Device Pairing.- The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams.- The Martini Synch: Joint Fuzzy Hashing Via Error Correction.- Private Handshakes.- Security Associations in Personal Networks: A Comparative Analysis.- Key Management.- Key Establishment in Heterogeneous Self-organized Networks.- Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes.- Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying.- Location Verification and Location Privacy.- Distance Bounding in Noisy Environments.- Multiple Target Localisation in Sensor Networks with Location Privacy.- On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs.- Secure Routing and Forwarding.- “End-by-Hop” Data Integrity.- Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences.- Physical Security.- Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules.- ALGSICS — Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems.- Detection of Compromise, and Revocation.- Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques.- Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators.- New Strategies for Revocation in Ad-Hoc Networks.