default search action
5. SecureComm 2009: Athens, Greece
- Yan Chen, Tassos Dimitriou, Jianying Zhou:
Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 19, Springer 2009, ISBN 978-3-642-05283-5
Part 1 / Wireless Network Security I
- Liang Cai, Gabriel Maganis, Hui Zang, Hao Chen:
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages. 1-20 - Ioannis Broustis, Konstantinos Pelechrinis, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Leandros Tassiulas:
FIJI: Fighting Implicit Jamming in 802.11 WLANs. 21-40 - Mansoor Alicherry, Angelos D. Keromytis, Angelos Stavrou:
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. 41-50
Part 2 / Network Intrusion Detection
- Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo:
Baiting Inside Attackers Using Decoy Documents. 51-70 - Shimrit Tzur-David, Danny Dolev, Tal Anker:
MULAN: Multi-Level Adaptive Network Filter. 71-90 - Guilherme Fernandes, Philippe Owezarski:
Automated Classification of Network Traffic Anomalies. 91-100
Part 3 / Security and Privacy for the General Internet
- Magdalena Payeras-Capellà, Macià Mut Puigserver, Andreu Pere Isern-Deyà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets. 101-120 - Ghassan Karame, David Gubler, Srdjan Capkun:
On the Security of Bottleneck Bandwidth Estimation Techniques. 121-141 - Andrey Garnaev, Wade Trappe:
An Eavesdropping Game with SINR as an Objective Function. 142-162
Part 4 / Malware and Misbehavior
- Feng Qian, Zhiyun Qian, Zhuoqing Morley Mao, Atul Prakash:
Ensemble: Community-Based Anomaly Detection for Popular Applications. 163-184 - Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen:
Using Failure Information Analysis to Detect Enterprise Zombies. 185-206 - William Kozma, Loukas Lazos:
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games. 207-227
Part 5 / Wireless Network Security II, Sensor Networks
- Toni Perkovic, Ivo Stancic, Luka Malisa, Mario Cagalj:
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks. 228-247 - Wassim Znaidi, Marine Minier, Cédric Lauradoux:
Aggregated Authentication (AMAC) Using Universal Hash Functions. 248-264 - Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini:
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN. 265-284 - Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. 285-295
Part 6 / Key Management, Credentials, Authentications
- Martijn Oostdijk, Dirk-Jan van Dijk, Maarten Wegdam:
User-Centric Identity Using ePassports. 296-310 - Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li:
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. 311-329 - S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, C. Pandu Rangan:
Breaking and Building of Group Inside Signature. 330-339 - Thanassis Tiropanis, Tassos Dimitriou:
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources. 340-349
Part 7 / Wireless Network Security III
- Julien Freudiger, Maxim Raya, Jean-Pierre Hubaux:
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks. 350-372 - Yi Yang, Sencun Zhu, Guohong Cao, Thomas La Porta:
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures. 373-393 - Aravind Venkataraman, Raheem A. Beyah:
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC. 394-416
Part 8 / Secure Multicast, Emerging Technologies
- Yawen Wei, Zhen Yu, Yong Guan:
A Novel Architecture for Secure and Scalable Multicast over IP Network. 417-436 - Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, Nikos Triandopoulos:
Reliable Resource Searching in P2P Networks. 437-447 - Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim:
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems. 448-458
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.