On Trust Evaluation in Mobile Ad Hoc Networks / Dang Quan Nguyen ; Louise Lamont ; Peter G. Mason |
A Distributed Data Storage Scheme for Sensor Networks / Abhishek Parakh ; Subhash Kak |
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications / Stephen Badan ; Julien Probst ; Markus Jaton ; Damien Vionnet ; Jean-Frédéric Wagen ; Gérald Litzistorf |
A Robust Conditional Privacy-Preserving Authentication Protocol in Vanet / Chae Duk Jung ; Chul Sur ; Youngho Park ; Kyurig-Hyune Rhee |
An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response / Daniel M. Hein ; Ronald Toegl |
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-certified Public Key System / Qingshui Xue ; Fengying Li ; Yuan Zhou ; Jiping Zhang ; Zhenfu Cao ; Haifeng Qian |
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms / Xinwen Zhang ; Onur Aciiçmez ; Jean-Pierre Seifert |
Context-Aware Monitoring of Untrusted Mobile Applications / Andrew Brown ; Mark Ryan |
Extending the Belgian eID Technology with Mobile Security Functionality / Jorn Lapon ; Bram Verdegem ; Pieter Verhaeghe ; Vincent Naessens ; Bart De Decker |
Filtering SPAM in P2PSIP Communities with Web of Trust / Juho Heikkilä ; Andrei Gurtov |
Generating Random and Pseudorandom Sequences in Mobile Devices / Jan Krhovjak ; Vashek Matyas ; Jiri Zizkovsky |
A Context-Aware Security Framework for Next Generation Mobile Networks / Matteo Bandinelli ; Federica Paganelli ; Gianluca Vannuccini ; Dino Giuli |
Information Reconciliation Using Reliability in Secret Key Agreement Scheme with Espar Antenna / Takayuki Shimizu ; Hisato Iwai ; Hideichi Sasaoka |
Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol / Michelle Graham ; David Gray |
Providing Strong Security and High Privacy in Low-Cost RFID Networks / Mathieu David ; Neeli R. Prasad |
Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using Wsns / Gianni Fenu ; Gary Steri |
Savah: Source Address Validation with Host Identity Protocol / Dmitriy Kuptsov |
Secure Service Invocation in a Peer-to-Peer Environment Using Jxta-Soap / Maria Chiara Laghi ; Michele Amoretti ; Gianni Conte |
Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications / Mike Meyerstein ; Inhyok Cha ; Yogendra Shah |
Simple Peer-to-Peer SIP Privacy / Joakim Koskela ; Sasu Tarkoma |
On Modeling Viral Diffusion in Heterogeneous Wireless Networks / Hoai-Nam Nguyen ; Yoichi Shinoda |
Mobile WiMAX Network Security / Rainer Falk ; Christian Günther ; Dirk Kröselberg ; Avi Lior |
LoPSiL: A Location-Based Policy-Specification Language / Jay Ligatti ; Billy Rickey ; Nalin Saigal |
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications / Reiner Dojen ; Vladimir Pasca ; Tom Coffey |
Author Index |
On Trust Evaluation in Mobile Ad Hoc Networks / Dang Quan Nguyen ; Louise Lamont ; Peter G. Mason |
A Distributed Data Storage Scheme for Sensor Networks / Abhishek Parakh ; Subhash Kak |
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications / Stephen Badan ; Julien Probst ; Markus Jaton ; Damien Vionnet ; Jean-Frédéric Wagen ; Gérald Litzistorf |
A Robust Conditional Privacy-Preserving Authentication Protocol in Vanet / Chae Duk Jung ; Chul Sur ; Youngho Park ; Kyurig-Hyune Rhee |
An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response / Daniel M. Hein ; Ronald Toegl |
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-certified Public Key System / Qingshui Xue ; Fengying Li ; Yuan Zhou ; Jiping Zhang ; Zhenfu Cao ; Haifeng Qian |