Abstract is missing.
- Efficient key establishment for group-based wireless sensor deploymentsLi Zhou, Jinfeng Ni, Chinya V. Ravishankar. 1-10 [doi]
- Group-based key pre-distribution in wireless sensor networksDonggang Liu, Peng Ning, Wenliang Du. 11-20 [doi]
- Fully self-organized peer-to-peer key management for mobile ad hoc networksJohann van der Merwe, Dawoud S. Dawoud, Stephen McDonald. 21-30 [doi]
- The security of vehicular networksJean-Pierre Hubaux. 31-32 [doi]
- A framework for MAC protocol misbehavior detection in wireless networksSvetlana Radosavac, John S. Baras, Iordanis Koutsopoulos. 33-42 [doi]
- Hotspot-based traceback for mobile ad hoc networksYi-an Huang, Wenke Lee. 43-54 [doi]
- Emergent properties in ad-hoc networks: a security perspectiveVirgil D. Gligor. 55 [doi]
- Privacy enhanced cellular access securityGeir M. Køien. 57-66 [doi]
- Strengthening EPC tags against cloningAri Juels. 67-76 [doi]
- Modeling epidemic spreading in mobile environmentsJames W. Mickens, Brian D. Noble. 77-86 [doi]
- Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networksJiejun Kong, Zhengrong Ji, Weichao Wang, Mario Gerla, Rajive Bagrodia, Bharat K. Bhargava. 87-96 [doi]
- Secure time synchronization service for sensor networksSaurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, Mani B. Srivastava. 97-106 [doi]