SecureComm C

51 papers

YearTitle / Authors
2005A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks.
David Sánchez Sánchez, Heribert Baldus
2005A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network.
Jyh-How Huang, Jason Buckingham, Richard Han
2005A Lightweight RFID Protocol to protect against Traceability and Cloning attacks.
Tassos Dimitriou
2005A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems.
Amir A. Sayegh, Mahmoud T. El-Hadidi
2005A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks.
Jing Deng, Carl Hartung, Richard Han, Shivakant Mishra
2005A Privacy Preserving Reputation System for Mobile Information Dissemination Networks.
Marco Voss, Andreas Heinemann, Max Mühlhäuser
2005A Privacy Service for Context-aware Mobile Computing.
Vagner J. do Sacramento Rodrigues, Markus Endler, Fernando N. Nascimento
2005A Solution for Wireless Privacy and Payments based on E-cash.
A. Karygiannis, Aggelos Kiayias, Yiannis Tsiounis
2005An Efficient Key Management Algorithm for Hierarchical Group Communication.
H. Ragab Hassan, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal
2005An Extensible Environment for Evaluating Secure MANET.
Yongguang Zhang, Yi-an Huang, Wenke Lee
2005An RFID Distance Bounding Protocol.
Gerhard P. Hancke, Markus G. Kuhn
2005Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks.
Ioannis Pavlosoglou, Mark S. Leeson, Roger J. Green
2005Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast.
Roberto Di Pietro, Stefano Chessa, Piero Maestrini
2005Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks.
Jing Deng, Richard Han, Shivakant Mishra
2005DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks.
Issa M. Khalil, Saurabh Bagchi, Cristina Nita-Rotaru
2005Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information.
Urs Hengartner, Peter Steenkiste
2005First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005
2005Implications of Unlicensed Mobile Access (UMA) for GSM security.
Sandro Grech, Pasi Eronen
2005Improving Cross-domain Authentication overWireless Local Area Networks.
Hahnsang Kim, Kang G. Shin, Walid Dabbous
2005MOTET: Mobile Transactions using Electronic Tickets.
Daniele Quercia, Stephen Hailes
2005On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing.
Danfeng Yao, Roberto Tamassia, Seth Proctor
2005On the Security of Distributed Position Services.
Xiaoxin Wu, Cristina Nita-Rotaru
2005On the Survivability of Routing Protocols in Ad Hoc Wireless Networks.
Baruch Awerbuch, Reza Curtmola, David Holmer, Herbert Rubens, Cristina Nita-Rotaru
2005Picking Virtual Pockets using Relay Attacks on Contactless Smartcard.
Ziv Kfir, Avishai Wool
2005Protecting Location Privacy Through Path Confusion.
Baik Hoh, Marco Gruteser
2005Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks.
Y. Dong, H. W. Go, Ai Fen Sui, Victor O. K. Li, Lucas Chi Kwong Hui, Siu-Ming Yiu
2005Reducing Reauthentication Delay in Wireless Networks.
Tuomas Aura, Michael Roe
2005SPINAT: Integrating IPsec into Overlay Routing.
Jukka Ylitalo, Patrik Salmela, Hannes Tschofenig
2005Securing Topology Maintenance Protocols for Sensor Networks.
Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia
2005Security and Privacy Issues in E-passports.
Ari Juels, David Molnar, David A. Wagner
2005Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks.
Yu Liu, Yang Li, Hong Man
2005Short Paper: A Secure Interworking Scheme for UMTS-WLAN.
Yen-Chieh Ouyang, Chung-Hua Chu
2005Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and Assurance.
Thomas E. Daniels, Mani Mina, Steve Russell
2005Short Paper: Dynamic Risk Mitigation for 'Self-defending' Network Security.
Nicholas Bambos
2005Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption.
Daniel Socek, Shujun Li, Spyros S. Magliveras, Borko Furht
2005Short Paper: Fellowship in Mobile Ad hoc Networks.
Venkatesan Balakrishnan, Vijay Varadharajan
2005Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor Networks.
Li Zhou, Jinfeng Ni, Chinya V. Ravishankar
2005Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation.
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith
2005Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks.
Katrin Hoeper, Guang Gong
2005Short Paper: Location Privacy with IP Mobility.
Rajeev Koodli, Vijay Devarapalli, Hannu Flinck, Charles E. Perkins
2005Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices.
Wassim Itani, Ayman I. Kayssi, Ali Chehab
2005Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy.
Roberto Di Pietro, Antonio Durante, Luigi V. Mancini, Vishwas Patil
2005Short Paper: Schemes for Enhancing the Denial-of-Service Tolerance of SRTP.
Sachin Garg, Navjot Singh, Timothy K. Tsai
2005Short Paper: Thor - The Hybrid Online Repository.
Timothy W. van der Horst, Kent E. Seamons
2005Short Paper: Towards a Location-Aware Role-Based Access Control Model.
Indrakshi Ray, Lijun Yu
2005Short Paper: bufSTAT - a tool for early detection and classification of buffer overflow attacks.
Svetlana Radosavac, Karl Seamon, John S. Baras
2005Short paper: Random IDs for preserving location privacy.
Stefan Schlott, Frank Kargl, Michael Weber
2005Short paper: Tri-party TLS Adaptation for Trust Delegation in Home Networks.
Khaled Masmoudi, Mureed Hussain, Hossam Afifi, Dominique Seret
2005Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices.
Caimu Tang, Anthony T. Chronopoulos, Cauligi S. Raghavendra
2005Spread-Identity mechanisms for DOS resilience and Security.
Dhananjay S. Phatak
2005Uniform Framework for Cryptanalysis of the Bluetooth E₀ Cipher.
Ophir Levy, Avishai Wool