Security and Privacy in Ad-hoc and Sensor Networks

4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings

  • Editors
  • Frank Stajano
  • Catherine Meadows
  • Srdjan Capkun
  • Tyler Moore
Conference proceedings ESAS 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4572)

Table of contents

  1. Front Matter
  2. Device Pairing

    1. Darko Kirovski, Michael Sinclair, David Wilson
      Pages 16-30
    2. Jaap-Henk Hoepman
      Pages 31-42
    3. Jani Suomalainen, Jukka Valkonen, N. Asokan
      Pages 43-57
  3. Key Management

    1. Gelareh Taban, Rei Safavi-Naini
      Pages 58-72
    2. Leif Uhsadel, Axel Poschmann, Christof Paar
      Pages 73-86
    3. Johann van der Merwe, Dawoud Dawoud, Stephen McDonald
      Pages 87-100
  4. Location Verification and Location Privacy

    1. Dave Singelée, Bart Preneel
      Pages 101-115
    2. Levente Buttyán, Tamás Holczer, István Vajda
      Pages 129-141
  5. Secure Routing and Forwarding

    1. Stephen Farrell, Christian D. Jensen
      Pages 142-155
    2. Saikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert
      Pages 156-171
  6. Physical Security

    1. Ulrich Grossmann, Enrik Berkhan, Luciana C. Jatoba, Joerg Ottenbacher, Wilhelm Stork, Klaus D. Mueller-Glaser
      Pages 172-186
    2. Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert-Jan Schrijen, Boris Skoric et al.
      Pages 187-202
  7. Detection of Compromise, and Revocation

    1. Christoph Krauß, Frederic Stumpf, Claudia Eckert
      Pages 203-217
    2. Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross Anderson
      Pages 232-246
  8. Back Matter

About these proceedings


You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The wo- nd rd shop took place in Cambridge, UK, on the 2 and 3 of July 2007. The workshop was European in name and location but it was de?nitely transatlantic in scope. We had a program chair from Europe and one from the USA, and membership of our program committee was almost evenly split - tween those two regions. When looking at participation, the workshop was even more global than that: the submitted papers came from 25 countries in 6 con- nents. We received 87 submissions. After quick-rejecting 5 papers deemed to be out of scope, the remaining 82 papers were each reviewed by at least three PC members. The two program chairs, who did not submit any works, had sole authoritytodecidewhichpaperstoacceptandreject,basedonlyonthedirective that quality had to be the primary criterion, in order to form a proceedings volume of high international relevance. The number of papers to be accepted was not set in advance: it was selected a posteriori so as to include only solid, innovative and insightful papers. The resulting acceptance rate of about 20%, very strict for a workshop, is a testimonial of how selective we chose to be in accepting only high quality papers.


Bluetooth Radio-Frequency Identification (RFID) Routing Signatur Trusted Platform Module ad-hoc networks algorithms authentication cryptographic protocols cryptography intrusion detection networks p2p networks privacy security

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-73274-7
  • Online ISBN 978-3-540-73275-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software