SecureComm C

44 papers

YearTitle / Authors
20114th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008
Albert Levi, Peng Liu, Refik Molva
2008A Key Management Solution for Overlay-Live-Streaming.
Mathias Fischer, Guenter Schaefer, Robert Karl Schmidt, Thorsten Strufe
2008A cross-layer dropping attack in video streaming over ad hoc networks.
Min Shao, Sencun Zhu, Guohong Cao, Tom La Porta, Prasant Mohapatra
2008A heterogeneity-aware framework for group key management in wireless mesh networks.
Xia Wang, Johnny Wong, Wensheng Zhang
2008A lightweight biometric signature scheme for user authentication over networks.
Tansu Alpcan, Sinan Kesici, Daniel Bicher, Mehmet Kivanç Mihçak, Christian Bauckhage, Seyit Ahmet Çamtepe
2008ARCMA: attack-resilient collaborative message authentication in wireless sensor networks.
Min Gyu Cho, Kang G. Shin
2008An identity-based key infrastructure suitable for messaging and its application to e-mail.
Ayse Gül Karatop, Erkay Savas
2008Anonymous return route information for onion based mix-nets.
Yoshifumi Manabe, Tatsuaki Okamoto
2008Attacking the Kad network.
Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim
2008Attribute-based on-demand multicast group setup with membership anonymity.
Shucheng Yu, Kui Ren, Wenjing Lou
2008BitBlender: Light-Weight Anonymity for BitTorrent.
Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker
2008Containment of network worms via per-process rate-limiting.
Yuanyuan Zeng, Xin Hu, Haixiong Wang, Kang G. Shin, Abhijit Bose
2008Correlation-based load balancing for network intrusion detection and prevention systems.
Anh Le, Raouf Boutaba, Ehab Al-Shaer
2008Detection of word shift steganography in PDF document.
Lingjun Li, Liusheng Huang, Wei Yang, Xinxin Zhao, Zhenshan Yu, Zhili Chen
2008Distributed flow detection over multi path sessions.
Eyal Felstaine, Eldad Chai, Niv Gilboa, Avi Elisha
2008Efficient signature matching with multiple alphabet compression tables.
Shijin Kong, Randy Smith, Cristian Estan
2008Enforcing Behaviour with Anonymity.
Joss Wright, Susan Stepney
2008Evaluating the utility of anonymized network traces for intrusion detection.
Kiran Lakkaraju, Adam J. Slagell
2008Hiding "real" machine from attackers and malware with a minimal virtual machine monitor.
Yan Wen, Jinjing Zhao, Huaimin Wang
2008Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive?
Sherif M. Khattab, Daniel Mossé, Rami G. Melhem
2008LIDeA: a distributed lightweight intrusion detection architecture for sensor networks.
Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou
2008Location privacy based on trusted computing and secure logging.
Urs Hengartner
2008MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks.
Issa Khalil, Saurabh Bagchi
2008On capturing malware dynamics in mobile power-law networks.
Abhijit Bose, Kang G. Shin
2008On the need for user-defined fine-grained access control policies for social networking applications.
Andrew Simpson
2008On the performance of a hybrid intrusion detection architecture for voice over IP systems.
Bazara I. A. Barry, H. Anthony Chan
2008Overbot: a botnet protocol based on Kademlia.
Guenther Starnberger, Christopher Kruegel, Engin Kirda
2008PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications.
Andrea Cirulli, Roberto Di Pietro
2008Parameterized access control: from design to prototype.
Ashish Gehani, Surendar Chandra
2008Relaxed authenticity for data aggregation in wireless sensor networks.
Erik-Oliver Blaß, Joachim Wilke, Martina Zitterbart
2008RepTrap: a novel attack on feedback-based reputation systems.
Yafei Yang, Qinyuan Feng, Yan Lindsay Sun, Yafei Dai
2008Reputation and Audits for Self-Organizing Storage.
Nouha Oualha, Yves Roudier
2008SMM rootkits: a new breed of OS independent malware.
Shawn Embleton, Sherri Sparks, Cliff C. Zou
2008Scalable Privacy Protecting Scheme through Distributed RFID Tag Identification.
Sepideh Fouladgar, Hossam Afifi
2008Scalable and efficient provable data possession.
Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik
2008Securely computing an approximate median in wireless sensor networks.
Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia
2008Source location privacy against laptop-class attacks in sensor networks.
Yi Ouyang, Zhengyi Le, Donggang Liu, James Ford, Fillia Makedon
2008Subjective logic based trust model for mobile ad hoc networks.
Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula
2008Sybil proof anonymous reputation management.
Wolf Müller, Henryk Plötz, Jens-Peter Redlich, Takashi Shiraki
2008Towards more secure systems: how to combine expert evaluations.
Marco Benini, Sabrina Sicari
2008Unassailable sensor networks.
Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan
2008Visual-similarity-based phishing detection.
Eric Medvet, Engin Kirda, Christopher Kruegel
2008Voice pharming attack and the trust of VoIP.
Xinyuan Wang, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera
2008rfidDOT: RFID delegation and ownership transfer made simple.
Tassos Dimitriou