default search action
SASN 2005: Alexandria, VA, USA
- Vijay Atluri, Peng Ning, Wenliang Du:
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005. ACM 2005, ISBN 1-59593-227-5
Ad hoc networks
- Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas:
A quantitative trust establishment framework for reliable data packet delivery in MANETs. 1-10 - Maxim Raya, Jean-Pierre Hubaux:
The security of vehicular ad hoc networks. 11-21 - Shouhuai Xu:
On the security of group communication schemes based on symmetric key cryptosystems. 22-31 - Radha Poovendran:
Information assurance in manets and wireless sensor networks. 32
Ad hoc networks and RFID (work in progress)
- Ronggong Song, Larry Korba, George Yee:
AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. 33-42 - Weichao Wang, Bharat K. Bhargava:
Key distribution and update for secure inter-group multicast communication. 43-52 - Giovanni Di Crescenzo, Renwei Ge, Gonzalo R. Arce:
Improved topology assumptions for threshold cryptography in mobile ad hoc networks. 53-62 - Sindhu Karthikeyan, Mikhail Nesterenko:
RFID security without extensive cryptography. 63-67
Panel
- Virgil D. Gligor:
Advances in sensor and ad-hoc network security: perspective and status. 68
Sensor networks
- Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi Yoneda:
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment. 69-75 - Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga:
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. 76-88 - Jing Deng, Richard Han, Shivakant Mishra:
Defending against path-based DoS attacks in wireless sensor networks. 89-96
Sensor networks (work in progress)
- Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla:
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes. 97-106 - Michael Manzo, Tanya G. Roosta, Shankar Sastry:
Time synchronization attacks in sensor networks. 107-116 - Yinian Mao, Min Wu:
Coordinated sensor deployment for improving secure communications and sensing coverage. 117-128
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.