Skip to main content
  • Conference proceedings
  • © 2006

Secure Mobile Ad-hoc Networks and Sensors

First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4074)

Part of the book sub series: Computer Communication Networks and Telecommunications (LNCCN)

Conference series link(s): MADNES: International Workshop on Secure Mobile Ad-hoc Networks and Sensors

Conference proceedings info: MADNES 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 papers)

  1. Front Matter

  2. Mobile Ad-Hoc Networks and Sensors

    1. A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network

      • Jong Sou Park, Mohammed Golam Sadi, Dong Seong Kim, Young Deog Song
      Pages 2-13
    2. Key Management for Mobile Sensor Networks

      • David Sánchez Sánchez, Heribert Baldus
      Pages 14-26
    3. Server-Aided RSA Key Generation Against Collusion Attack

      • Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen
      Pages 27-37
    4. Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results

      • Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong
      Pages 67-79
    5. Detecting Impersonation Attacks in Future Wireless and Mobile Networks

      • Michel Barbeau, Jyanthi Hall, Evangelos Kranakis
      Pages 80-95
    6. Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems

      • Jacek Cichoń, Łukasz Krzywiecki, Mirosław Kutyłowski, Paweł Wlaź
      Pages 96-109
    7. How to Generate Universally Verifiable Signatures in Ad-Hoc Networks

      • KyungKeun Lee, JoongHyo Oh, SangJae Moon
      Pages 118-131
    8. “Fair” Authentication in Pervasive Computing

      • Jun Li, Bruce Christianson, Martin Loomes
      Pages 132-143
    9. Cryptanalysis of the Energy Efficient Stream Ciphers SSC2

      • Yunyi Liu, Tuanfa Qin, Wansun Ni, Shuyi Zhang
      Pages 144-157
    10. ARMS: An Authenticated Routing Message in Sensor Networks

      • Suk-Bok Lee, Yoon-Hwa Choi
      Pages 158-173
    11. Security Analysis and Improvement of Return Routability Protocol

      • Ying Qiu, Jianying Zhou, Robert Deng
      Pages 174-181
    12. Dark Encounter Computations

      • René Peralta
      Pages 182-185
    13. Panel: Authentication in Constrained Environments

      • Mike Burmester, Virgil Gligor, Evangelos Kranakis, Doug Tygar, Yuliang Zheng
      Pages 186-191
  3. Back Matter

Other Volumes

  1. Secure Mobile Ad-hoc Networks and Sensors

Editors and Affiliations

  • Florida State University, Tallahassee, USA

    Mike Burmester

  • University of South Alabama, Mobile, USA

    Alec Yasinsac

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access