About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
SECURECOMM 2005
PERVASIVETRUST 2005SECQOS 2005CNFR 2005SECOVAL 2005
Other Years
SECURECOMM 2005SECURECOMM 2006SECURECOMM 2007SECURECOMM 2008SECURECOMM 2009SECURECOMM 2010SECURECOMM 2011SECURECOMM 2012SECURECOMM 2013SECURECOMM 2014SECURECOMM 2014SECURECOMM 2015SECURECOMM 2016SECURECOMM & ATCS & SEPRIOT 2017SECURECOMM 2017SECURECOMM 2021
Ethics and Malpractice Statement

    SECURECOMM

    1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

    The focus of this conference is two-fold:Security and Privacy in wireless, mobile, ad hoc, sensor, personal-area and RFID networks and Security and Privacy in pervasive and ubiquitous computing. The conference aims to bring together academic, industrial and government researchers, practitioners, st…

    The focus of this conference is two-fold:Security and Privacy in wireless, mobile, ad hoc, sensor, personal-area and RFID networks and Security and Privacy in pervasive and ubiquitous computing. The conference aims to bring together academic, industrial and government researchers, practitioners, standards developers and policy makers.

    more »
    Editor(s): Imrich Chlamtac (CreateNet Research Institute) and Krishna Sivalingam (Univ. of Maryland, Baltimore County (UMBC))
    Publisher
    IEEE
    ISBN
    0-7695-2369-2
    Conference dates
    5th–9th Sep 2005
    Location
    Athens, Greece
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 IEEE

    Ordered by title or year
    Showing 1–10 of 50 results
    Page size: 102550
    • 1
    • 2
    • 3
    • 4
    • 5
    • Next
    • Last
    • A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      D.S. Sanchez, H. Baldus
    • A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Jyh-How Huang, J. Buckingham, R. Han
    • A Lightweight RFID Protocol to protect against Traceability and Cloning attacks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      T. Dimitriou
    • A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      A.A. Sayegh, M.T. El-Hadidi
    • A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Jing Deng, C. Hartung, R. Han, S. Mishra
    • A Privacy Preserving Reputation System for Mobile Information Dissemination Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      M. Voss, A. Heinemann, M. Muhlhauser
    • A Privacy Service for Context-aware Mobile Computing

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      V. Sacramento, M. Endler, F.N. Nascimento
    • A Solution for Wireless Privacy and Payments based on E-cash

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      A. Karygiannis, A. Kiayias, Y. Tsiounis
    • An Efficient Key Management Algorithm for Hierarchical Group Communication

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      H.R. Hassan, A. Bouabdallah, H. Bettahar, Y. Challal
    • An Extensible Environment for Evaluating Secure MANET

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Yongguang Zhang, Yi-an Huang, Wenke Lee
    • 1
    • 2
    • 3
    • 4
    • 5
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL