Accepted Papers

-------------------------------------------------------------------
A Security Solution for IEEE 802.11's Ad-hoc Mode:
Password-Authentication and Group-Diffie-Hellman Key Exchange

Emmanuel Bresson, Olivier Chevassut, David Pointcheval
--------------------------------------------------------------------
Grain - A Stream Cipher for Constrained Environments

Martin Hell, Thomas Johansson, Willi Meier
--------------------------------------------------------------------
The performance of a watchdog protocol for wireless network security

Jin Wook Lee
--------------------------------------------------------------------
DDoS: Design, Implementation and Analysis of Automated Model

Udaya Kiran Tupakula, Vijay Varadharajan
--------------------------------------------------------------------
Denial of service resistance in key exchange

Juan Manuel Gonazalez Nieto, Colin Boyd,
Ernest Foo, Suratose Tritilanunt
---------------------------------------------------------------------
A hybrid data mining anomaly detection techniques in ad hoc networks

Yu Liu
---------------------------------------------------------------------
Security Mechanisms and Vulnerabilities in the IEEE 802.15.3
Wireless Personal Area Networks

Yang Xiao
---------------------------------------------------------------------
Automated detection and containment of worms and viruses into
heterogeneous networks: a simple network immune systems

Francesco Palmieri
---------------------------------------------------------------------