SecureComm C

29 papers

YearTitle / Authors
2010A Formal Definition of Online Abuse-Freeness.
Ralf Küsters, Henning Schnoor, Tomasz Truderung
2010A Generic Construction of Dynamic Single Sign-on with Strong Security.
Jinguang Han, Yi Mu, Willy Susilo, Jun Yan
2010A New Information Leakage Measure for Anonymity Protocols.
Sami Zhioua
2010A Study on False Channel Condition Reporting Attacks in Wireless Networks.
Dongho Kim, Yih-Chun Hu
2010Analyzing and Exploiting Network Behaviors of Malware.
Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu
2010Attacking Beacon-Enabled 802.15.4 Networks.
Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem A. Beyah
2010CED
Luciana Marconi, Mauro Conti, Roberto Di Pietro
2010Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services.
Patrick Traynor
2010Context-Aware Usage Control for Android.
Guangdong Bai, Liang Gu, Tao Feng, Yao Guo, Xiangqun Chen
2010DeCore: Detecting Content Repurposing Attacks on Clients' Systems.
Smitha Sundareswaran, Anna Cinzia Squicciarini
2010Efficient Isolation of Trusted Subsystems in Embedded Systems.
Raoul Strackx, Frank Piessens, Bart Preneel
2010Enhancing Host Security Using External Environment Sensors.
Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu
2010Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast.
Omar I. Al-Bataineh, Ron van der Meyden
2010FADE: Secure Overlay Cloud Storage with File Assured Deletion.
Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia J. Perlman
2010Hidden Markov Models for Automated Protocol Learning.
Sean Whalen, Matt Bishop, James P. Crutchfield
2010Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes.
Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang
2010Inexpensive Email Addresses
Aram Yegenian, Tassos Dimitriou
2010On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS.
Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley
2010Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks.
Jihyuk Choi, Jerry T. Chiang, Dongho Kim, Yih-Chun Hu
2010Privacy Administration in Distributed Service Infrastructure.
Nabil Ajam, Nora Cuppens-Boulahia, Frédéric Cuppens
2010Realizing a Source Authentic Internet.
Toby Ehrenkranz, Jun Li, Patrick D. McDaniel
2010SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection.
Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi
2010Saving Energy on WiFi with Required IPsec.
Youngsang Shin, Steven A. Myers, Minaxi Gupta
2010Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.
Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou
2010Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings
Sushil Jajodia, Jianying Zhou
2010Supporting Publication and Subscription Confidentiality in Pub/Sub Networks.
Mihaela Ion, Giovanni Russello, Bruno Crispo
2010Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly.
Andrew J. Kalafut, Minaxi Gupta, Pairoj Rattadilok, Pragneshkumar Patel
2010The Hitchhiker's Guide to DNS Cache Poisoning.
Sooel Son, Vitaly Shmatikov
2010Transparent Protection of Commodity OS Kernels Using Hardware Virtualization.
Michael C. Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh