Security and Privacy in Ad-Hoc and Sensor Networks (Record no. 179385)

MARC details
000 -LEADER
fixed length control field 05199nam a22006735i 4500
001 - CONTROL NUMBER
control field 978-3-540-69173-0
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125552.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2006 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540691730
-- 978-3-540-69173-0
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/11964254
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA268
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM083000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.824
Edition number 23
245 10 - TITLE STATEMENT
Title Security and Privacy in Ad-Hoc and Sensor Networks
Medium [electronic resource] :
Remainder of title Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers /
Statement of responsibility, etc edited by Levente Buttyan, Virgil Gligor, Dirk Westhoff.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2006.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2006.
300 ## - PHYSICAL DESCRIPTION
Extent X, 198 p.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Computer Communication Networks and Telecommunications,
International Standard Serial Number 2945-9184 ;
Volume number/sequential designation 4357
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Abstracts of Invited Talks -- Security and Cooperation in Wireless Networks -- Grey-Box Cryptography: Physical Unclonable Functions -- Regular Papers -- Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks -- Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks -- Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks -- Impact of Pseudonym Changes on Geographic Routing in VANETs -- Identification in Infrastructureless Networks -- Two’s Company, Three Is a Crowd: A Group-Admission Protocol for WSNs -- So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks -- Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol -- On the Wiretap Channel Induced by Noisy Tags -- On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks -- Cryptographic Protocol to Establish Trusted History of Interactions -- Ad Hoc Security Associations for Groups -- Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks -- Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks.
520 ## - SUMMARY, ETC.
Summary, etc Theseproceedingscontainthepapersofthe3rdEuropeanWorkshoponSecurity and Privacy in Ad Hoc and Sensor Networks (ESAS 2006), which was held in Hamburg, Germany, September 20–21, 2006, in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). This year, a total of 44 full papers were submitted to ESAS. Each subm- ted paper was reviewed by at least three expert referees. After a short period of discussion and deliberation, the Program Committee selected 14 papers for presentation and subsequent publication in the workshop proceedings. This c- responds to an acceptance rate of 32% – a respectable rate by any measure. In addition to the presented papers, this year’s workshop also featured two keynote speeches and seven project presentations. In the ?rst keynote, Jean-Pierre Hubaux (EPFL) gave an overview of “Security and Cooperation in WirelessNetworks”.ThesecondkeynotewasgivenbyPimTuyls(Philips)onthe interesting topic of “Grey-Box Cryptography: Physical Unclonable Functions”. The project presentations covered the following European Projects: S3MS, SeVeCom, BIONETS, CASCADAS, MOBIUS, EYES and UbiSecSens. Unf- tunately, the extended abstracts of these presentations could not be included in the proceedings. As the Chairs of ESAS 2006, we are very happy with the outcome of the workshop that clearly demonstrates the continued importance, popularity, and timeliness of the topic: Security and Privacy in Ad Hoc and Sensor Networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks .
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Algorithms.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic data processing
General subdivision Management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Application software.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptology.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Algorithms.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element IT Operations.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer and Information Systems Applications.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Buttyan, Levente.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gligor, Virgil.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Westhoff, Dirk.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783540691723
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783540834434
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Computer Communication Networks and Telecommunications,
-- 2945-9184 ;
Volume number/sequential designation 4357
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/11964254">https://doi.org/10.1007/11964254</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in