Verkauf durch Sack Fachmedien

Yasinsac / Burmester

Secure Mobile Ad-hoc Networks and Sensors

First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers

Medium: Buch
ISBN: 978-3-540-36646-1
Verlag: Springer Berlin Heidelberg
Erscheinungstermin: 24.07.2006
Lieferfrist: bis zu 10 Tage

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005, held in Singapore, in September 2005. The book presents 12 revised full papers together with 5 keynote papers and 1 invited paper. These address current topics of all security aspects of constrained network environments with special focus to mobile agents, sensor networks and radio frequency devices.


Produkteigenschaften


  • Artikelnummer: 9783540366461
  • Medium: Buch
  • ISBN: 978-3-540-36646-1
  • Verlag: Springer Berlin Heidelberg
  • Erscheinungstermin: 24.07.2006
  • Sprache(n): Englisch
  • Auflage: 2006
  • Serie: Computer Communication Networks and Telecommunications
  • Produktform: Kartoniert
  • Gewicht: 324 g
  • Seiten: 193
  • Format (B x H x T): 155 x 235 x 12 mm
  • Ausgabetyp: Kein, Unbekannt

Themen


Autoren/Hrsg.

Herausgeber

Mobile Ad-Hoc Networks and Sensors.- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.- Key Management for Mobile Sensor Networks.- Server-Aided RSA Key Generation Against Collusion Attack.- Hybrid Approach for Secure Mobile Agent Computations.- An XML Standards Based Authorization Framework for Mobile Agents.- Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.- Detecting Impersonation Attacks in Future Wireless and Mobile Networks.- Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.- “Fair” Authentication in Pervasive Computing.- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.- ARMS: An Authenticated Routing Message in Sensor Networks.- Security Analysis and Improvement of Return Routability Protocol.- Dark Encounter Computations.- Panel: Authentication in Constrained Environments.