LEADER 06475nam 22008175 450 001 996465571303316 005 20220601002753.0 010 $a3-540-31615-9 024 7 $a10.1007/11601494 035 $a(CKB)1000000000213564 035 $a(SSID)ssj0000319944 035 $a(PQKBManifestationID)11214975 035 $a(PQKBTitleCode)TC0000319944 035 $a(PQKBWorkID)10347223 035 $a(PQKB)11349662 035 $a(DE-He213)978-3-540-31615-2 035 $a(MiAaPQ)EBC3068372 035 $a(PPN)12309903X 035 $a(EXLCZ)991000000000213564 100 $a20100409d2005 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity and Privacy in Ad-hoc and Sensor Networks$b[electronic resource] $eSecond European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers /$fedited by Refik Molva, Gene Tsudik, Dirk Westhoff 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (VIII, 219 p.) 225 1 $aComputer Communication Networks and Telecommunications ;$v3813 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-30912-8 320 $aIncludes bibliographical references and index. 327 $aEfficient Verifiable Ring Encryption for Ad Hoc Groups -- SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations -- Remote Software-Based Attestation for Wireless Sensors -- Spontaneous Cooperation in Multi-domain Sensor Networks -- Authenticated Queries in Sensor Networks -- Improving Sensor Network Security with Information Quality -- One-Time Sensors: A Novel Concept to Mitigate Node-Capture Attacks -- Randomized Grid Based Scheme for Wireless Sensor Network -- Influence of Falsified Position Data on Geographic Ad-Hoc Routing -- Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks -- Statistical Wormhole Detection in Sensor Networks -- RFID System with Fairness Within the Framework of Security and Privacy -- Scalable and Flexible Privacy Protection Scheme for RFID Systems -- RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks -- Location Privacy in Bluetooth -- An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices -- Side Channel Attacks on Message Authentication Codes. 330 $aIt was a pleasure to take part in the 2005 European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005), held on July 13?14 in Visegrad (Hungary) in conjunction with the First International Conference on Wireless Internet (WICON) . As Program Co-chairs, we are very happy with the outcome of this year?s ESAS workshop. It clearly demonstrates the continued importance, popularity and timeliness of the workshop?s topic: security and privacy in adhoc and sensor networks. A total of 51 full papers were submitted. Each submission was reviewed by at least three expert referees. After a short period of intense discussions and deliberations, the Program Committee selected 17 papers for presentation and subsequent publication in the workshop proceedings. This corresponds to an acceptance rate of 33% ? a respectable rate by any measure. First and foremost, we thank the authors of ALL submitted papers. Your confidence in this venue is much appreciated. We hope that you will continue patronizing ESAS as authors and attendees. We are also very grateful to our colleagues in the research community who served on the ESAS Program Committee. Your selfless dedication is what makes the workshop a success. Finally, we are very grateful to the ESAS Steering Group: Levente Buttyan, Claude Castelluccia, Dirk Westho? and Susanne Wetzel. They had the vision and the drive to create this workshop in the first place; they also provided many insights and lots of help with this year?s event. We especially acknowledge and appreciate the work of Levente Buttyan whose dedication (as Steering Committee member, PC member and Local Arrangements Chair) played a very important role in the success of the workshop. 410 0$aComputer Communication Networks and Telecommunications ;$v3813 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aApplication software 606 $aElectrical engineering 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aApplication software. 615 0$aElectrical engineering. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCommunications Engineering, Networks. 676 $a005.8 702 $aMolva$b Refik$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTsudik$b Gene$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWesthoff$b Dirk$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aEuropean Workshop on Security and Privacy in Ad-Hoc and Sensor Networks 906 $aBOOK 912 $a996465571303316 996 $aSecurity and Privacy in Ad-hoc and Sensor Networks$9772210 997 $aUNISA