SecureComm C

62 papers

YearTitle / Authors
2007A context service for multimodal pervasive environments.
Antonio Coronato, Giuseppe De Pietro
2007A feedback reputation mechanism to secure the optimized link state routing protocol.
João P. Vilela, João Barros
2007A layout-similarity-based approach for detecting phishing pages.
Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi
2007A model for usage control in GRID systems.
Fabio Martinelli
2007A model for usage control in GRID systems.
Fabio Martinelli, Paolo Mori
2007A secure and efficient key management scheme for wireless sensor networks.
Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee
2007A study on secure RFID authentication protocol in insecure communication.
Jang-Su Park, Soo-Young Kang, Im-Yeong Lee
2007Aggregation of attributes from different authorities.
David W. Chadwick
2007An analysis of the chinese wall pattern for guaranteeing confidentiality in grid-based virtual organisations.
Gautier Dallons, Philippe Massonet, Jean-François Molderez, Christophe Ponsard, Alvaro Arenas
2007An assessment of VoIP covert channel threats.
Takehiro Takahashi, Wenke Lee
2007An efficient and scalable Security ProtocoL for protecting fixed-Content Objects in ContEnt aDdressable StoraGe architEctures.
Wassim Itani, Ayman I. Kayssi, Ali Chehab
2007An entropy based method for measuring anonymity.
Michele Bezzi
2007Anonymity and security in delay tolerant networks.
Aniket Kate, Gregory M. Zaverucha, Urs Hengartner
2007Beyond web 2.0: enabling multimodal web interactions using VoIP and Ajax.
Giovanni Frattini, Pierpaolo Petriccione, Giuseppe Leone, Gianluca Supino, Fabio Corvino
2007Breaking EMAP.
Mihály Bárász, Balázs Boros, Péter Ligeti, Krisztina Lója, Daniel A. Nagy
2007Deception framework for sensor networks.
Ruiyi Zhang, Johnson P. Thomas, Venkata Manoj Mulpuru
2007Design patterns for secure virtual organization management architecture.
Angelo Gaeta, Matteo Gaeta, Alan Smith, Ivan Djordjevic, Theo Dimitrakos, Maurizio Colombo, Sergio Miranda
2007Detecting bogus BGP route information: Going beyond prefix hijacking.
Jian Qiu, Lixin Gao, Supranamaya Ranjan, Antonio Nucci
2007Detecting worms via mining dynamic program execution.
Xun Wang, Wei Yu, Adam C. Champion, Xinwen Fu, Dong Xuan
2007Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs.
Ahren Studer, Mark Luk, Adrian Perrig
2007Enhancing frequency-based wormhole attack detection with novel jitter waveforms.
Maria Gorlatova, Marc Kelly, Ramiro Liscano, Peter C. Mason
2007Evolution of networking: Current problems and future directions.
Pekka Nikander
2007Flexible and high-performance anonymization of NetFlow records using anontool.
Michalis Foukarakis, Demetres Antoniades, Spyros Antonatos, Evangelos P. Markatos
2007Gaining users' trust by publishing failure probabilities.
Dominic Battré, Karim Djemame, Odej Kao, Kerstin Voß
2007Global interoperability of national security and emergency preparedness (NS/EP) telecommunications services.
Frank J. Suraci, Arye R. Ephrath, John R. Wullert
2007Implications of radio fingerprinting on the security of sensor networks.
Kasper Bonne Rasmussen, Srdjan Capkun
2007Intrusion Detection and tolerance in Grid-based applications.
Jun Wang, Luigi Lo Iacono
2007Intrusion detection technology based on CEGA-SVM.
Yuxin Wei, Muqing Wu
2007Misleading and defeating importance-scanning malware propagation.
Guofei Gu, Zesheng Chen, Phillip A. Porras, Wenke Lee
2007Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach.
Xiaoxin Wu, David K. Y. Yau
2007Modeling and detection of complex attacks.
Seyit Ahmet Çamtepe, Bülent Yener
2007NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography.
Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah
2007OpenFire: Using deception to reduce network attacks.
Kevin Borders, Laura Falk, Atul Prakash
2007Optimizing secure Web Services with MAWeS: A case study.
Massimiliano Rak, Valentina Casola, Nicola Mazzocca, Emilio Pasquale Mancini, Umberto Villano
2007PWC: A proactive worm containment solution for enterprise networks.
Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis
2007Parameterizing access control for heterogeneous peer-to-peer applications.
Ashish Gehani, Surendar Chandra
2007Platform to enforce multiple access control policy in grid hosting environment.
Leonardo Mattes, Leonardo C. Militelli, João Antonio Zuffo
2007Practical anonymous communication on the mobile internet using Tor.
Christer Andersson, Andriy Panchenko
2007Privacy-preserving authentication with low computational overhead for RFID systems.
Fen Liu, Lei Hu, Li Lu, Weijia Wang
2007RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks.
Claude Castelluccia, Angelo Spognardi
2007SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs.
William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham
2007SET: Detecting node clones in sensor networks.
Heesook Choi, Sencun Zhu, Thomas F. La Porta
2007Scalable discovery of private resources.
Spyros Kotoulas, Ronny Siebes
2007Secure computation for data privacy.
Meena Dilip Singh, Ashutosh Saxena
2007Secure crash reporting in vehicular Ad hoc networks.
Sumair Ur Rahman, Urs Hengartner
2007Secure lightweight tunnel for monitoring transport containers.
Jens Ove Lauf, Harald Sauff
2007Secure token passing at application level.
Augusto Ciuffoletti
2007Securing Personal Network clusters.
Assed Jehangir, Sonia M. Heemstra de Groot
2007Securing network location awareness with authenticated DHCP.
Tuomas Aura, Michael Roe, Steven J. Murdoch
2007Securing pseudo identities in an anonymous peer-to-peer file-sharing network.
Tom Chothia
2007Simple Authentication for the Web.
Timothy W. van der Horst, Kent E. Seamons
2007Simple cross-site attack prevention.
Florian Kerschbaum
2007Sybil attack detection in a hierarchical sensor network.
Jian Yin, Sanjay Kumar Madria
2007Temporal factors to evaluate trustworthiness of virtual identities.
Luca Longo, Pierpaolo Dondio, Stephen Barrett
2007The CONNECT platform: An architecture for Context-Aware Privacy in pervasive environments.
Susana Alcalde Bagüés, Jelena Mitic, Elisabeth-Anna Emberger
2007The Host Identity Protocol (HIP): Bringing mobility, multi- homing, and baseline security together.
Pekka Nikander
2007Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007
2007Trustworthiness of collaborative Open Source Software quality assessment.
Jean-Marc Seigneur
2007Using recurring costs for reputation management in peer-to-peer streaming systems.
Michael Rossberg, Guenter Schaefer, Thorsten Strufe
2007Verification method of network simulation for pervasive environments.
Kyuhyung Cho, Jongsung Lee, Jongin Lim, Jongsub Moon
2007Web Services workflow reliability estimation through reliability patterns.
Luigi Coppolino, Luigi Romano, Nicola Mazzocca, Sergio Salvi
2007iToken: aWireless smart card reader which provides handhelds with desk top equivalent security.
Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, G. Di Matteo, Luigi Romano