Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, intelligent homes, environmental monitoring or inter-vehicle communications: there is almost nothing left that is not going to be smart and networked. While a great amount of res
[Lecture Notes in Computer Science] Computer Security – ESORICS 2004 Volume 3193 || Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
✍ Scribed by Samarati, Pierangela; Ryan, Peter; Gollmann, Dieter; Molva, Refik
- Book ID
- 118249828
- Publisher
- Springer Berlin Heidelberg
- Year
- 2004
- Tongue
- German
- Weight
- 229 KB
- Category
- Article
- ISBN
- 3540301089
No coin nor oath required. For personal study only.
✦ Synopsis
This Book Constitutes The Refereed Proceedings Of The 9th European Symposium On Research In Computer Security, Esorics 2004, Held In Sophia Antipolis, France In September 2004. The 27 Revised Full Papers Presented Were Carefully Reviewed And Selected From 159 Submissions. Among The Topics Addressed Are Access Control, Authorization Frameworks, Privacy Policies, Security Protocols, Trusted Computing, Anonymity, Information Hiding, Steganography, Digital Signature Schemes, Encrypted Communication, Information Flow Control, Authentication, Key Distribution, Public Key Cryptography, Intrusion Prevention, And Attack Discovery.
📜 SIMILAR VOLUMES
Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, intelligent homes, environmental monitoring or inter-vehicle communications: there is almost nothing left that is not going to be smart and networked. While a great amount of res