Message from EAI President regarding COVID-19

Thousands of EUDL articles are free to download thanks to the support from EAI, Europe's largest not-for-profit research community dedicated to employing the latest developments in information technology to build a greener, healthier and smarter world. EAI membership is free! Consider donating to help EAI's vision grow by engaging world's brightest minds to build a better future regardless of their age, economic status or country of origin. Learn more at www.eai.eu or donate by clicking the accompanying link.

X
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
SECURECOMM 2005
PERVASIVETRUST 2005SECQOS 2005CNFR 2005SECOVAL 2005
Other Years
SECURECOMM 2005SECURECOMM 2006SECURECOMM 2007SECURECOMM 2008SECURECOMM 2009SECURECOMM 2010SECURECOMM 2011SECURECOMM 2012SECURECOMM 2013SECURECOMM 2014SECURECOMM 2014SECURECOMM 2015SECURECOMM 2016SECURECOMM & ATCS & SEPRIOT 2017SECURECOMM 2017
Ethics and Malpractice Statement

    SECURECOMM

    1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

    The focus of this conference is two-fold:Security and Privacy in wireless, mobile, ad hoc, sensor, personal-area and RFID networks and Security and Privacy in pervasive and ubiquitous computing. The conference aims to bring together academic, industrial and government researchers, practitioners, st…

    The focus of this conference is two-fold:Security and Privacy in wireless, mobile, ad hoc, sensor, personal-area and RFID networks and Security and Privacy in pervasive and ubiquitous computing. The conference aims to bring together academic, industrial and government researchers, practitioners, standards developers and policy makers.

    more »
    Editor(s): Imrich Chlamtac (CreateNet Research Institute) and Krishna Sivalingam (Univ. of Maryland, Baltimore County (UMBC))
    Publisher
    IEEE
    ISBN
    0-7695-2369-2
    Conference dates
    5th–9th Sep 2005
    Location
    Athens, Greece
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2021 IEEE

    Ordered by title or year
    Showing 1–50 of 50 results
    Page size: 102550
    • 1
    • A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      D.S. Sanchez, H. Baldus
    • A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Jyh-How Huang, J. Buckingham, R. Han
    • A Lightweight RFID Protocol to protect against Traceability and Cloning attacks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      T. Dimitriou
    • A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      A.A. Sayegh, M.T. El-Hadidi
    • A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Jing Deng, C. Hartung, R. Han, S. Mishra
    • A Privacy Preserving Reputation System for Mobile Information Dissemination Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      M. Voss, A. Heinemann, M. Muhlhauser
    • A Privacy Service for Context-aware Mobile Computing

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      V. Sacramento, M. Endler, F.N. Nascimento
    • A Solution for Wireless Privacy and Payments based on E-cash

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      A. Karygiannis, A. Kiayias, Y. Tsiounis
    • An Efficient Key Management Algorithm for Hierarchical Group Communication

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      H.R. Hassan, A. Bouabdallah, H. Bettahar, Y. Challal
    • An Extensible Environment for Evaluating Secure MANET

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Yongguang Zhang, Yi-an Huang, Wenke Lee
    • An RFID Distance Bounding Protocol

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      G.P. Hancke, M.G. Kuhn
    • Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      I. Pavlosoglou, R. Green, M. Leeson
    • Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      R. Di Pietro, P. Maestrini, S. Chessa
    • Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Jing Deng, S. Mishra, R. Han
    • DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      I. Khalil, S. Bagchi, C. Nina-Rotaru
    • Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      U. Hengartner, P. Steenkiste
    • Implications of Unlicensed Mobile Access (UMA) for GSM security

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      S. Grech, P. Eronen
    • Improving Cross-domain Authentication overWireless Local Area Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Hahnsang Kim, K.G. Shin, W. Dabbous
    • MOTET: Mobile Transactions using Electronic Tickets

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      D. Quercia, S. Hailes
    • On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Danfeng Yao, R. Tamassia, S. Proctor
    • On the Security of Distributed Position Services

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Xiaoxin Wu, C. Nita-Rotaru
    • On the Survivability of Routing Protocols in Ad Hoc Wireless Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      B. Awerbuch, R. Curtmola, D. Holmer, H. Rubens, C. Nita-Rotaru
    • Picking Virtual Pockets using Relay Attacks on Contactless Smartcard

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Z. Kfir, A. Wool
    • Protecting Location Privacy Through Path Confusion

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Baik Hoh, M. Gruteser
    • Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Y. Dong, H.W. Go, A.F. Sui, V.O.K. Li, L.C.K. Hui, S.M. Yiu
    • Reducing Reauthentication Delay in Wireless Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      T. Aura, M. Roe
    • SPINAT: Integrating IPsec into Overlay Routing

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      J. Ylitalo, P. Salmela, H. Tschofenig
    • Securing Topology Maintenance Protocols for Sensor Networks:

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      A. Gabrielli, L.V. Mancini, S. Setia, S. Jajodia
    • Security and Privacy Issues in E-passports

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      A. Juels, D. Wagner, D. Molnar
    • Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Yu Liu, Hong Man , Yang Li
    • Short Paper: A Secure Interworking Scheme for UMTS-WLAN

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Yen-Chieh Ouyang, Chung-Hua Chu
    • Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and Assurance

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      T. Daniels, M. Mina, S.F. Russell
    • Short Paper: Dynamic Risk Mitigation for 'Self-defending' Network Security

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      N. Bambos
    • Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      D. Socek, Li Shujun, S.S. Magliveras, B. Furht
    • Short Paper: Fellowship in Mobile Ad hoc Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      V. Balakrishnan, V. Varadharajan
    • Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Li Zhou, Jinfeng Ni, C.V. Ravishankar
    • Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      D. Llewellyn-Jones, M. Merabti, Qi Shi , B. Askwith
    • Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      K. Hoeper, Guang Gong
    • Short Paper: Location Privacy with IP Mobility

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      R. Koodli, V. Devarapalli, H. Flinck, C.E. Perkins
    • Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      W. Itani, A. Kayssi, A. Chehab
    • Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      R. Di Pietro, A. Durante, L. Mancini, V. Patil
    • Short Paper: Schemes for Enhancing the Denial-of-Service Tolerance of SRTP

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      S. Garg, N. Singh, T. Tsai
    • Short Paper: Thor - The Hybrid Online Repository

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      T.W. van der Horst, K.E. Seamons
    • Short Paper: Towards a Location-Aware Role-Based Access Control Model

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      I. Ray, Lijun Yu
    • Short Paper: bufSTAT - a tool for early detection and classification of buffer overflow attacks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      S. Radosavac, K. Seamon, J.S. Baras
    • Short paper: Random IDs for preserving location privacy

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      S. Schlott, F. Kargl, M. Weber
    • Short paper: Tri-party TLS Adaptation for Trust Delegation in Home Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      K. Masmoudi, M. Hussein, H. Afifi, D. Seret
    • Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Caimu Tang, A.T. Chronopoulos, C.S. Raghavendra
    • Spread-Identity mechanisms for DOS resilience and Security.

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      D.S. Phatak
    • Uniform Framework for Cryptanalysis of the Bluetooth E₀ Cipher

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      O. Levy, A. Wool
    • 1
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico