Buch, Englisch, 250 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 400 g
Reihe: Computer Communication Networks and Telecommunications
4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings
Buch, Englisch, 250 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 400 g
Reihe: Computer Communication Networks and Telecommunications
ISBN: 978-3-540-73274-7
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Programmierung: Methoden und Allgemeines
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
Weitere Infos & Material
Device Pairing.- The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams.- The Martini Synch: Joint Fuzzy Hashing Via Error Correction.- Private Handshakes.- Security Associations in Personal Networks: A Comparative Analysis.- Key Management.- Key Establishment in Heterogeneous Self-organized Networks.- Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes.- Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying.- Location Verification and Location Privacy.- Distance Bounding in Noisy Environments.- Multiple Target Localisation in Sensor Networks with Location Privacy.- On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs.- Secure Routing and Forwarding.- “End-by-Hop” Data Integrity.- Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences.- Physical Security.- Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules.- ALGSICS — Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems.- Detection of Compromise, and Revocation.- Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques.- Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators.- New Strategies for Revocation in Ad-Hoc Networks.