The Community for Technology Leaders
RSS Icon
Subscribe
Security and Privacy for Emerging Areas in Communications Networks, International Conference on (2005)
Athens, Greece
Sept. 5, 2005 to Sept. 9, 2005
ISBN: 0-7695-2369-2
TABLE OF CONTENTS
Introduction
Session 1: Insecurity
Sandro Grech , Nokia Networks
Pasi Eronen , Nokia Research Center
pp. 3-12
Roberto Di Pietro , Istituto di Scienza e Tecnologie dell?Informazione, Pisa, Italy; Universit`a di Roma "La Sapienza", Roma, Italy
Stefano Chessa , Istituto di Scienza e Tecnologie dell?Informazione, Universit`a di Pisa, Pisa, Italy.
Piero Maestrini , Istituto di Scienza e Tecnologie dell?Informazione, Pisa, Italy; Universit`a di Pisa, Roma, Italy
pp. 13-22
Dhananjay S. Phatak , University of Maryland Baltimore County (UMBC)
pp. 23-34
Xiaoxin Wu , Purdue University
Cristina Nita-Rotaru , Purdue University
pp. 35-46
Session 2: RFID
Ziv Kfir , Tel Aviv University, ISRAEL.
Avishai Wool , Tel Aviv University, ISRAEL
pp. 47-58
Tassos Dimitriou , Athens Information Technology, Athens, Greece
pp. 59-66
Gerhard P. Hancke , University of Cambridge, UK
Markus G. Kuhn , University of Cambridge, UK
pp. 67-73
Ari Juels , RSA Laboratories
David Molnar , UC-Berkeley
David Wagner , UC-Berkeley
pp. 74-88
Session 3: Sensor Networks
Issa Khalil , Purdue University
Saurabh Bagchi , Purdue University
Cristina Nina-Rotaru , Purdue University
pp. 89-100
Andrea Gabrielli , Universit`a di Roma "La Sapienza", Rome, Italy
Luigi V. Mancini , Universit`a di Roma"La Sapienza", Rome, Italy
Sanjeev Setia , George Mason University
Sushil Jajodia , George Mason University
pp. 101-112
Jing Deng , University of Colorado at Boulder
Richard Han , University of Colorado at Boulder
Shivakant Mishra , University of Colorado at Boulder
pp. 113-126
Session 4: Authentication
Hahnsang Kim , INRIA, France
Kang G. Shin , University of Michigan
Walid Dabbous , INRIA, France
pp. 127-138
Tuomas Aura , Microsoft Research, Cambridge, UK
Michael Roe , Microsoft Research, Cambridge, UK
pp. 139-148
Y. Dong , The University of Hong Kong
H. W. Go , The University of Hong Kong
A. F. Sui , The University of Hong Kong
Victor O. K. Li , The University of Hong Kong
Lucas C. K. Hui , The University of Hong Kong
S. M. Yiu , The University of Hong Kong
pp. 149-156
Danfeng Yao , Brown University
Roberto Tamassia , Brown University
Seth Proctor , Sun Microsystems Laboratories
pp. 157-170
Session 5: Privacy
Marco Voss , Darmstadt University of Technology, Darmstadt, Germany
Andreas Heinemann , Darmstadt University of Technology, Darmstadt, Germany
Max Muhlhauser , Darmstadt University of Technology, Darmstadt, Germany
pp. 171-181
Vagner Sacramento , Departamento de Inform?atica, PUC-Rio
Markus Endler , Departamento de Inform?atica, PUC-Rio
Fernando Ney Nascimento , Departamento de Inform?atica, PUC-Rio
pp. 182-193
Aggelos Kiayias , University of Connecticut
Yiannis Tsiounis , Etolian Capital, LP
pp. 206-218
Short Paper Session 1
Rajeev Koodli , Nokia Research Center
Vijay Devarapalli , Nokia Research Center
Hannu Flinck , Nokia Research Center
Charles E. Perkins , Nokia Research Center
pp. 222-224
Venkatesan Balakrishnan , Macquarie University, Sydney Australia
Vijay Varadharajan , Macquarie University, Sydney Australia
pp. 225-227
Yen-Chieh Ouyang , National Chung-Hsing University, Taiwan, Republic of China
Chung-Hua Chu , National Chung-Hsing University, Taiwan, Republic of China
pp. 228-230
Svetlana Radosavac , University of Maryland
Karl Seamon , University of Maryland
John S. Baras , University of Maryland
pp. 231-233
Indrakshi Ray , Colorado State University
Lijun Yu , Colorado State University
pp. 234-236
Khaled MASMOUDI , Institut National des T?l?communications
Mureed HUSSEIN , Universit? Ren? Descartes
Hossam AFIFI , Institut National des T?l?communications
Dominique SERET , Universit? Ren? Descartes
pp. 237-239
Wassim Itani , American University of Beirut
Ayman Kayssi , American University of Beirut
Ali Chehab , American University of Beirut
pp. 240-242
David , Llewellyn-Jones , Liverpool John Moores University
Madjid Merabti , Liverpool John Moores University
Qi Shi , Liverpool John Moores University
Bob Askwith , Liverpool John Moores University
pp. 243-248
Session 6: Key Management
Jyh-How Huang , University of Colorado
Jason Buckingham , University of Colorado
Richard Han , University of Colorado
pp. 249-260
Amir A. Sayegh , McMaster University, Hamilton, Canada
Mahmoud T. El-Hadidi , Cairo University, Cairo, Egypt
pp. 261-269
H. Ragab Hassan , Compiegne University of Technology, France
A. Bouabdallah , Compiegne University of Technology, France
H. Bettahar , Compiegne University of Technology, France
Y. Challal , Compiegne University of Technology, France
pp. 270-276
David S?nchez S?nchez , Philips Research Laboratories Aachen
Heribert Baldus , Philips Research Laboratories Aachen
pp. 277-288
Jing Deng , University of Colorado at Boulder
Carl Hartung , University of Colorado at Boulder
Richard Han , University of Colorado at Boulder
Shivakant Mishra , University of Colorado at Boulde
pp. 289-302
Session 7: Routing
Ioannis Pavlosoglou , University of Warwick, UK
Mark Leeson , University of Warwick, UK
Roger Green , University of Warwick, U
pp. 303-314
Jukka Ylitalo , Ericsson Research NomadicLab, Finland
Patrik Salmela , Ericsson Research NomadicLab, Finland
Hannes Tschofenig , Siemens, Germany
pp. 315-326
Baruch Awerbuch , Johns Hopkins University
Reza Curtmola , Johns Hopkins University
David Holmer , Johns Hopkins University
Herbert Rubens , Johns Hopkins University
Cristina Nita-Rotaru , Purdue University
pp. 327-338
Yongguang Zhang , HRL Laboratories, LLC
Yi-an Huang , Georgia Institute of Technology
Wenke Lee , Georgia Institute of Technology
pp. 339-352
Session 8: Cryptographic Algorithms and Protocols
Caimu Tang , Univ. of Southern California
Anthony T. Chronopoulos , Univ. of Texas, San Antonio
Cauligi S. Raghavendra , Univ. of Southern California
pp. 353-364
Ophir Levy , Tel Aviv University, Israel
Avishai Wool , Tel Aviv University, Israel
pp. 365-373
Daniele Quercia , University College London
Stephen Hailes , University College London
pp. 374-383
Short Paper Session 2
Li Zhou , University of California, Riverside
Jinfeng Ni , University of California, Riverside
Chinya V. Ravishankar , University of California, Riverside
pp. 397-399
Roberto Di Pietro , Universit`a di Roma "La Sapienza", Italy
Antonio Durante , Universit`a di Roma "La Sapienza", Italy
Luigi Mancini , Universit`a di Roma "La Sapienza", Italy
Vishwas Patil , Universit`a di Roma "La Sapienza", Italy
pp. 400-402
Katrin Hoeper , University of Waterloo, Ontario, Canada
Guang Gong , University of Waterloo, Ontario, Canada
pp. 403-405
Daniel Socek , Florida Atlantic University
Shujun Li , City University of Hong Kong
Spyros S. Magliveras , Florida Atlantic University
Borko Furht , Florida Atlantic University
pp. 406-407
Sachin Garg , Avaya Labs Research
Navjot Singh , Avaya Labs Research
Timothy Tsai , Sun Microsystems
pp. 409-411
Timothy W. van der Horst , Brigham Young University
Kent E. Seamons , Brigham Young University
pp. 412-414
Stefan Schlott , University of Ulm
Frank Kargl , University of Ulm
Michael Weber , University of Ulm
pp. 415-417
Yu Liu , Stevens Institute of Technology
Yang Li , Stevens Institute of Technology
Hong Man , Stevens Institute of Technology
pp. 418-420
Author Index
Author Index (PDF)
pp. 425-426
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool