Table of Contents:
  • Mobile Ad-Hoc Networks and Sensors
  • Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks
  • A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network
  • Key Management for Mobile Sensor Networks
  • Server-Aided RSA Key Generation Against Collusion Attack
  • Hybrid Approach for Secure Mobile Agent Computations
  • An XML Standards Based Authorization Framework for Mobile Agents
  • Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results
  • Detecting Impersonation Attacks in Future Wireless and Mobile Networks
  • Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems
  • Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks
  • Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks
  • How to Generate Universally Verifiable Signatures in Ad-Hoc Networks
  • “Fair” Authentication in Pervasive Computing
  • Cryptanalysis of the Energy Efficient Stream Ciphers SSC2
  • ARMS: An Authenticated Routing Message in Sensor Networks
  • Security Analysis and Improvement of Return Routability Protocol
  • Dark Encounter Computations
  • Panel: Authentication in Constrained Environments.