04637nam 22007815 450 99646586460331620200703190000.03-540-37863-410.1007/11801412(CKB)1000000000233055(SSID)ssj0000319942(PQKBManifestationID)11272090(PQKBTitleCode)TC0000319942(PQKBWorkID)10338795(PQKB)10997518(DE-He213)978-3-540-37863-1(MiAaPQ)EBC3068237(PPN)123136814(EXLCZ)99100000000023305520100301d2006 u| 0engurnn|008mamaatxtccrSecure Mobile Ad-hoc Networks and Sensors[electronic resource] First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers /edited by Mike Burmester, Alec Yasinsac1st ed. 2006.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2006.1 online resource (X, 193 p.) Computer Communication Networks and Telecommunications ;4074Bibliographic Level Mode of Issuance: Monograph3-540-36646-6 Includes bibliographical references and index.Mobile Ad-Hoc Networks and Sensors -- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks -- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network -- Key Management for Mobile Sensor Networks -- Server-Aided RSA Key Generation Against Collusion Attack -- Hybrid Approach for Secure Mobile Agent Computations -- An XML Standards Based Authorization Framework for Mobile Agents -- Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results -- Detecting Impersonation Attacks in Future Wireless and Mobile Networks -- Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems -- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks -- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks -- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks -- “Fair” Authentication in Pervasive Computing -- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2 -- ARMS: An Authenticated Routing Message in Sensor Networks -- Security Analysis and Improvement of Return Routability Protocol -- Dark Encounter Computations -- Panel: Authentication in Constrained Environments.Computer Communication Networks and Telecommunications ;4074Data encryption (Computer science)Computer communication systemsAlgorithmsManagement information systemsComputer scienceApplication softwareElectrical engineeringCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Communications Engineering, Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/T24035Data encryption (Computer science).Computer communication systems.Algorithms.Management information systems.Computer science.Application software.Electrical engineering.Cryptology.Computer Communication Networks.Algorithm Analysis and Problem Complexity.Management of Computing and Information Systems.Information Systems Applications (incl. Internet).Communications Engineering, Networks.005.8Burmester Mikeedthttp://id.loc.gov/vocabulary/relators/edtYasinsac Alecedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465864603316Secure Mobile Ad-hoc Networks and Sensors772785UNISA