Sign in
ESAS
2004
2005
2006
2007
2004
2007
Keyphrases
Publications
2007
Leif Uhsadel
,
Axel Poschmann
,
Christof Paar
Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes.
ESAS
(2007)
Johann van der Merwe
,
Dawoud S. Dawoud
,
Stephen McDonald
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying.
ESAS
(2007)
Stephen Farrell
,
Christian Damsgaard Jensen
"End-by-Hop" Data Integrity.
ESAS
(2007)
Ben Smyth
,
Mark Ryan
,
Liqun Chen
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators.
ESAS
(2007)
Gelareh Taban
,
Reihaneh Safavi-Naini
Key Establishment in Heterogeneous Self-organized Networks.
ESAS
(2007)
Christoph Krauß
,
Frederic Stumpf
,
Claudia Eckert
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques.
ESAS
(2007)
Matthew Roughan
,
Jon Arnold
Multiple Target Localisation in Sensor Networks with Location Privacy.
ESAS
(2007)
Saikat Chakrabarti
,
Santosh Chandrasekhar
,
Mukesh Singhal
,
Kenneth L. Calvert
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences.
ESAS
(2007)
Ulrich Großmann
,
Enrik Berkhan
,
Luciana C. Jatoba
,
Jörg Ottenbacher
,
Wilhelm Stork
,
Klaus D. Müller-Glaser
Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules.
ESAS
(2007)
Neil Bird
,
Claudine Conrado
,
Jorge Guajardo
,
Stefan Maubach
,
Geert Jan Schrijen
,
Boris Skoric
,
Anton M. H. Tombeur
,
Peter Thueringer
,
Pim Tuyls
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems.
ESAS
(2007)
Darko Kirovski
,
Mike Sinclair
,
David Wilson
The Martini Synch: Joint Fuzzy Hashing Via Error Correction.
ESAS
(2007)
Rene Mayrhofer
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams.
ESAS
(2007)
Tyler Moore
,
Jolyon Clulow
,
Shishir Nagaraja
,
Ross J. Anderson
New Strategies for Revocation in Ad-Hoc Networks.
ESAS
(2007)
Jaap-Henk Hoepman
Private Handshakes.
ESAS
(2007)
Jani Suomalainen
,
Jukka Valkonen
,
N. Asokan
Security Associations in Personal Networks: A Comparative Analysis.
ESAS
(2007)
Levente Buttyán
,
Tamás Holczer
,
István Vajda
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs.
ESAS
(2007)
Dave Singelée
,
Bart Preneel
Distance Bounding in Noisy Environments.
ESAS
(2007)
volume 4572, 2007
Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings
ESAS
4572 (2007)
2006
Subhas Kumar Ghosh
On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks.
ESAS
(2006)
Pim Tuyls
Grey-Box Cryptography: Physical Unclonable Functions.
ESAS
(2006)
Sepideh Fouladgar
,
Bastien Mainaud
,
Khaled Masmoudi
,
Hossam Afifi
Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks.
ESAS
(2006)
Samuel Galice
,
Marine Minier
,
John Mullins
,
Stéphane Ubéda
Cryptographic Protocol to Establish Trusted History of Interactions.
ESAS
(2006)
Frederik Armknecht
,
Joao Girão
,
Marc Ph. Stoecklin
,
Dirk Westhoff
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks.
ESAS
(2006)
Julien Bringer
,
Hervé Chabanne
On the Wiretap Channel Induced by Noisy Tags.
ESAS
(2006)
Lejla Batina
,
Nele Mentens
,
Kazuo Sakiyama
,
Bart Preneel
,
Ingrid Verbauwhede
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks.
ESAS
(2006)
Elmar Schoch
,
Frank Kargl
,
Tim Leinmüller
,
Stefan Schlott
,
Panos Papadimitratos
Impact of Pseudonym Changes on Geographic Routing in VANETs.
ESAS
(2006)
Joao Girão
,
Miquel Martin
Two's Company, Three Is a Crowd: A Group-Admission Protocol for WSNs.
ESAS
(2006)
Baruch Awerbuch
,
Robert G. Cole
,
Reza Curtmola
,
David Holmer
,
Herbert Rubens
Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol.
ESAS
(2006)
Jolyon Clulow
,
Gerhard P. Hancke
,
Markus G. Kuhn
,
Tyler Moore
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks.
ESAS
(2006)
Jukka Valkonen
,
N. Asokan
,
Kaisa Nyberg
Ad Hoc Security Associations for Groups.
ESAS
(2006)
Gina Kounga
,
Thomas Walter
Identification in Infrastructureless Networks.
ESAS
(2006)
Jean-Pierre Hubaux
Security and Cooperation in Wireless Networks.
ESAS
(2006)
Bartlomiej Sieka
Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks.
ESAS
(2006)
Zinaida Benenson
,
Felix C. Freiling
,
Birgit Pfitzmann
,
Christian Rohner
,
Michael Waidner
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
ESAS
(2006)
volume 4357, 2006
Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers
ESAS
4357 (2006)
2005
Mark Shaneck
,
Karthikeyan Mahadevan
,
Vishal Kher
,
Yongdae Kim
Remote Software-Based Attestation for Wireless Sensors.
ESAS
(2005)
Joseph K. Liu
,
Patrick P. Tsang
,
Duncan S. Wong
Efficient Verifiable Ring Encryption for Ad Hoc Groups.
ESAS
(2005)
Matija Puzar
,
Jon Andersson
,
Thomas Plagemann
,
Yves Roudier
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations.
ESAS
(2005)
Jin Kwak
,
Keunwoo Rhee
,
Soohyun Oh
,
Seungjoo Kim
,
Dongho Won
RFID System with Fairness Within the Framework of Security and Privacy.
ESAS
(2005)
Jeonil Kang
,
DaeHun Nyang
RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks.
ESAS
(2005)
Erik Dahmen
,
Katsuyuki Okeya
,
Tsuyoshi Takagi
An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices.
ESAS
(2005)
Levente Buttyán
,
László Dóra
,
István Vajda
Statistical Wormhole Detection in Sensor Networks.
ESAS
(2005)
Levente Buttyán
,
Tamás Holczer
,
Péter Schaffer
Spontaneous Cooperation in Multi-domain Sensor Networks.
ESAS
(2005)
Gergely Ács
,
Levente Buttyán
,
István Vajda
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks.
ESAS
(2005)
Katsuyuki Okeya
,
Tetsu Iwata
Side Channel Attacks on Message Authentication Codes.
ESAS
(2005)
Ford-Long Wong
,
Frank Stajano
Location Privacy in Bluetooth.
ESAS
(2005)
Sang-Soo Yeo
,
Sung Kwon Kim
Scalable and Flexible Privacy Protection Scheme for RFID Systems.
ESAS
(2005)
volume 3813, 2005
Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers
ESAS
3813 (2005)
volume 3313, 2005
Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers
ESAS
3313 (2005)
2004
Seamus Moloney
,
Philip Ginzboorg
Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems.
ESAS
(2004)