• Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption

  • Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and Assurance

  • Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor Networks

  • A Solution for Wireless Privacy and Payments based on E-cash

  • Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy

  • Short Paper: Schemes for Enhancing the Denial-of-Service Tolerance of SRTP

  • A Privacy Preserving Reputation System for Mobile Information Dissemination Networks

  • Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks

  • On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing

  • A Privacy Service for Context-aware Mobile Computing

  • Securing Topology Maintenance Protocols for Sensor Networks:

  • DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks

  • Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks

  • Improving Cross-domain Authentication overWireless Local Area Networks

  • Reducing Reauthentication Delay in Wireless Networks

  • Protecting Location Privacy Through Path Confusion

  • Short Paper: Location Privacy with IP Mobility

  • Short Paper: Thor - The Hybrid Online Repository

  • A Lightweight RFID Protocol to protect against Traceability and Cloning attacks

  • An RFID Distance Bounding Protocol

  • On the Security of Distributed Position Services

  • Picking Virtual Pockets using Relay Attacks on Contactless Smartcard

  • Security and Privacy Issues in E-passports

  • Short Paper: Fellowship in Mobile Ad hoc Networks

  • Short paper: Random IDs for preserving location privacy

  • Implications of Unlicensed Mobile Access (UMA) for GSM security

  • Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast

  • Spread-Identity mechanisms for DOS resilience and Security.

  • Short Paper: A Secure Interworking Scheme for UMTS-WLAN

  • Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks

  • Short Paper: Dynamic Risk Mitigation for 'Self-defending' Network Security

  • SPINAT: Integrating IPsec into Overlay Routing

  • On the Survivability of Routing Protocols in Ad Hoc Wireless Networks

  • An Efficient Key Management Algorithm for Hierarchical Group Communication

  • A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks

  • A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks

  • Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks

  • An Extensible Environment for Evaluating Secure MANET

  • Short paper: Tri-party TLS Adaptation for Trust Delegation in Home Networks

  • Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices

  • Short Paper: Towards a Location-Aware Role-Based Access Control Model

  • Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation

  • Short Paper: bufSTAT - a tool for early detection and classification of buffer overflow attacks

  • A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network

  • A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems

  • Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices

  • Uniform Framework for Cryptanalysis of the Bluetooth E₀ Cipher

  • MOTET: Mobile Transactions using Electronic Tickets

  • Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information

  • Transaction Processing with mobile collaborative works