LEADER 04541nam 22008535 450 001 9910483722203321 005 20251226203720.0 010 $a3-540-37863-4 024 7 $a10.1007/11801412 035 $a(CKB)1000000000233055 035 $a(SSID)ssj0000319942 035 $a(PQKBManifestationID)11272090 035 $a(PQKBTitleCode)TC0000319942 035 $a(PQKBWorkID)10338795 035 $a(PQKB)10997518 035 $a(DE-He213)978-3-540-37863-1 035 $a(MiAaPQ)EBC3068237 035 $a(PPN)123136814 035 $a(BIP)13592759 035 $a(BIP)13523421 035 $a(EXLCZ)991000000000233055 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecure Mobile Ad-hoc Networks and Sensors $eFirst International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers /$fedited by Mike Burmester, Alec Yasinsac 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (X, 193 p.) 225 1 $aComputer Communication Networks and Telecommunications,$x2945-9184 ;$v4074 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-36646-6 320 $aIncludes bibliographical references and index. 327 $aMobile Ad-Hoc Networks and Sensors -- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks -- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network -- Key Management for Mobile Sensor Networks -- Server-Aided RSA Key Generation Against Collusion Attack -- Hybrid Approach for Secure Mobile Agent Computations -- An XML Standards Based Authorization Framework for Mobile Agents -- Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results -- Detecting Impersonation Attacks in Future Wireless and Mobile Networks -- Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems -- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks -- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks -- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks -- ?Fair? Authentication in Pervasive Computing -- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2 -- ARMS: An Authenticated Routing Message in Sensor Networks -- Security Analysis and Improvement of Return Routability Protocol -- Dark Encounter Computations -- Panel: Authentication in Constrained Environments. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005, held in Singapore, in September 2005. The book presents 12 revised full papers together with 5 keynote papers and 1 invited paper. These address current topics of all security aspects of constrained network environments with special focus to mobile agents, sensor networks and radio frequency devices. 410 0$aComputer Communication Networks and Telecommunications,$x2945-9184 ;$v4074 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aAlgorithms 606 $aElectronic data processing$xManagement 606 $aApplication software 606 $aTelecommunication 606 $aCryptology 606 $aComputer Communication Networks 606 $aAlgorithms 606 $aIT Operations 606 $aComputer and Information Systems Applications 606 $aCommunications Engineering, Networks 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aAlgorithms. 615 0$aElectronic data processing$xManagement. 615 0$aApplication software. 615 0$aTelecommunication. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aAlgorithms. 615 24$aIT Operations. 615 24$aComputer and Information Systems Applications. 615 24$aCommunications Engineering, Networks. 676 $a005.8 701 $aBurmester$b Mike$01752264 701 $aYasinsac$b Alec$01752265 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483722203321 996 $aSecure mobile ad-hoc networks and sensors$94187524 997 $aUNINA