Normal view MARC view ISBD view

Secure Mobile Ad-hoc Networks and Sensors [electronic resource] :First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers / edited by Mike Burmester, Alec Yasinsac.

by Burmester, Mike [editor.]; Yasinsac, Alec [editor.]; SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 4074Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.Description: X, 193 p. Also available online. online resource.ISBN: 9783540378631.Subject(s): Computer science | Computer Communication Networks | Data encryption (Computer science) | Computer software | Information systems | Information Systems | Telecommunication | Computer Science | Computer Communication Networks | Data Encryption | Algorithm Analysis and Problem Complexity | Management of Computing and Information Systems | Information Systems Applications (incl.Internet) | Communications Engineering, NetworksDDC classification: 004.6 Online resources: Click here to access online
Contents:
Mobile Ad-Hoc Networks and Sensors -- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks -- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network -- Key Management for Mobile Sensor Networks -- Server-Aided RSA Key Generation Against Collusion Attack -- Hybrid Approach for Secure Mobile Agent Computations -- An XML Standards Based Authorization Framework for Mobile Agents -- Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results -- Detecting Impersonation Attacks in Future Wireless and Mobile Networks -- Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems -- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks -- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks -- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks -- “Fair” Authentication in Pervasive Computing -- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2 -- ARMS: An Authenticated Routing Message in Sensor Networks -- Security Analysis and Improvement of Return Routability Protocol -- Dark Encounter Computations -- Panel: Authentication in Constrained Environments.
In: Springer eBooksSummary: This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005, held in Singapore, in September 2005. The 12 revised full papers presented together with 5 keynote papers and 1 invited paper were carefully reviewed and selected from a total of 33 submissions. The papers address current topics of all security aspects of constrained network environments with special focus to mobile agents, sensor networks and radio frequency (RF) devices.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
MAIN LIBRARY
TK5105.5-5105.9 (Browse shelf) Available

Mobile Ad-Hoc Networks and Sensors -- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks -- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network -- Key Management for Mobile Sensor Networks -- Server-Aided RSA Key Generation Against Collusion Attack -- Hybrid Approach for Secure Mobile Agent Computations -- An XML Standards Based Authorization Framework for Mobile Agents -- Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results -- Detecting Impersonation Attacks in Future Wireless and Mobile Networks -- Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems -- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks -- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks -- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks -- “Fair” Authentication in Pervasive Computing -- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2 -- ARMS: An Authenticated Routing Message in Sensor Networks -- Security Analysis and Improvement of Return Routability Protocol -- Dark Encounter Computations -- Panel: Authentication in Constrained Environments.

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005, held in Singapore, in September 2005. The 12 revised full papers presented together with 5 keynote papers and 1 invited paper were carefully reviewed and selected from a total of 33 submissions. The papers address current topics of all security aspects of constrained network environments with special focus to mobile agents, sensor networks and radio frequency (RF) devices.

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha