Abstract is missing.
- Implications of Unlicensed Mobile Access (UMA) for GSM securitySandro Grech, Pasi Eronen. 3-12 [doi]
- Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in MulticastRoberto Di Pietro, Stefano Chessa, Piero Maestrini. 13-22 [doi]
- Spread-Identity mechanisms for DOS resilience and SecurityDhananjay S. Phatak. 23-34 [doi]
- On the Security of Distributed Position ServicesXiaoxin Wu, Cristina Nita-Rotaru. 35-46 [doi]
- Picking Virtual Pockets using Relay Attacks on Contactless SmartcardZiv Kfir, Avishai Wool. 47-58 [doi]
- A Lightweight RFID Protocol to protect against Traceability and Cloning attacksTassos Dimitriou. 59-66 [doi]
- An RFID Distance Bounding ProtocolGerhard P. Hancke, Markus G. Kuhn. 67-73 [doi]
- Security and Privacy Issues in E-passportsAri Juels, David Molnar, David Wagner. 74-88 [doi]
- DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor NetworksIssa M. Khalil, Saurabh Bagchi, Cristina Nita-Rotaru. 89-100 [doi]
- Securing Topology Maintenance Protocols for Sensor NetworksAndrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia. 101-112 [doi]
- Countermeasures Against Traffic Analysis Attacks in Wireless Sensor NetworksJing Deng, Richard Han, Shivakant Mishra. 113-126 [doi]
- Improving Cross-domain Authentication overWireless Local Area NetworksHahnsang Kim, Kang G. Shin, Walid Dabbous. 127-138 [doi]
- Reducing Reauthentication Delay in Wireless NetworksTuomas Aura, Michael Roe. 139-148 [doi]
- Providing Distributed Certificate Authority Service in Mobile Ad Hoc NetworksY. Dong, H. W. Go, Ai Fen Sui, Victor O. K. Li, Lucas Chi Kwong Hui, Siu-Ming Yiu. 149-156 [doi]
- On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous ComputingDanfeng Yao, Roberto Tamassia, Seth Proctor. 157-170 [doi]
- A Privacy Preserving Reputation System for Mobile Information Dissemination NetworksMarco Voss, Andreas Heinemann, Max Mühlhäuser. 171-181 [doi]
- A Privacy Service for Context-aware Mobile ComputingVagner Sacramento, Markus Endler, Fernando N. Nascimento. 182-193 [doi]
- Protecting Location Privacy Through Path ConfusionBaik Hoh, Marco Gruteser. 194-205 [doi]
- A Solution for Wireless Privacy and Payments based on E-cashA. Karygiannis, Aggelos Kiayias, Yiannis Tsiounis. 206-218 [doi]
- Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and AssuranceThomas E. Daniels, Mani Mina, Steve Russell. 219-221 [doi]
- Short Paper: Location Privacy with IP MobilityRajeev Koodli, Vijay Devarapalli, Hannu Flinck, Charles E. Perkins. 222-224 [doi]
- Short Paper: Fellowship in Mobile Ad hoc NetworksVenkatesan Balakrishnan, Vijay Varadharajan. 225-227 [doi]
- Short Paper: A Secure Interworking Scheme for UMTS-WLANYen Chieh Ouyang, Chung-Hua Chu. 228-230 [doi]
- Short Paper: bufSTAT - a tool for early detection and classification of buffer overflow attacksSvetlana Radosavac, Karl Seamon, John S. Baras. 231-233 [doi]
- Short Paper: Towards a Location-Aware Role-Based Access Control ModelIndrakshi Ray, Lijun Yu. 234-236 [doi]
- Short paper: Tri-party TLS Adaptation for Trust Delegation in Home NetworksKhaled Masmoudi, Mureed Hussain, Hossam Afifi, Dominique Seret. 237-239 [doi]
- Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless DevicesWassim Itani, Ayman I. Kayssi, Ali Chehab. 240-242 [doi]
- Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code PropagationDavid Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith. 243-248 [doi]
- A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor NetworkJyh-How Huang, Jason Buckingham, Richard Han. 249-260 [doi]
- A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth SystemsAmir A. Sayegh, Mahmoud T. El-Hadidi. 261-269 [doi]
- An Efficient Key Management Algorithm for Hierarchical Group CommunicationH. Ragab Hassan, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal. 270-276 [doi]
- A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor NetworksDavid Sánchez Sánchez, Heribert Baldus. 277-288 [doi]
- A Practical Study of Transitory Master Key Establishment ForWireless Sensor NetworksJing Deng, Carl Hartung, Richard Han, Shivakant Mishra. 289-302 [doi]
- Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc NetworksIoannis Pavlosoglou, Mark S. Leeson, Roger J. Green. 303-314 [doi]
- SPINAT: Integrating IPsec into Overlay RoutingJukka Ylitalo, Patrik Salmela, Hannes Tschofenig. 315-326 [doi]
- On the Survivability of Routing Protocols in Ad Hoc Wireless NetworksBaruch Awerbuch, Reza Curtmola, David Holmer, Herbert Rubens, Cristina Nita-Rotaru. 327-338 [doi]
- An Extensible Environment for Evaluating Secure MANETYongguang Zhang, Yi-an Huang, Wenke Lee. 339-352 [doi]
- Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power DevicesCaimu Tang, Anthony T. Chronopoulos, Cauligi S. Raghavendra. 353-364 [doi]
- Uniform Framework for Cryptanalysis of the Bluetooth E₀ CipherOphir Levy, Avishai Wool. 365-373 [doi]
- MOTET: Mobile Transactions using Electronic TicketsDaniele Quercia, Stephen Hailes. 374-383 [doi]
- Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing InformationUrs Hengartner, Peter Steenkiste. 384-396 [doi]
- Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor NetworksLi Zhou, Jinfeng Ni, Chinya V. Ravishankar. 397-399 [doi]
- Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward SecrecyRoberto Di Pietro, Antonio Durante, Luigi V. Mancini, Vishwas Patil. 400-402 [doi]
- Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc NetworksKatrin Hoeper, Guang Gong. 403-405 [doi]
- Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image EncryptionDaniel Socek, Shujun Li, Spyros S. Magliveras, Borko Furht. 406-407 [doi]
- Short Paper: Schemes for Enhancing the Denial-of-Service Tolerance of SRTPSachin Garg, Navjot Singh, Timothy K. Tsai. 409-411 [doi]
- Short Paper: Thor - The Hybrid Online RepositoryTimothy W. van der Horst, Kent E. Seamons. 412-414 [doi]
- Short paper: Random IDs for preserving location privacyStefan Schlott, Frank Kargl, Michael Weber 0001. 415-417 [doi]
- Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc NetworksYu Liu, Yang Li, Hong Man. 418-420 [doi]
- Short Paper: Dynamic Risk Mitigation for 'Self-defending' Network SecurityNicholas Bambos. 421-424 [doi]