Abstract is missing.
- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc NetworksVirgil D. Gligor. 1 [doi]
- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor NetworkJong Sou Park, Mohammed Golam Sadi, Dong Seong Kim, Young Deog Song. 2-13 [doi]
- Key Management for Mobile Sensor NetworksDavid Sánchez Sánchez, Heribert Baldus. 14-26 [doi]
- Server-Aided RSA Key Generation Against Collusion AttackYun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen. 27-37 [doi]
- Hybrid Approach for Secure Mobile Agent ComputationsJ. Todd McDonald. 38-53 [doi]
- An XML Standards Based Authorization Framework for Mobile AgentsGuillermo Navarro, Joan Borrell. 54-66 [doi]
- Distributed Data Mining Protocols for Privacy: A Review of Some Recent ResultsRebecca N. Wright, Zhiqiang Yang, Sheng Zhong. 67-79 [doi]
- Detecting Impersonation Attacks in Future Wireless and Mobile NetworksMichel Barbeau, Jeyanthi Hall, Evangelos Kranakis. 80-95 [doi]
- Anonymous Distribution of Encryption Keys in Cellular Broadcast SystemsJacek Cichon, Lukasz Krzywiecki, Miroslaw Kutylowski, Pawel Wlaz. 96-109 [doi]
- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless NetworksJun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo. 110-116 [doi]
- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc NetworksYuliang Zheng. 117 [doi]
- How to Generate Universally Verifiable Signatures in Ad-Hoc NetworksKyungKeun Lee, JoongHyo Oh, Sang-Jae Moon. 118-131 [doi]
- Fair Authentication in Pervasive ComputingJun Li, Bruce Christianson, Martin Loomes. 132-143 [doi]
- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2Yunyi Liu, Tuanfa Qin, Wansun Ni, Shuyi Zhang. 144-157 [doi]
- ARMS: An Authenticated Routing Message in Sensor NetworksSuk-Bok Lee, Yoon-Hwa Choi. 158-173 [doi]
- Security Analysis and Improvement of Return Routability ProtocolYing Qiu, Jianying Zhou, Robert H. Deng. 174-181 [doi]
- Dark Encounter ComputationsRené Peralta. 182-185 [doi]
- Panel: Authentication in Constrained EnvironmentsMike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng. 186-191 [doi]