![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
MADNES 2005: Singapore
- Mike Burmester, Alec Yasinsac:
Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers. Lecture Notes in Computer Science 4074, Springer 2006, ISBN 3-540-36646-6 - Virgil D. Gligor:
Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks. 1 - Jong Sou Park, Mohammed Golam Sadi, Dong Seong Kim, Young Deog Song:
A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network. 2-13 - David Sánchez Sánchez, Heribert Baldus:
Key Management for Mobile Sensor Networks. 14-26 - Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen:
Server-Aided RSA Key Generation Against Collusion Attack. 27-37 - Jeffrey Todd McDonald:
Hybrid Approach for Secure Mobile Agent Computations. 38-53 - Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong:
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results. 67-79 - Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis:
Detecting Impersonation Attacks in Future Wireless and Mobile Networks. 80-95 - Jacek Cichon
, Lukasz Krzywiecki
, Miroslaw Kutylowski, Pawel Wlaz:
Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems. 96-109 - Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. 110-116 - Yuliang Zheng
:
Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks. 117 - KyungKeun Lee, JoongHyo Oh, Sang-Jae Moon:
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks. 118-131 - Jun Li, Bruce Christianson
, Martin J. Loomes:
"Fair" Authentication in Pervasive Computing. 132-143 - Yunyi Liu, Tuanfa Qin, Wansun Ni, Shuyi Zhang:
Cryptanalysis of the Energy Efficient Stream Ciphers SSC2. 144-157 - Suk-Bok Lee, Yoon-Hwa Choi:
ARMS: An Authenticated Routing Message in Sensor Networks. 158-173 - Ying Qiu, Jianying Zhou, Robert H. Deng
:
Security Analysis and Improvement of Return Routability Protocol. 174-181 - René Peralta
:
Dark Encounter Computations. 182-185 - Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng
:
Panel: Authentication in Constrained Environments. 186-191
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.