AsiaCCS A

43 papers

YearTitle / Authors
2009A chipset level network backdoor: bypassing host-based firewall & IDS.
Sherri Sparks, Shawn Embleton, Cliff Changchun Zou
2009A conceptual framework for Group-Centric secure information sharing.
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough
2009A generic construction of useful client puzzles.
Rui Zhang, Goichiro Hanaoka, Hideki Imai
2009A new hash family obtained by modifying the SHA-2 family.
Somitra Kumar Sanadhya, Palash Sarkar
2009A note on Cook's elastic block cipher.
Liting Zhang, Wenling Wu, Lei Zhang, Yanjun Li
2009An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem.
Hai Huang, Zhenfu Cao
2009An integrated approach to detection of fast and slow scanning worms.
Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis
2009Anonymous user communication for privacy protection in wireless metropolitan mesh networks.
Zhiguo Wan, Kui Ren, Bo Zhu, Bart Preneel, Ming Gu
2009Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners.
Bhavani Thuraisingham
2009Attribute based proxy re-encryption with delegating capabilities.
Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao
2009Authenticated wireless roaming via tunnels: making mobile guests feel at home.
Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater
2009Automatic discovery of botnet communities on large-scale communication networks.
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
2009Automating analysis of large-scale botnet probing events.
Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson
2009Conditional proxy re-encryption secure against chosen-ciphertext attack.
Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai
2009Confidentiality-preserving distributed proofs of conjunctive queries.
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
2009D-algebra for composing access control policy decisions.
Qun Ni, Elisa Bertino, Jorge Lobo
2009Delegate predicate encryption and its application to anonymous authentication.
Ribao Wei, Dingfeng Ye
2009Efficient IRM enforcement of history-based access control policies.
Fei Yan, Philip W. L. Fong
2009Efficient zero-knowledge identification schemes which respect privacy.
Julien Bringer, Hervé Chabanne, Thomas Icart
2009Expressive policy analysis with enhanced system dynamicity.
Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil C. Lupu, Arosha K. Bandara
2009Flexible muTPMs through disembedding.
Klaus Kursawe, Dries Schellekens
2009Formalizing information security knowledge.
Stefan Fenz, Andreas Ekelhart
2009Hidden credential retrieval from a reusable password.
Xavier Boyen
2009Improved searchable public key encryption with designated tester.
Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee
2009Intrusion response cost assessment methodology.
Chris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong
2009Lightweight self-protecting JavaScript.
Phu H. Phung, David Sands, Andrey Chudnov
2009Logging key assurance indicators in business processes.
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
2009On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers.
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui Yang, Xuxian Jiang
2009On-board credentials with open provisioning.
Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala
2009PBES: a policy based encryption system with application to data sharing in the power grid.
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, Farhana Ashraf
2009Partnership in key exchange protocols.
Kazukuni Kobara, SeongHan Shin, Mario Strefler
2009Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009
Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan
2009Provably secure and efficient bounded ciphertext policy attribute based encryption.
Xiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing
2009Quantifying maximal loss of anonymity in protocols.
Han Chen, Pasquale Malacaria
2009Securing virtual machine monitors: what is needed?
Paul A. Karger
2009Semantic context aware security policy deployment.
Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain, Yehia Elrakaiby
2009The union-split algorithm and cluster-based anonymization of social networks.
Brian Thompson, Danfeng Yao
2009TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay.
Khalid Elbadawi, Ehab Al-Shaer
2009Toward practical analysis for trust management policy.
Mark Reith, Jianwei Niu, William H. Winsborough
2009Towards complete node enumeration in a peer-to-peer botnet.
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim
2009Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary.
Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009Universal forgery of the identity-based sequential aggregate signature scheme.
Jung Yeon Hwang, Dong Hoon Lee, Moti Yung
2009Universally composable contributory group key exchange.
M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto