SecureComm C

56 papers

YearTitle / Authors
2006A Customizable Reputation-based Privacy Assurance System using Active Feedback.
Stephen Crane, Marco Casassa Mont
2006A Distributed Stealthy Coordination Mechanism for Worm Synchronization.
Gaurav Kataria, Gaurav Anand, Rudolph Araujo, Ramayya Krishnan, Adrian Perrig
2006A Double Horizon Defense Design for Robust Regulation of Malicious Traffic.
Ying Xu, Roch Guérin
2006A Flexible Approach to Intrusion Alert Anonymization and Correlation.
Dingbang Xu, Peng Ning
2006A Framework for Identifying Compromised Nodes in Sensor Networks.
Qing Zhang, Ting Yu, Peng Ning
2006A History-Based Framework to Build Trust Management Systems.
Samuel Galice, Véronique Legrand, Marine Minier, John Mullins, Stéphane Ubéda
2006A Unified Framework for Trust Management.
Weiliang Zhao, Vijay Varadharajan, George Bryan
2006An Architecture for an Email Worm Prevention System.
Mohamed Mahmoud Taibah, Ehab Al-Shaer, Raouf Boutaba
2006An Identity-based Ring Signature Scheme with Enhanced Privacy.
Chandana Gamage, Ben Gras, Bruno Crispo, Andrew S. Tanenbaum
2006An Infrastructure for Gaining Trust in Context Information.
Frank Fransen, Sven Lachmund, Eddy Olk, Laurent Bussard
2006An Intelligent Infrastructure Strategy to Improving the Performance and Detection Capability of Intrusion Detection Systems.
Emmanuel Hooper
2006Computing with Trust: Definition, Properties, and Algorithms.
Jennifer Golbeck
2006DaTA - Data-Transparent Authentication Without Communication Overhead.
Songqing Chen, Shiping Chen, Xinyuan Wang, Sushil Jajodia
2006Denial of Service Attacks and Defenses in Decentralized Trust Management.
Jiangtao Li, Ninghui Li, Xiaofeng Wang, Ting Yu
2006Detecting the Sybil Attack in Mobile Ad hoc Networks.
Chris Piro, Clay Shields, Brian Neil Levine
2006Discount Anonymous On Demand Routing for Mobile Ad hoc Networks.
Liu Yang, Markus Jakobsson, Susanne Wetzel
2006Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks.
Katharine Chang, Kang G. Shin
2006Effective Detection of Active Worms with Varying Scan Rate.
Wei Yu, Xun Wang, Dong Xuan, David Lee
2006Efficient visualization of change events in enterprise networks.
Andrew Stewart
2006Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures.
Costin Raiciu, David S. Rosenblum
2006Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks.
George Theodorakopoulos, John S. Baras
2006Enhancing Privacy Preservation of Anonymous Location Sampling Techniques in Traffic Monitoring Systems.
Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady
2006Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery.
Radmilo Racic, Denys Ma, Hao Chen
2006Flow Anomaly Detection in Firewalled Networks.
Michael J. Chapple, Timothy E. Wright, Robert M. Winding
2006Implementation and Performance Evaluation of EAP-TLS-KS.
Jared Cordasco, Ulrike Meyer, Susanne Wetzel
2006In-Band Wormholes and Countermeasures in OLSR Networks.
Peter Kruus, Daniel Sterne, Richard Gopaul, Michael Heyman, Brian Rivera, Peter Budulas, Brian Luu, Tommy Johnson, Natalie Ivanic, Geoffrey Lawler
2006Leveraging IPsec for Mandatory Per-Packet Access Control.
Trent Jaeger, David H. King, Kevin R. B. Butler, Serge Hallyn, Joy Latten, Xiaolan Zhang
2006MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks.
Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff
2006Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification.
Liang Xie, Sencun Zhu
2006Mithril: Adaptable Security for Survivability in Collaborative Computing Sites.
Jim Basney, Patrick Flanigan, Jin Heo, Himanshu Khurana, Joe Muggli, Meenal Pant, Adam J. Slagell, Von Welch
2006Non-Invasive Methods for Host Certification.
Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel
2006On Filtering of DDoS Attacks Based on Source Address Prefixes.
Gary Pack, Jaeyoung Yoon, Eli Collins, Cristian Estan
2006On Mobile Viruses Exploiting Messaging and Bluetooth Services.
Abhijit Bose, Kang G. Shin
2006Outsourcing Security Analysis with Anonymized Logs.
Jianqing Zhang, Nikita Borisov, William Yurcik
2006Packet Coding for Strong Anonymity in Ad Hoc Networks.
Imad Aad, Claude Castelluccia, Jean-Pierre Hubaux
2006Passive Wireless Host Detection Using Local RTT Timing Characteristics on an Enterprise Network.
Chad D. Mano, David A. Cieslak
2006Preventing Cross Site Request Forgery Attacks.
Nenad Jovanovic, Engin Kirda, Christopher Kruegel
2006Protecting Against Distributed Denial of Service (DDoS) Attacks Using Distributed Filtering.
Jonathan T. Trostle
2006Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols.
Mike Burmester, Tri Van Le, Breno de Medeiros
2006Providing Tunable Security Services: An IEEE 802.11i Example.
Stefan Lindskog, Anna Brunström, Zoltán Faigl, Katalin Toth
2006Reputation-Based Algorithm for Managing Trust in File Sharing Networks.
Lara Srour, Ayman I. Kayssi, Ali Chehab
2006Reputation-based Trust-Aware Recommender System.
Sukumal Kitisin, Clifford Neuman
2006S-DV: A new approach to Secure Distance Vector routing protocols.
Abdelaziz Babakhouya, Yacine Challal, Abdelmadjid Bouabdallah, Said Gharout
2006Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006
2006Secure Real-time User Preference Collection for Broadcast Scheduling.
Xuhua Ding, Shuhong Wang, Baihua Zheng
2006Sensor Networks that Are Provably Resilient.
Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan
2006System Anomaly Detection: Mining Firewall Logs.
Robert M. Winding, Timothy E. Wright, Michael J. Chapple
2006TOPO: A Topology-aware Single Packet Attack Traceback Scheme.
Linfeng Zhang, Yong Guan
2006Towards Communal Governed Transactions Among Decentralized Trading Agents.
Avinanta Tarigan
2006Towards Cooperative Self-Protecting Mobile Devices using Trustful Relationships.
Stephan Groß
2006Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks.
Catherine Meadows, Paul F. Syverson, Liwu Chang
2006Wavelet-based Real Time Detection of Network Traffic Anomalies.
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
2006Work in Progress - Tracking Correlated Attacks in Enterprise Intranets through Lattices.
Sule Simsek
2006Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN Traffic.
Nicholas Weaver, Vern Paxson, Robin Sommer
2006Work in Progress: Streamlined IT Risk Management through a Micro Risk Management System (μRMS).
Timothy E. Wright, Michael J. Chapple, Robert M. Winding
2006Work in Progress: Who is Watching You? Video Conferencing Security.
Navid Jam, Elliot Proebstel