This book arranged the accepted papers in the following sessions:– Device Pairing– Key Management– Location Verification and Location Privacy– Secure Routing and Forwarding– Physical Security– Detection of Compromise, and RevocationAs well as the 17 talks corresponding to the peer-reviewed papers, the workshop program also comprised a keynote talk by Paul Wilson and closed with a rump session in which attendees reported on late-breaking results. Since we went to press well ahead of the event, none of these additional talks are written up in this volume of workshop proceedings.
Ссылка удалена правообладателем ---- The book removed at the request of the copyright holder.