04541nam 22008535 450 991048372220332120251226203720.03-540-37863-410.1007/11801412(CKB)1000000000233055(SSID)ssj0000319942(PQKBManifestationID)11272090(PQKBTitleCode)TC0000319942(PQKBWorkID)10338795(PQKB)10997518(DE-He213)978-3-540-37863-1(MiAaPQ)EBC3068237(PPN)123136814(BIP)13592759(BIP)13523421(EXLCZ)99100000000023305520100301d2006 u| 0engurnn|008mamaatxtccrSecure Mobile Ad-hoc Networks and Sensors First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers /edited by Mike Burmester, Alec Yasinsac1st ed. 2006.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2006.1 online resource (X, 193 p.) Computer Communication Networks and Telecommunications,2945-9184 ;4074Bibliographic Level Mode of Issuance: Monograph3-540-36646-6 Includes bibliographical references and index.Mobile Ad-Hoc Networks and Sensors -- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks -- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network -- Key Management for Mobile Sensor Networks -- Server-Aided RSA Key Generation Against Collusion Attack -- Hybrid Approach for Secure Mobile Agent Computations -- An XML Standards Based Authorization Framework for Mobile Agents -- Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results -- Detecting Impersonation Attacks in Future Wireless and Mobile Networks -- Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems -- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks -- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks -- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks -- “Fair” Authentication in Pervasive Computing -- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2 -- ARMS: An Authenticated Routing Message in Sensor Networks -- Security Analysis and Improvement of Return Routability Protocol -- Dark Encounter Computations -- Panel: Authentication in Constrained Environments.This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005, held in Singapore, in September 2005. The book presents 12 revised full papers together with 5 keynote papers and 1 invited paper. These address current topics of all security aspects of constrained network environments with special focus to mobile agents, sensor networks and radio frequency devices.Computer Communication Networks and Telecommunications,2945-9184 ;4074CryptographyData encryption (Computer science)Computer networksAlgorithmsElectronic data processingManagementApplication softwareTelecommunicationCryptologyComputer Communication NetworksAlgorithmsIT OperationsComputer and Information Systems ApplicationsCommunications Engineering, NetworksCryptography.Data encryption (Computer science)Computer networks.Algorithms.Electronic data processingManagement.Application software.Telecommunication.Cryptology.Computer Communication Networks.Algorithms.IT Operations.Computer and Information Systems Applications.Communications Engineering, Networks.005.8Burmester Mike1752264Yasinsac Alec1752265MiAaPQMiAaPQMiAaPQBOOK9910483722203321Secure mobile ad-hoc networks and sensors4187524UNINA