| 2011 | 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008 Albert Levi, Peng Liu, Refik Molva |
| 2008 | A Key Management Solution for Overlay-Live-Streaming. Mathias Fischer, Guenter Schaefer, Robert Karl Schmidt, Thorsten Strufe |
| 2008 | A cross-layer dropping attack in video streaming over ad hoc networks. Min Shao, Sencun Zhu, Guohong Cao, Tom La Porta, Prasant Mohapatra |
| 2008 | A heterogeneity-aware framework for group key management in wireless mesh networks. Xia Wang, Johnny Wong, Wensheng Zhang |
| 2008 | A lightweight biometric signature scheme for user authentication over networks. Tansu Alpcan, Sinan Kesici, Daniel Bicher, Mehmet Kivanç Mihçak, Christian Bauckhage, Seyit Ahmet Çamtepe |
| 2008 | ARCMA: attack-resilient collaborative message authentication in wireless sensor networks. Min Gyu Cho, Kang G. Shin |
| 2008 | An identity-based key infrastructure suitable for messaging and its application to e-mail. Ayse Gül Karatop, Erkay Savas |
| 2008 | Anonymous return route information for onion based mix-nets. Yoshifumi Manabe, Tatsuaki Okamoto |
| 2008 | Attacking the Kad network. Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim |
| 2008 | Attribute-based on-demand multicast group setup with membership anonymity. Shucheng Yu, Kui Ren, Wenjing Lou |
| 2008 | BitBlender: Light-Weight Anonymity for BitTorrent. Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker |
| 2008 | Containment of network worms via per-process rate-limiting. Yuanyuan Zeng, Xin Hu, Haixiong Wang, Kang G. Shin, Abhijit Bose |
| 2008 | Correlation-based load balancing for network intrusion detection and prevention systems. Anh Le, Raouf Boutaba, Ehab Al-Shaer |
| 2008 | Detection of word shift steganography in PDF document. Lingjun Li, Liusheng Huang, Wei Yang, Xinxin Zhao, Zhenshan Yu, Zhili Chen |
| 2008 | Distributed flow detection over multi path sessions. Eyal Felstaine, Eldad Chai, Niv Gilboa, Avi Elisha |
| 2008 | Efficient signature matching with multiple alphabet compression tables. Shijin Kong, Randy Smith, Cristian Estan |
| 2008 | Enforcing Behaviour with Anonymity. Joss Wright, Susan Stepney |
| 2008 | Evaluating the utility of anonymized network traces for intrusion detection. Kiran Lakkaraju, Adam J. Slagell |
| 2008 | Hiding "real" machine from attackers and malware with a minimal virtual machine monitor. Yan Wen, Jinjing Zhao, Huaimin Wang |
| 2008 | Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive? Sherif M. Khattab, Daniel Mossé, Rami G. Melhem |
| 2008 | LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou |
| 2008 | Location privacy based on trusted computing and secure logging. Urs Hengartner |
| 2008 | MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks. Issa Khalil, Saurabh Bagchi |
| 2008 | On capturing malware dynamics in mobile power-law networks. Abhijit Bose, Kang G. Shin |
| 2008 | On the need for user-defined fine-grained access control policies for social networking applications. Andrew Simpson |
| 2008 | On the performance of a hybrid intrusion detection architecture for voice over IP systems. Bazara I. A. Barry, H. Anthony Chan |
| 2008 | Overbot: a botnet protocol based on Kademlia. Guenther Starnberger, Christopher Kruegel, Engin Kirda |
| 2008 | PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications. Andrea Cirulli, Roberto Di Pietro |
| 2008 | Parameterized access control: from design to prototype. Ashish Gehani, Surendar Chandra |
| 2008 | Relaxed authenticity for data aggregation in wireless sensor networks. Erik-Oliver Blaß, Joachim Wilke, Martina Zitterbart |
| 2008 | RepTrap: a novel attack on feedback-based reputation systems. Yafei Yang, Qinyuan Feng, Yan Lindsay Sun, Yafei Dai |
| 2008 | Reputation and Audits for Self-Organizing Storage. Nouha Oualha, Yves Roudier |
| 2008 | SMM rootkits: a new breed of OS independent malware. Shawn Embleton, Sherri Sparks, Cliff C. Zou |
| 2008 | Scalable Privacy Protecting Scheme through Distributed RFID Tag Identification. Sepideh Fouladgar, Hossam Afifi |
| 2008 | Scalable and efficient provable data possession. Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik |
| 2008 | Securely computing an approximate median in wireless sensor networks. Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia |
| 2008 | Source location privacy against laptop-class attacks in sensor networks. Yi Ouyang, Zhengyi Le, Donggang Liu, James Ford, Fillia Makedon |
| 2008 | Subjective logic based trust model for mobile ad hoc networks. Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula |
| 2008 | Sybil proof anonymous reputation management. Wolf Müller, Henryk Plötz, Jens-Peter Redlich, Takashi Shiraki |
| 2008 | Towards more secure systems: how to combine expert evaluations. Marco Benini, Sabrina Sicari |
| 2008 | Unassailable sensor networks. Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan |
| 2008 | Visual-similarity-based phishing detection. Eric Medvet, Engin Kirda, Christopher Kruegel |
| 2008 | Voice pharming attack and the trust of VoIP. Xinyuan Wang, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera |
| 2008 | rfidDOT: RFID delegation and ownership transfer made simple. Tassos Dimitriou |