Security and Privacy in Ad-Hoc and Sensor Networks

Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers

Editors:

ISBN: 978-3-540-69172-3 (Print) 978-3-540-69173-0 (Online)

Table of contents (16 chapters)

  1. Front Matter

    Pages -

  2. Abstracts of Invited Talks

    1. No Access

      Book Chapter

      Pages 1-2

      Security and Cooperation in Wireless Networks

    2. No Access

      Book Chapter

      Pages 3-5

      Grey-Box Cryptography: Physical Unclonable Functions

  3. Regular Papers

    1. No Access

      Book Chapter

      Pages 6-17

      Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks

    2. No Access

      Book Chapter

      Pages 18-31

      Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks

    3. No Access

      Book Chapter

      Pages 32-42

      Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks

    4. No Access

      Book Chapter

      Pages 43-57

      Impact of Pseudonym Changes on Geographic Routing in VANETs

    5. No Access

      Book Chapter

      Pages 58-69

      Identification in Infrastructureless Networks

    6. No Access

      Book Chapter

      Pages 70-82

      Two’s Company, Three Is a Crowd: A Group-Admission Protocol for WSNs

    7. No Access

      Book Chapter

      Pages 83-97

      So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks

    8. No Access

      Book Chapter

      Pages 98-112

      Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol

    9. No Access

      Book Chapter

      Pages 113-120

      On the Wiretap Channel Induced by Noisy Tags

    10. No Access

      Book Chapter

      Pages 121-135

      On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks

    11. No Access

      Book Chapter

      Pages 136-149

      Cryptographic Protocol to Establish Trusted History of Interactions

    12. No Access

      Book Chapter

      Pages 150-164

      Ad Hoc Security Associations for Groups

    13. No Access

      Book Chapter

      Pages 165-178

      Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks

    14. No Access

      Book Chapter

      Pages 179-192

      Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks

  4. Back Matter

    Pages -