The Community for Technology Leaders
RSS Icon
Subscribe
Security and Privacy for Emerging Areas in Communications Networks, International Conference on (2005)
Athens, Greece
Sept. 5, 2005 to Sept. 9, 2005
ISBN: 0-7695-2369-2
TABLE OF CONTENTS
Introduction
Session 1: Insecurity
Sandro Grech , Nokia Networks
Pasi Eronen , Nokia Research Center
pp. 3-12
Roberto Di Pietro , Istituto di Scienza e Tecnologie dell?Informazione, Pisa, Italy; Universit`a di Roma "La Sapienza", Roma, Italy
Piero Maestrini , Istituto di Scienza e Tecnologie dell?Informazione, Pisa, Italy; Universit`a di Pisa, Roma, Italy
pp. 13-22
Dhananjay S. Phatak , University of Maryland Baltimore County (UMBC)
pp. 23-34
Xiaoxin Wu , Purdue University
Cristina Nita-Rotaru , Purdue University
pp. 35-46
Session 2: RFID
Ziv Kfir , Tel Aviv University, ISRAEL.
Avishai Wool , Tel Aviv University, ISRAEL
pp. 47-58
Tassos Dimitriou , Athens Information Technology, Athens, Greece
pp. 59-66
Gerhard P. Hancke , University of Cambridge, UK
pp. 67-73
David Molnar , UC-Berkeley
Ari Juels , RSA Laboratories
pp. 74-88
Session 3: Sensor Networks
Andrea Gabrielli , Universit`a di Roma "La Sapienza", Rome, Italy
Luigi V. Mancini , Universit`a di Roma"La Sapienza", Rome, Italy
Sanjeev Setia , George Mason University
Sushil Jajodia , George Mason University
pp. 101-112
Richard Han , University of Colorado at Boulder
Shivakant Mishra , University of Colorado at Boulder
pp. 113-126
Session 4: Authentication
Kang G. Shin , University of Michigan
Hahnsang Kim , INRIA, France
pp. 127-138
Tuomas Aura , Microsoft Research, Cambridge, UK
Michael Roe , Microsoft Research, Cambridge, UK
pp. 139-148
Y. Dong , The University of Hong Kong
H. W. Go , The University of Hong Kong
A. F. Sui , The University of Hong Kong
Victor O. K. Li , The University of Hong Kong
Lucas C. K. Hui , The University of Hong Kong
S. M. Yiu , The University of Hong Kong
pp. 149-156
Session 5: Privacy
Marco Voss , Darmstadt University of Technology, Darmstadt, Germany
Andreas Heinemann , Darmstadt University of Technology, Darmstadt, Germany
Max Muhlhauser , Darmstadt University of Technology, Darmstadt, Germany
pp. 171-181
Markus Endler , Departamento de Inform?atica, PUC-Rio
Vagner Sacramento , Departamento de Inform?atica, PUC-Rio
pp. 182-193
Aggelos Kiayias , University of Connecticut
Yiannis Tsiounis , Etolian Capital, LP
pp. 206-218
Short Paper Session 1
Rajeev Koodli , Nokia Research Center
Vijay Devarapalli , Nokia Research Center
Hannu Flinck , Nokia Research Center
Charles E. Perkins , Nokia Research Center
pp. 222-224
Venkatesan Balakrishnan , Macquarie University, Sydney Australia
pp. 225-227
Yen-Chieh Ouyang , National Chung-Hsing University, Taiwan, Republic of China
Chung-Hua Chu , National Chung-Hsing University, Taiwan, Republic of China
pp. 228-230
Mureed HUSSEIN , Universit? Ren? Descartes
Khaled MASMOUDI , Institut National des T?l?communications
Dominique SERET , Universit? Ren? Descartes
pp. 237-239
Wassim Itani , American University of Beirut
Ayman Kayssi , American University of Beirut
Ali Chehab , American University of Beirut
pp. 240-242
Madjid Merabti , Liverpool John Moores University
Qi Shi , Liverpool John Moores University
David , Llewellyn-Jones , Liverpool John Moores University
pp. 243-248
Session 6: Key Management
Jyh-How Huang , University of Colorado
Jason Buckingham , University of Colorado
Richard Han , University of Colorado
pp. 249-260
A. Bouabdallah , Compiegne University of Technology, France
H. Bettahar , Compiegne University of Technology, France
Y. Challal , Compiegne University of Technology, France
pp. 270-276
Carl Hartung , University of Colorado at Boulder
Richard Han , University of Colorado at Boulder
Jing Deng , University of Colorado at Boulder
pp. 289-302
Session 7: Routing
Patrik Salmela , Ericsson Research NomadicLab, Finland
Hannes Tschofenig , Siemens, Germany
pp. 315-326
Reza Curtmola , Johns Hopkins University
David Holmer , Johns Hopkins University
Herbert Rubens , Johns Hopkins University
Cristina Nita-Rotaru , Purdue University
pp. 327-338
Yi-an Huang , Georgia Institute of Technology
Yongguang Zhang , HRL Laboratories, LLC
pp. 339-352
Session 8: Cryptographic Algorithms and Protocols
Ophir Levy , Tel Aviv University, Israel
Avishai Wool , Tel Aviv University, Israel
pp. 365-373
Daniele Quercia , University College London
pp. 374-383
Short Paper Session 2
Jinfeng Ni , University of California, Riverside
Chinya V. Ravishankar , University of California, Riverside
pp. 397-399
Antonio Durante , Universit`a di Roma "La Sapienza", Italy
Roberto Di Pietro , Universit`a di Roma "La Sapienza", Italy
Vishwas Patil , Universit`a di Roma "La Sapienza", Italy
pp. 400-402
Katrin Hoeper , University of Waterloo, Ontario, Canada
Guang Gong , University of Waterloo, Ontario, Canada
pp. 403-405
Shujun Li , City University of Hong Kong
Spyros S. Magliveras , Florida Atlantic University
Borko Furht , Florida Atlantic University
pp. 406-407
Navjot Singh , Avaya Labs Research
Timothy Tsai , Sun Microsystems
pp. 409-411
Timothy W. van der Horst , Brigham Young University
pp. 412-414
Frank Kargl , University of Ulm
Michael Weber , University of Ulm
pp. 415-417
Yang Li , Stevens Institute of Technology
Yu Liu , Stevens Institute of Technology
pp. 418-420
Author Index
Author Index (PDF)
pp. 425-426
8 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool