Fr. 69.00

Secure Mobile Ad-hoc Networks and Sensors - First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers

Inglese · Tascabile

Spedizione di solito entro 1 a 2 settimane (il titolo viene stampato sull'ordine)

Descrizione

Ulteriori informazioni










Mobile Ad-Hoc Networks and Sensors.- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.- Key Management for Mobile Sensor Networks.- Server-Aided RSA Key Generation Against Collusion Attack.- Hybrid Approach for Secure Mobile Agent Computations.- An XML Standards Based Authorization Framework for Mobile Agents.- Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.- Detecting Impersonation Attacks in Future Wireless and Mobile Networks.- Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.- "Fair" Authentication in Pervasive Computing.- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.- ARMS: An Authenticated Routing Message in Sensor Networks.- Security Analysis and Improvement of Return Routability Protocol.- Dark Encounter Computations.- Panel: Authentication in Constrained Environments.

Sommario

Mobile Ad-Hoc Networks and Sensors.- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network.- Key Management for Mobile Sensor Networks.- Server-Aided RSA Key Generation Against Collusion Attack.- Hybrid Approach for Secure Mobile Agent Computations.- An XML Standards Based Authorization Framework for Mobile Agents.- Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.- Detecting Impersonation Attacks in Future Wireless and Mobile Networks.- Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems.- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.- "Fair" Authentication in Pervasive Computing.- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2.- ARMS: An Authenticated Routing Message in Sensor Networks.- Security Analysis and Improvement of Return Routability Protocol.- Dark Encounter Computations.- Panel: Authentication in Constrained Environments.

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.