Abstract is missing.
- New Research Challenges for the Security of Ad Hoc and Sensor NetworksJean-Pierre Hubaux. 1 [doi]
- Public Key Cryptography in Sensor Networks - RevisitedGunnar Gaubatz, Jens-Peter Kaps, Berk Sunar. 2-18 [doi]
- Exploring Message Authentication in Sensor NetworksHarald Vogt. 19-30 [doi]
- Secure Initialization in Single-Hop Radio NetworksMiroslaw Kutylowski, Wojciech Rutkowski. 31-41 [doi]
- Some Methods for Privacy in RFID CommunicationKenneth P. Fishkin, Sumit Roy, Bing Jiang. 42-53 [doi]
- Ring Signature Schemes for General Ad-Hoc Access StructuresJavier Herranz, Germán Sáez. 54-65 [doi]
- Linking Ad Hoc Charging Schemes to AAAC ArchitecturesJoao Girão, Bernd Lamparter, Dirk Westhoff, Rui L. Aguiar, João Paulo Barraca. 66-81 [doi]
- Blind Spontaneous Anonymous Group Signatures for Ad Hoc GroupsTony K. Chan, Karyin Fung, Joseph K. Liu, Victor K. Wei. 82-94 [doi]
- Security for Interactions in Pervasive Networks: Applicability of Recommendation SystemsSeamus Moloney, Philip Ginzboorg. 95-106 [doi]
- Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDHMark Manulis, Jörg Schwenk. 107-124 [doi]
- Secure Overlay for Service Centric Wireless Sensor NetworksHans-Joachim Hof, Erik-Oliver Blaß, Martina Zitterbart. 125-138 [doi]
- IKE in Ad Hoc IP NetworkingKaisa Nyberg. 139-151 [doi]
- Advanced Detection of Selfish or Malicious Nodes in Ad Hoc NetworksFrank Kargl, Andreas Klenk, Stefan Schlott, Michael Weber. 152-165 [doi]
- A Security Architecture for Mobile Wireless Sensor NetworksStefan Schmidt, Holger Krahn, Stefan Fischer, Dietmar Wätjen. 166-177 [doi]
- Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-onPrakash Reddy, Eamonn O Brien-Strain, Jim Rowson. 178-189 [doi]
- Key Management in Wireless Sensor NetworksYann-Hang Lee, Vikram Phadke, Amit Deshmukh, Jin-Wook Lee. 190-204 [doi]
- SDD: Secure Distributed Diffusion Protocol for Sensor NetworksXiaoyun Wang, Lizhen Yang, Kefei Chen. 205-214 [doi]
- Secure AES Hardware Module for Resource Constrained DevicesElena Trichina, Tymur Korkishko. 215-230 [doi]