default search action
7. SecureComm 2011: London, UK
- Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis:
Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 96, Springer 2012, ISBN 978-3-642-31908-2
Network Intrusion Detection
- Zhiyun Qian, Zhuoqing Morley Mao, Ammar Rayes, David Jaffe:
Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks. 1-18 - Harald Lampesberger, Philipp Winter, Markus Zeilinger, Eckehard Hermann:
An On-Line Learning Statistical Model to Detect Malicious Web Requests. 19-38 - Gaspar Modelo-Howard, Jevin Sweval, Saurabh Bagchi:
Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems. 39-58
Anonymity and Privacy (I)
- Saman Zarandioon, Danfeng (Daphne) Yao, Vinod Ganapathy:
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access. 59-76 - Benedikt Westermann, Pern Hui Chia, Dogan Kesdogan:
Analyzing the Gold Star Scheme in a Split Tor Network. 77-95 - Rinku Dewri:
Location Privacy and Attacker Knowledge: Who Are We Fighting against? 96-115
Wireless Security (I)
- Stephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann, Matthew Robert:
Insecurity in Public-Safety Communications: APCO Project 25. 116-133 - Seyed Ali Ahmadzadeh, Gordon B. Agnew:
Behavioral Mimicry Covert Communication. 134-153 - Chowdhury Sayeed Hyder, Brendan Grebur, Li Xiao:
Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks. 154-171
System Security
- Jin Han, Qiang Yan, Robert H. Deng, Debin Gao:
On Detection of Erratic Arguments. 172-189 - Deguang Kong, Donghai Tian, Peng Liu, Dinghao Wu:
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. 190-208 - Deepa Srinivasan, Xuxian Jiang:
Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots. 209-226
Anonymity and Privacy (II)
- Lie Qu, Guilin Wang, Yi Mu:
Optimistic Fair Exchange of Ring Signatures. 227-242 - Wojciech Mostowski, Pim Vullers:
Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards. 243-260 - Cristina Romero-Tris, Jordi Castellà-Roca, Alexandre Viejo:
Multi-party Private Web Search with Untrusted Partners. 261-280
DNS and Routing Security
- Amiya Kumar Maji, Saurabh Bagchi:
v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks. 281-302 - Shimrit Tzur-David, Kiril Lashchiver, Danny Dolev, Tal Anker:
Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning. 303-318 - Amir Herzberg, Haya Schulmann:
Unilateral Antidotes to DNS Poisoning. 319-336
Key Management
- Viet Pham, Tuomas Aura:
Security Analysis of Leap-of-Faith Protocols. 337-355 - Tieyan Li, Yingjiu Li, Guilin Wang:
Secure and Practical Key Distribution for RFID-Enabled Supply Chains. 356-372 - Sarbari Mitra, Ratna Dutta, Sourav Mukhopadhyay:
Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane. 373-388
Wireless Security (II)
- Zhi Xu, Kun Bai, Sencun Zhu, Leslie S. Liu, Randy Moulic:
Context-Related Access Control for Mobile Caching. 389-408 - Michael Beye, Thijs Veugen:
Anonymity for Key-Trees with Adaptive Adversaries. 409-425
Short Papers
- Thomas Plos, Martin Feldhofer:
Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag. 426-435 - Hanjun Gao, Lina Wang, Wei Liu, Yang Peng, Hao Zhang:
Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines. 436-445 - Sandeep Yadav, A. L. Narasimha Reddy:
Winning with DNS Failures: Strategies for Faster Botnet Detection. 446-459 - Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia:
Trading Elephants for Ants: Efficient Post-attack Reconstitution. 460-469 - Akshay Dua, Nirupama Bulusu, Wu-chang Feng:
Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data. 470-479 - Chunyu Tang, David A. Naumann, Susanne Wetzel:
Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract]. 480-490 - Huijun Xiong, Xinwen Zhang, Wei Zhu, Danfeng Yao:
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services. 491-500 - Hemant Sengar, Xinyuan Wang, Arthur Nichols:
Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks. 501-510 - Steffen Wagner, Christoph Krauß, Claudia Eckert:
T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks. 511-521 - Saeed Al-Haj, Padmalochan Bera, Ehab Al-Shaer:
Build and Test Your Own Network Configuration. 522-532 - Manuel Crotti, Diego Ferri, Francesco Gringoli, Manuel Peli, Luca Salgarelli:
PP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks. 533-542 - Vojtech Krmicek, Jan Vykopal:
NetFlow Based Network Protection. 543-546
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.