default search action
4th AsiaCCS 2009: Sydney, Australia
- Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan:
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009. ACM 2009, ISBN 978-1-60558-394-5
Keynote
- Paul A. Karger:
Securing virtual machine monitors: what is needed? 1 - Bhavani Thuraisingham:
Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners. 2
Network security-I
- Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani:
Automatic discovery of botnet communities on large-scale communication networks. 1-10 - Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson:
Automating analysis of large-scale botnet probing events. 11-22 - Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim:
Towards complete node enumeration in a peer-to-peer botnet. 23-34
Software security
- Fei Yan, Philip W. L. Fong:
Efficient IRM enforcement of history-based access control policies. 35-46 - Phu H. Phung, David Sands, Andrey Chudnov:
Lightweight self-protecting JavaScript. 47-60
Network security-II
- Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui Yang, Xuxian Jiang:
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. 61-69 - Rui Zhang, Goichiro Hanaoka, Hideki Imai:
A generic construction of useful client puzzles. 70-79 - Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis:
An integrated approach to detection of fast and slow scanning worms. 80-91 - Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated wireless roaming via tunnels: making mobile guests feel at home. 92-103
Systems security
- Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala:
On-board credentials with open provisioning. 104-115 - Klaus Kursawe, Dries Schellekens:
Flexible muTPMs through disembedding. 116-124 - Sherri Sparks, Shawn Embleton, Cliff Changchun Zou:
A chipset level network backdoor: bypassing host-based firewall & IDS. 125-134 - Khalid Elbadawi, Ehab Al-Shaer:
TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay. 135-145
Crypto protocols
- M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Universally composable contributory group key exchange. 146-156 - Jung Yeon Hwang, Dong Hoon Lee, Moti Yung:
Universal forgery of the identity-based sequential aggregate signature scheme. 157-160 - Kazukuni Kobara, SeongHan Shin, Mario Strefler:
Partnership in key exchange protocols. 161-170
Theory of security
- Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary. 171-182 - Stefan Fenz, Andreas Ekelhart:
Formalizing information security knowledge. 183-194
Anonymity and privacy
- Julien Bringer, Hervé Chabanne, Thomas Icart:
Efficient zero-knowledge identification schemes which respect privacy. 195-205 - Han Chen, Pasquale Malacaria:
Quantifying maximal loss of anonymity in protocols. 206-217 - Brian Thompson, Danfeng Yao:
The union-split algorithm and cluster-based anonymization of social networks. 218-227 - Xavier Boyen:
Hidden credential retrieval from a reusable password. 228-238
Access control
- Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil C. Lupu, Arosha K. Bandara:
Expressive policy analysis with enhanced system dynamicity. 239-250 - Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain, Yehia Elrakaiby:
Semantic context aware security policy deployment. 251-261 - Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, Farhana Ashraf:
PBES: a policy based encryption system with application to data sharing in the power grid. 262-275 - Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao:
Attribute based proxy re-encryption with delegating capabilities. 276-286
Security policies and verification
- Adam J. Lee, Kazuhiro Minami, Nikita Borisov:
Confidentiality-preserving distributed proofs of conjunctive queries. 287-297 - Qun Ni, Elisa Bertino, Jorge Lobo:
D-algebra for composing access control policy decisions. 298-309 - Mark Reith, Jianwei Niu, William H. Winsborough:
Toward practical analysis for trust management policy. 310-321
Public key and hash functions
- Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai:
Conditional proxy re-encryption secure against chosen-ciphertext attack. 322-332 - Hai Huang, Zhenfu Cao:
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. 333-342 - Xiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing:
Provably secure and efficient bounded ciphertext policy attribute based encryption. 343-352 - Somitra Kumar Sanadhya, Palash Sarkar:
A new hash family obtained by modifying the SHA-2 family. 353-363
Short papers-I
- Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin:
Logging key assurance indicators in business processes. 364-367 - Zhiguo Wan, Kui Ren, Bo Zhu, Bart Preneel, Ming Gu:
Anonymous user communication for privacy protection in wireless metropolitan mesh networks. 368-371 - Ribao Wei, Dingfeng Ye:
Delegate predicate encryption and its application to anonymous authentication. 372-375 - Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee:
Improved searchable public key encryption with designated tester. 376-379
Short papers-II
- Liting Zhang, Wenling Wu, Lei Zhang, Yanjun Li:
A note on Cook's elastic block cipher. 380-383 - Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough:
A conceptual framework for Group-Centric secure information sharing. 384-387 - Chris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong:
Intrusion response cost assessment methodology. 388-391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.