Secure mobile ad hoc networks and sensors
Authors
Parameters
More about the book
InhaltsverzeichnisMobile Ad-Hoc Networks and Sensors.Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.Key Management for Mobile Sensor Networks.Server-Aided RSA Key Generation Against Collusion Attack.Hybrid Approach for Secure Mobile Agent Computations.An XML Standards Based Authorization Framework for Mobile Agents.Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.Detecting Impersonation Attacks in Future Wireless and Mobile Networks.Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.“Fair” Authentication in Pervasive Computing.Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.ARMS: An Authenticated Routing Message in Sensor Networks.Security Analysis and Improvement of Return Routability Protocol.Dark Encounter Computations.Panel: Authentication in Constrained Environments.
Book purchase
Secure mobile ad hoc networks and sensors, Mike Burmester
- Language
- Released
- 2006
Payment methods
- Title
- Secure mobile ad hoc networks and sensors
- Language
- English
- Authors
- Mike Burmester
- Publisher
- Springer
- Released
- 2006
- ISBN10
- 3540366466
- ISBN13
- 9783540366461
- Series
- Lecture notes in computer science
- Category
- University and college textbooks
- Description
- InhaltsverzeichnisMobile Ad-Hoc Networks and Sensors.Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.Key Management for Mobile Sensor Networks.Server-Aided RSA Key Generation Against Collusion Attack.Hybrid Approach for Secure Mobile Agent Computations.An XML Standards Based Authorization Framework for Mobile Agents.Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.Detecting Impersonation Attacks in Future Wireless and Mobile Networks.Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.“Fair” Authentication in Pervasive Computing.Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.ARMS: An Authenticated Routing Message in Sensor Networks.Security Analysis and Improvement of Return Routability Protocol.Dark Encounter Computations.Panel: Authentication in Constrained Environments.