Security and Privacy in Ad-hoc and Sensor Networks
Springer Berlin (Verlag)
978-3-540-73274-7 (ISBN)
Device Pairing.- The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams.- The Martini Synch: Joint Fuzzy Hashing Via Error Correction.- Private Handshakes.- Security Associations in Personal Networks: A Comparative Analysis.- Key Management.- Key Establishment in Heterogeneous Self-organized Networks.- Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes.- Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying.- Location Verification and Location Privacy.- Distance Bounding in Noisy Environments.- Multiple Target Localisation in Sensor Networks with Location Privacy.- On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs.- Secure Routing and Forwarding.- "End-by-Hop" Data Integrity.- Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences.- Physical Security.- Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules.- ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems.- Detection of Compromise, and Revocation.- Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques.- Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators.- New Strategies for Revocation in Ad-Hoc Networks.
Erscheint lt. Verlag | 22.6.2007 |
---|---|
Reihe/Serie | Computer Communication Networks and Telecommunications | Lecture Notes in Computer Science |
Zusatzinfo | X, 250 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 399 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Ad-Hoc Networks • Algorithm analysis and problem complexity • algorithms • anonymity • authentication • Bluetooth • computer network security • cryptographic protocols • cryptography • Group Communication • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Intrusion Detection • Key Management • mobile networks • Mobile Security • Networks • Network Security • P2P networks • pervasive networks • privacy • protocol attacks • Public Key Cryptography • Radio-Frequency Identification (RFID) • RFID • RFID (Radio Frequency Identificatio) • Routing • Secure Communications • Secure Networking • security • security architecture • self-organized networks • sensor networks • SIGNATUR • Systems Security • Trusted Platform Module • wireless networks |
ISBN-10 | 3-540-73274-8 / 3540732748 |
ISBN-13 | 978-3-540-73274-7 / 9783540732747 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich