}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {98--112}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_10}, doi = {10.1007/11964254\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/AwerbuchCCHR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/BatinaMSPV06, author = {Lejla Batina and Nele Mentens and Kazuo Sakiyama and Bart Preneel and Ingrid Verbauwhede}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {6--17}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_3}, doi = {10.1007/11964254\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/BatinaMSPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/BenensonFPRW06, author = {Zinaida Benenson and Felix C. Freiling and Birgit Pfitzmann and Christian Rohner and Michael Waidner}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {165--178}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_15}, doi = {10.1007/11964254\_15}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/BenensonFPRW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/BringerC06, author = {Julien Bringer and Herv{\'{e}} Chabanne}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {On the Wiretap Channel Induced by Noisy Tags}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {113--120}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_11}, doi = {10.1007/11964254\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/BringerC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ClulowHKM06, author = {Jolyon Clulow and Gerhard P. Hancke and Markus G. Kuhn and Tyler Moore}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {83--97}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_9}, doi = {10.1007/11964254\_9}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/ClulowHKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/FouladgarMMA06, author = {Sepideh Fouladgar and Bastien Mainaud and Khaled Masmoudi and Hossam Afifi}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Tiny 3-TLS: {A} Trust Delegation Protocol for Wireless Sensor Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {32--42}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_5}, doi = {10.1007/11964254\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/FouladgarMMA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/GaliceMMU06, author = {Samuel Galice and Marine Minier and John Mullins and St{\'{e}}phane Ub{\'{e}}da}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Cryptographic Protocol to Establish Trusted History of Interactions}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {136--149}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_13}, doi = {10.1007/11964254\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/GaliceMMU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/Ghosh06, author = {Subhas Kumar Ghosh}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {121--135}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_12}, doi = {10.1007/11964254\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/Ghosh06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/GiraoM06, author = {Joao Gir{\~{a}}o and Miquel Martin}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Two's Company, Three Is a Crowd: {A} Group-Admission Protocol for WSNs}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {70--82}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_8}, doi = {10.1007/11964254\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/GiraoM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/Hubaux06, author = {Jean{-}Pierre Hubaux}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Security and Cooperation in Wireless Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {1--2}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_1}, doi = {10.1007/11964254\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/Hubaux06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/KoungaW06, author = {Gina Kounga and Thomas Walter}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Identification in Infrastructureless Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {58--69}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_7}, doi = {10.1007/11964254\_7}, timestamp = {Thu, 21 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esas/KoungaW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/SchochKLSP06, author = {Elmar Schoch and Frank Kargl and Tim Leinm{\"{u}}ller and Stefan Schlott and Panos Papadimitratos}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Impact of Pseudonym Changes on Geographic Routing in VANETs}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {43--57}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_6}, doi = {10.1007/11964254\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/SchochKLSP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/Sieka06, author = {Bartlomiej Sieka}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {179--192}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_16}, doi = {10.1007/11964254\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/Sieka06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/Tuyls06, author = {Pim Tuyls}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Grey-Box Cryptography: Physical Unclonable Functions}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {3--5}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_2}, doi = {10.1007/11964254\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/Tuyls06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ValkonenAN06, author = {Jukka Valkonen and N. Asokan and Kaisa Nyberg}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Ad Hoc Security Associations for Groups}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {150--164}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_14}, doi = {10.1007/11964254\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esas/ValkonenAN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esas/2006, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254}, doi = {10.1007/11964254}, isbn = {978-3-540-69172-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/AcsBV05, author = {Gergely {\'{A}}cs and Levente Butty{\'{a}}n and Istv{\'{a}}n Vajda}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {113--127}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_10}, doi = {10.1007/11601494\_10}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/esas/AcsBV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ButtyanDV05, author = {Levente Butty{\'{a}}n and L{\'{a}}szl{\'{o}} D{\'{o}}ra and Istv{\'{a}}n Vajda}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {Statistical Wormhole Detection in Sensor Networks}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {128--141}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_11}, doi = {10.1007/11601494\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/ButtyanDV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ButtyanHS05, author = {Levente Butty{\'{a}}n and Tam{\'{a}}s Holczer and P{\'{e}}ter Schaffer}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {Spontaneous Cooperation in Multi-domain Sensor Networks}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {42--53}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_4}, doi = {10.1007/11601494\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/ButtyanHS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/DahmenOT05, author = {Erik Dahmen and Katsuyuki Okeya and Tsuyoshi Takagi}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {189--204}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_16}, doi = {10.1007/11601494\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/DahmenOT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/KangN05, author = {Jeonil Kang and DaeHun Nyang}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {{RFID} Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {164--175}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_14}, doi = {10.1007/11601494\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/KangN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/KwakROKW05, author = {Jin Kwak and Keunwoo Rhee and Soohyun Oh and Seungjoo Kim and Dongho Won}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {{RFID} System with Fairness Within the Framework of Security and Privacy}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {142--152}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_12}, doi = {10.1007/11601494\_12}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/KwakROKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/LiuTW05, author = {Joseph K. Liu and Patrick P. Tsang and Duncan S. Wong}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {Efficient Verifiable Ring Encryption for Ad Hoc Groups}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {1--13}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_1}, doi = {10.1007/11601494\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/LiuTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/OkeyaI05, author = {Katsuyuki Okeya and Tetsu Iwata}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {Side Channel Attacks on Message Authentication Codes}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {205--217}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_17}, doi = {10.1007/11601494\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/OkeyaI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/PuzarAPR05, author = {Matija Puzar and Jon Andersson and Thomas Plagemann and Yves Roudier}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {SKiMPy: {A} Simple Key Management Protocol for MANETs in Emergency and Rescue Operations}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {14--26}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_2}, doi = {10.1007/11601494\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/PuzarAPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ShaneckMKK05, author = {Mark Shaneck and Karthikeyan Mahadevan and Vishal Kher and Yongdae Kim}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {Remote Software-Based Attestation for Wireless Sensors}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {27--41}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_3}, doi = {10.1007/11601494\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esas/ShaneckMKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/WongS05, author = {Ford{-}Long Wong and Frank Stajano}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {Location Privacy in Bluetooth}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {176--188}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_15}, doi = {10.1007/11601494\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/WongS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/YeoK05, author = {Sang{-}Soo Yeo and Sung Kwon Kim}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {Scalable and Flexible Privacy Protection Scheme for {RFID} Systems}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {153--163}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_13}, doi = {10.1007/11601494\_13}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/YeoK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esas/2004, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b105219}, doi = {10.1007/B105219}, isbn = {3-540-24396-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esas/2005, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494}, doi = {10.1007/11601494}, isbn = {3-540-30912-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ChanFLW04, author = {Tony K. Chan and Karyin Fung and Joseph K. Liu and Victor K. Wei}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {82--94}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_8}, doi = {10.1007/978-3-540-30496-8\_8}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/esas/ChanFLW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/FishkinRJ04, author = {Kenneth P. Fishkin and Sumit Roy and Bing Jiang}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Some Methods for Privacy in {RFID} Communication}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {42--53}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_5}, doi = {10.1007/978-3-540-30496-8\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/FishkinRJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/GaubatzKS04, author = {Gunnar Gaubatz and Jens{-}Peter Kaps and Berk Sunar}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Public Key Cryptography in Sensor Networks - Revisited}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {2--18}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_2}, doi = {10.1007/978-3-540-30496-8\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/GaubatzKS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/GiraoLWAB04, author = {Joao Gir{\~{a}}o and Bernd Lamparter and Dirk Westhoff and Rui L. Aguiar and Jo{\~{a}}o Paulo Barraca}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Linking Ad Hoc Charging Schemes to {AAAC} Architectures}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {66--81}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_7}, doi = {10.1007/978-3-540-30496-8\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/GiraoLWAB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/HerranzS04, author = {Javier Herranz and Germ{\'{a}}n S{\'{a}}ez}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Ring Signature Schemes for General Ad-Hoc Access Structures}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {54--65}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_6}, doi = {10.1007/978-3-540-30496-8\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/HerranzS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/HofBZ04, author = {Hans{-}Joachim Hof and Erik{-}Oliver Bla{\ss} and Martina Zitterbart}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Secure Overlay for Service Centric Wireless Sensor Networks}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {125--138}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_11}, doi = {10.1007/978-3-540-30496-8\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/HofBZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/Hubaux04, author = {Jean{-}Pierre Hubaux}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {New Research Challenges for the Security of Ad Hoc and Sensor Networks}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {1}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_1}, doi = {10.1007/978-3-540-30496-8\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/Hubaux04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/KarglKSW04, author = {Frank Kargl and Andreas Klenk and Stefan Schlott and Michael Weber}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {152--165}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_13}, doi = {10.1007/978-3-540-30496-8\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/KarglKSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/KutylowskiR04, author = {Miroslaw Kutylowski and Wojciech Rutkowski}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Secure Initialization in Single-Hop Radio Networks}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {31--41}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_4}, doi = {10.1007/978-3-540-30496-8\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/KutylowskiR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/LeePDL04, author = {Yann{-}Hang Lee and Vikram Phadke and Amit Deshmukh and Jin Wook Lee}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Key Management in Wireless Sensor Networks}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {190--204}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_16}, doi = {10.1007/978-3-540-30496-8\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/LeePDL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ManulisS04, author = {Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on {IDH}}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {107--124}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_10}, doi = {10.1007/978-3-540-30496-8\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/ManulisS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/MoloneyG04, author = {Seamus Moloney and Philip Ginzboorg}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {95--106}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_9}, doi = {10.1007/978-3-540-30496-8\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/MoloneyG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/Nyberg04, author = {Kaisa Nyberg}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {{IKE} in Ad Hoc {IP} Networking}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {139--151}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_12}, doi = {10.1007/978-3-540-30496-8\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/Nyberg04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ReddyOR04, author = {Prakash Reddy and Eamonn O'Brien{-}Strain and Jim Rowson}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-on}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {178--189}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_15}, doi = {10.1007/978-3-540-30496-8\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/ReddyOR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/SchmidtKFW04, author = {Stefan Schmidt and Holger Krahn and Stefan Fischer and Dietmar W{\"{a}}tjen}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {A Security Architecture for Mobile Wireless Sensor Networks}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {166--177}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_14}, doi = {10.1007/978-3-540-30496-8\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/SchmidtKFW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/TrichinaK04, author = {Elena Trichina and Tymur Korkishko}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Secure {AES} Hardware Module for Resource Constrained Devices}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {215--230}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_18}, doi = {10.1007/978-3-540-30496-8\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/TrichinaK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/Vogt04, author = {Harald Vogt}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Exploring Message Authentication in Sensor Networks}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {19--30}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_3}, doi = {10.1007/978-3-540-30496-8\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/Vogt04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/WangYC04, author = {Xiaoyun Wang and Lizhen Yang and Kefei Chen}, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {{SDD:} Secure Distributed Diffusion Protocol for Sensor Networks}, booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, pages = {205--214}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30496-8\_17}, doi = {10.1007/978-3-540-30496-8\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/WangYC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.