Secure Mobile Ad-hoc Networks and Sensors [electronic resource] : First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers / edited by Mike Burmester, Alec Yasinsac.
Material type:
TextSeries: Lecture Notes in Computer Science ; 4074Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006Description: X, 193 p. Also available online. online resourceContent type: - text
- computer
- online resource
- 9783540378631
- Computer science
- Computer Communication Networks
- Data encryption (Computer science)
- Computer software
- Information systems
- Information Systems
- Telecommunication
- Computer Science
- Computer Communication Networks
- Data Encryption
- Algorithm Analysis and Problem Complexity
- Management of Computing and Information Systems
- Information Systems Applications (incl.Internet)
- Communications Engineering, Networks
- 004.6 23
- TK5105.5-5105.9
E-BOOKS
| Home library | Call number | Materials specified | URL | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
| IMSc Library | Link to resource | Available | EBK4431 |
Mobile Ad-Hoc Networks and Sensors -- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks -- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network -- Key Management for Mobile Sensor Networks -- Server-Aided RSA Key Generation Against Collusion Attack -- Hybrid Approach for Secure Mobile Agent Computations -- An XML Standards Based Authorization Framework for Mobile Agents -- Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results -- Detecting Impersonation Attacks in Future Wireless and Mobile Networks -- Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems -- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks -- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks -- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks -- “Fair” Authentication in Pervasive Computing -- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2 -- ARMS: An Authenticated Routing Message in Sensor Networks -- Security Analysis and Improvement of Return Routability Protocol -- Dark Encounter Computations -- Panel: Authentication in Constrained Environments.
There are no comments on this title.