Abstract is missing.
- An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocolStanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi. 1-9 [doi]
- An advanced signature system for OLSRDaniele Raffo, Cedric Adjih, Thomas Clausen, Paul Mühlethaler. 10-16 [doi]
- Detection and prevention of MAC layer misbehavior in ad hoc networksAlvaro A. Cárdenas, Svetlana Radosavac, John S. Baras. 17-22 [doi]
- Denial-of-service resistant quality-of-service signaling for mobile ad hoc networksMarek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas. 23-28 [doi]
- Location-aware key management scheme for wireless sensor networksDijiang Huang, Manish Mehta 0003, Deep Medhi, Lein Harn. 29-42 [doi]
- Revisiting random key pre-distribution schemes for wireless sensor networksJoengmin Hwang, Yongdae Kim. 43-52 [doi]
- Connectivity properties of secure wireless sensor networksRoberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan. 53-58 [doi]
- TinyPK: securing sensor networks with public key technologyRonald J. Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus. 59-64 [doi]
- Security in wireless sensor networksJohn A. Stankovic. 65 [doi]
- Reputation-based framework for high integrity sensor networksSaurabh Ganeriwal, Mani B. Srivastava. 66-77 [doi]
- Resilient aggregation in sensor networksDavid Wagner. 78-87 [doi]
- Source-location privacy in energy-constrained sensor network routingCelal Ozturk, Yanyong Zhang, Wade Trappe. 88-93 [doi]
- Towards provable security for ad hoc routing protocolsLevente Buttyán, István Vajda. 94-105 [doi]
- Securing quality-of-service route discovery in on-demand routing for ad hoc networksYih-Chun Hu, David B. Johnson. 106-117 [doi]