SecureComm C

36 papers

YearTitle / Authors
2012Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers
Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis
2011An On-Line Learning Statistical Model to Detect Malicious Web Requests.
Harald Lampesberger, Philipp Winter, Markus Zeilinger, Eckehard Hermann
2011Analyzing the Gold Star Scheme in a Split Tor Network.
Benedikt Westermann, Pern Hui Chia, Dogan Kesdogan
2011Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag.
Thomas Plos, Martin Feldhofer
2011Anonymity for Key-Trees with Adaptive Adversaries.
Michael Beye, Thijs Veugen
2011Behavioral Mimicry Covert Communication.
Seyed Ali Ahmadzadeh, Gordon B. Agnew
2011Build and Test Your Own Network Configuration.
Saeed Al-Haj, Padmalochan Bera, Ehab Al-Shaer
2011Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks.
Hemant Sengar, Xinyuan Wang, Arthur Nichols
2011CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services.
Huijun Xiong, Xinwen Zhang, Wei Zhu, Danfeng Yao
2011Context-Related Access Control for Mobile Caching.
Zhi Xu, Kun Bai, Sencun Zhu, Leslie S. Liu, Randy Moulic
2011Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks.
Chowdhury Sayeed Hyder, Brendan Grebur, Li Xiao
2011Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning.
Shimrit Tzur-David, Kiril Lashchiver, Danny Dolev, Tal Anker
2011Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks.
Zhiyun Qian, Zhuoqing Morley Mao, Ammar Rayes, David Jaffe
2011Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards.
Wojciech Mostowski, Pim Vullers
2011Insecurity in Public-Safety Communications: APCO Project 25.
Stephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann, Matthew Robert
2011K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access.
Saman Zarandioon, Danfeng (Daphne) Yao, Vinod Ganapathy
2011Location Privacy and Attacker Knowledge: Who Are We Fighting against?
Rinku Dewri
2011Multi-party Private Web Search with Untrusted Partners.
Cristina Romero-Tris, Jordi Castellà-Roca, Alexandre Viejo
2011NetFlow Based Network Protection.
Vojtech Krmicek, Jan Vykopal
2011On Detection of Erratic Arguments.
Jin Han, Qiang Yan, Robert H. Deng, Debin Gao
2011Optimistic Fair Exchange of Ring Signatures.
Lie Qu, Guilin Wang, Yi Mu
2011PP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks.
Manuel Crotti, Diego Ferri, Francesco Gringoli, Manuel Peli, Luca Salgarelli
2011Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines.
Hanjun Gao, Lina Wang, Wei Liu, Yang Peng, Hao Zhang
2011Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data.
Akshay Dua, Nirupama Bulusu, Wu-chang Feng
2011SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits.
Deguang Kong, Donghai Tian, Peng Liu, Dinghao Wu
2011Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems.
Gaspar Modelo-Howard, Jevin Sweval, Saurabh Bagchi
2011Secure and Practical Key Distribution for RFID-Enabled Supply Chains.
Tieyan Li, Yingjiu Li, Guilin Wang
2011Security Analysis of Leap-of-Faith Protocols.
Viet Pham, Tuomas Aura
2011Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract].
Chunyu Tang, David A. Naumann, Susanne Wetzel
2011T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks.
Steffen Wagner, Christoph Krauß, Claudia Eckert
2011Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots.
Deepa Srinivasan, Xuxian Jiang
2011Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane.
Sarbari Mitra, Ratna Dutta, Sourav Mukhopadhyay
2011Trading Elephants for Ants: Efficient Post-attack Reconstitution.
Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia
2011Unilateral Antidotes to DNS Poisoning.
Amir Herzberg, Haya Schulmann
2011Winning with DNS Failures: Strategies for Faster Botnet Detection.
Sandeep Yadav, A. L. Narasimha Reddy
2011v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks.
Amiya Kumar Maji, Saurabh Bagchi