NSS B

58 papers

YearTitle / Authors
20115th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011
Pierangela Samarati, Sara Foresti, Jiankun Hu, Giovanni Livraga
2011A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks.
Tony Cheneau, Andrei Vlad Sambra, Maryline Laurent
2011A conceptual framework for evaluating usable security in authentication mechanisms - usability perspectives.
Martin Mihajlov, Saso Josimovski, Borka Jerman-Blazic
2011A distributed client-puzzle mechanism to mitigate bandwidth attacks.
Mazdak Alimadadi, Mehran S. Fallah
2011A grid-based clustering for low-overhead anomaly intrusion detection.
Yang Zhong, Hirofumi Yamaki, Hiroki Takakura
2011A holistic methodology for evaluating wireless Intrusion Detection Systems.
Khalid Nasr, Anas Abou El Kalam, Christian Fraboul
2011A microcontroller SRAM-PUF.
Christoph Böhm, Maximilian Hofer, Wolfgang Pribyl
2011A misuse-based network Intrusion Detection System using Temporal Logic and stream processing.
Abdulbasit Ahmed, Alexei Lisitsa, Clare Dixon
2011A novel semi-supervised approach for network traffic clustering.
Yu Wang, Yang Xiang, Jun Zhang, Shun-Zheng Yu
2011A privacy-preserving eID based Single Sign-On solution.
Bernd Zwattendorfer, Arne Tauber, Thomas Zefferer
2011A propagation model of a vulnerability mitigation computer worm - seawave.
Ziyad S. Al-Salloum, Stephen D. Wolthusen
2011A secure, constraint-aware role-based access control interoperation framework.
Nathalie Baracaldo, Amirreza Masoumzadeh, James Joshi
2011An efficient VM-based software protection.
Amir Averbuch, Michael Kiperberg, Nezer Zaidenberg
2011Analysis of prefix hijacking based on AS hierarchical model.
Bofeng Zhang, Yuan Li, Yujing Liu, Jinshu Su
2011Attack-resilient compliance monitoring for large distributed infrastructure systems.
Mirko Montanari, Roy H. Campbell
2011Automated extraction of polymorphic virus signatures using abstract interpretation.
Serge Chaumette, Olivier Ly, Renaud Tabary
2011Automatic security verification for 3-party authentication and key exchange protocols.
Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake
2011Avoiding DDoS with active management of backlog queues.
Martine Bellaïche, Jean-Charles Grégoire
2011Channel state information based key generation vs. side-channel analysis key information leakage.
Huiyun Li, Qi Zhang, Hai Yuan
2011CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model.
Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy
2011DANAK: Finding the odd!
Cynthia Wagner, Jérôme François, Radu State, Thomas Engel
2011Data control in social networks.
Robert Koch, Dominik Holzapfel, Gabi Dreo Rodosek
2011Defeating pharming attacks at the client-side.
Sophie Gastellier-Prevost, Maryline Laurent
2011Designing secure RFID authentication protocols is (still) a non-trivial task.
Panagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis
2011Detecting infection onset with behavior-based policies.
Kui Xu, Danfeng Yao, Qiang Ma, Alexander Crowell
2011Enhancement of ZigBee and Wi-Fi security by a robust and fast chaotic algorithm.
Bassem Bakhache, Joseph M. Ghazal, Safwan El Assad
2011Exploring twisted paths: Analyzing authorization processes in organizations.
Steffen Bartsch
2011FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems.
Roberto Gallo, Henrique Kawakami, Ricardo Dahab
2011Flooding attacks against network coding and countermeasures.
Yuanyuan Zhang, Wassim Znaidi, Cédric Lauradoux, Marine Minier
2011Foreword from the Conference Chairs.
Sabrina De Capitani di Vimercati, Pierangela Samarati, Sara Foresti, Jiankun Hu
2011Improving P2P IPTV random peers search through user similarity.
Alessio Bonti, Ming Li, Wen Shi
2011KL-F: Karhunen-Loève based fragile watermarking.
Marco Botta, Davide Cavagnino, Victor Pomponiu
2011Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication.
Ravi Jhawar, Philip Inglesant, Nicolas T. Courtois, Martina Angela Sasse
2011Measuring the revised guessability of graphical passwords.
Rosanne English, Ron Poet
2011Model-based safety analysis of SELinux security policies.
Peter Amthor, Winfried E. Kühnhauser, Anja Pölck
2011Modeling worms propagation on probability.
Yini Wang, Sheng Wen, Yang Xiang
2011Modelling self-protected networks and dynamic systems.
Marta Fernández-Diego, Julián Marcelo-Cocho
2011On the security of the ECKE-1N and EECKE-1N elliptic-curve key agreement protocols.
Maurizio Adriano Strangio
2011Privacy-enhanced identity via browser extensions and linking services.
Renato Accornero, Daniele Rispoli, Francesco Bergadano
2011R
Nathan S. Evans, Christian Grothoff
2011RCHB: Light-weight, provably-secure variants of the HB protocol using rotation and complementation.
Samia A. Ali, Refaat M. Mohamed, Mahmoud H. Fahim
2011Reactive non-interference for a browser model.
Nataliia Bielova, Dominique Devriese, Fabio Massacci, Frank Piessens
2011Reconstructing security types for automated policy enforcement in FABLE.
Arash Afshar, Mehran S. Fallah
2011Removing the blinders: Using information to mitigate adversaries in adaptive overlays.
David Zage, Charles Killian, Cristina Nita-Rotaru
2011SMS linguistic profiling authentication on mobile device.
Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell
2011STORK e-privacy and security.
V. Koulolias, A. Kountzeris, Herbert Leitold, Bernd Zwattendorfer, A. Crespo, M. Stern
2011Scalable consistency-based hardware trojan detection and diagnosis.
Sheng Wei, Miodrag Potkonjak
2011Secure conjunctive keyword searches for unstructured text.
Florian Kerschbaum
2011Semi-supervised learning for packed executable detection.
Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas, Mikel Gastesi, José Miguel Esparza
2011The power of credit card numbers and long CVVs.
Valentim Oliveira, Tito Silva
2011Towards a metric for recognition-based graphical password security.
Rosanne English, Ron Poet
2011Towards ground truthing observations in gray-box anomaly detection.
Jiang Ming, Haibin Zhang, Debin Gao
2011Towards improving security testability of AADL architecture models.
Ayda Saïdane, Nicolas Guelfi
2011Towards safe and optimal filtering rule reordering for complex packet filters.
Nizar Ben Neji, Adel Bouhoula
2011Tracking end-users in web databases.
Boris Rozenberg, Yaron Gonen, Ehud Gudes, Nurit Gal-Oz, Erez Shmueli
2011Trustable outsourcing of business processes to cloud computing environments.
Sami Alsouri, Stefan Katzenbeisser, Sebastian Biedermann
2011Usability of Internet Security Software: Have they got it right?
Patryk Szewczyk
2011User-representative feature selection for keystroke dynamics.
Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Irfan Ahmed