LEADER 04637nam 22007815 450 001 996465864603316 005 20200703190000.0 010 $a3-540-37863-4 024 7 $a10.1007/11801412 035 $a(CKB)1000000000233055 035 $a(SSID)ssj0000319942 035 $a(PQKBManifestationID)11272090 035 $a(PQKBTitleCode)TC0000319942 035 $a(PQKBWorkID)10338795 035 $a(PQKB)10997518 035 $a(DE-He213)978-3-540-37863-1 035 $a(MiAaPQ)EBC3068237 035 $a(PPN)123136814 035 $a(EXLCZ)991000000000233055 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecure Mobile Ad-hoc Networks and Sensors$b[electronic resource] $eFirst International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers /$fedited by Mike Burmester, Alec Yasinsac 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (X, 193 p.) 225 1 $aComputer Communication Networks and Telecommunications ;$v4074 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-36646-6 320 $aIncludes bibliographical references and index. 327 $aMobile Ad-Hoc Networks and Sensors -- Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks -- A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network -- Key Management for Mobile Sensor Networks -- Server-Aided RSA Key Generation Against Collusion Attack -- Hybrid Approach for Secure Mobile Agent Computations -- An XML Standards Based Authorization Framework for Mobile Agents -- Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results -- Detecting Impersonation Attacks in Future Wireless and Mobile Networks -- Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems -- Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks -- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks -- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks -- ?Fair? Authentication in Pervasive Computing -- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2 -- ARMS: An Authenticated Routing Message in Sensor Networks -- Security Analysis and Improvement of Return Routability Protocol -- Dark Encounter Computations -- Panel: Authentication in Constrained Environments. 410 0$aComputer Communication Networks and Telecommunications ;$v4074 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aApplication software 606 $aElectrical engineering 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aApplication software. 615 0$aElectrical engineering. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCommunications Engineering, Networks. 676 $a005.8 702 $aBurmester$b Mike$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYasinsac$b Alec$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465864603316 996 $aSecure Mobile Ad-hoc Networks and Sensors$9772785 997 $aUNISA