Rene Mayrhofer (auth.), Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore (eds.)3540732748, 9783540732747, 9783540732754
Table of contents :
Front Matter….Pages –
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams….Pages 1-15
The Martini Synch: Joint Fuzzy Hashing Via Error Correction….Pages 16-30
Private Handshakes….Pages 31-42
Security Associations in Personal Networks: A Comparative Analysis….Pages 43-57
Key Establishment in Heterogeneous Self-organized Networks….Pages 58-72
Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes….Pages 73-86
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying….Pages 87-100
Distance Bounding in Noisy Environments….Pages 101-115
Multiple Target Localisation in Sensor Networks with Location Privacy….Pages 116-128
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs….Pages 129-141
“End-by-Hop” Data Integrity….Pages 142-155
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences….Pages 156-171
Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules….Pages 172-186
ALGSICS — Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems….Pages 187-202
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques….Pages 203-217
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators….Pages 218-231
New Strategies for Revocation in Ad-Hoc Networks….Pages 232-246
Back Matter….Pages –
Reviews
There are no reviews yet.