SIN C

44 papers

YearTitle / Authors
2011A HTTP cookie covert channel.
William Huba, Bo Yuan, Daryl Johnson, Peter Lutz
2011A different algebraic analysis of the ZUC stream cipher.
Mufeed Juma AlMashrafi
2011A model-based attack injection approach for security validation.
Anderson Nunes Paiva Morais, Ana R. Cavalli, Eliane Martins
2011A secure and anonymous cooperative sensing protocol for cognitive radio networks.
Helena Rifà-Pous, Carles Garrigues
2011A sybil attack detection approach using neighboring vehicles in VANET.
Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Nitesh Kumar Prajapati
2011Acceleration of packet filtering using gpgpu.
Manoj Singh Gaur, Vijay Laxmi, Lakshminarayanan V., Kamal Cahndra, Mark Zwolinski
2011Algebraic analysis of GOST encryption algorithm.
Ludmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro
2011Algebraic analysis of the SSS stream cipher.
Mufeed Juma AlMashrafi, Kenneth Koon-Ho Wong, Leonie Simpson, Harry Bartlett, Ed Dawson
2011An approach to enhance the security of remote health monitoring systems.
Mahmoud Elkhodr, Seyed A. Shahrestani, Hon Cheung
2011Collusion resistant fingerprinting of digital audio.
Andrew Z. Tirkel, Thomas E. Hall, Charles F. Osborne, Nicholas Meinhold, Oscar Moreno
2011Corporate networks security evaluation based on attack graphs.
Evgeny Sergeevich Abramov, Artem Viktorovich Andreev, Denis Valerievich Mordvin, Oleg B. Makarevich
2011Counteracting DDoS attacks in WLAN.
Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala
2011Counterfactually reasoning about security.
Manuel Peralta, Supratik Mukhopadhyay, Ramesh Bharadwaj
2011Cryptanalysis of the stream cipher BEAN.
Martin Ågren, Martin Hell
2011Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol.
Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi
2011Detour attack in OLSR.
Manoj Singh Gaur, Vijay Laxmi, Manish Kumar, Rajbir Kaur
2011Different models of information protection system, based on the functional knapsack.
Valeriy O. Osipyan
2011Echo hiding based stereo audio watermarking against pitch-scaling attacks.
Iynkaran Natgunanathan, Yong Xiang
2011Exploration of a hand-based graphical password scheme.
Haichang Gao, Licheng Ma, Jinhua Qiu, Xiyang Liu
2011Extending the Scope of cardspace.
Haitham S. Al-Sinani, Chris J. Mitchell
2011Fault attack to the elliptic curve digital signature algorithm with multiple bit faults.
Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Andrea Palomba
2011Fault tolerance for fight-through: a basis for strategic survival.
Kevin A. Kwiat
2011Formal analysis of usage control policies.
Boulares Ouchenne, Ousmane Koné
2011Improving operation time bounded mission critical systems' attack-survivability through controlled source-code transformation.
Bogdan Korel, Shangping Ren, Kevin A. Kwiat, Arnaud Auguste, Alban Vignaux
2011Logic based authorization program and its implementation.
Chun Ruan, Seyed A. Shahrestani
2011Microcontroller-based implementation of parsekey+ for limited resources embedded applications.
Atilla Elçi, Behnam Rahnama, Reza Makvandi
2011Model checking security policy model using both UML static and dynamic diagrams.
Liang Cheng, Yang Zhang
2011Obscurity of network security course curriculum.
Suleyman Kondakci
2011On automatic detection of SQL injection attacks by the feature extraction of the single character.
Michio Sonoda, Takeshi Matsuda, Daiki Koizumi, Shigeichi Hirasawa
2011On the impacts of join and leave on the propagation ratio of topology-aware active worms.
Ahmad Jafarabadi, Mohammad Abdollahi Azgomi
2011On the security and practicality of a buyer seller watermarking protocol for DRM.
Geong Sen Poh, Muhammad Reza Z'aba
2011Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011
Mehmet A. Orgun, Atilla Elçi, Oleg B. Makarevich, Sorin A. Huss, Josef Pieprzyk, Lyudmila K. Babenko, Alexander G. Chefranov, Rajan Shankaran
2011Proposal and implementation of enhanced HDD authentication that enables self-wipe.
Zhaogong Guo, Kouichi Yasaki, Yousuke Nakamura, Kazuaki Nimura, Isamu Yamada
2011Rational distance-bounding protocols over noisy channel.
Long Hoang Nguyen
2011Research on survivability metrics based on survivable process of network system.
Liang Ming, Minhuan Huang, Dongxia Wang, Xiaohui Kuang, Chunlei Wang, Xuewei Feng
2011Rethinking cyber security.
Vijay Varadharajan
2011Secure random number generation in wireless sensor networks.
Giuseppe Lo Re, Fabrizio Milazzo, Marco Ortolani
2011Security analysis of a femtocell device.
Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert
2011TW-KEAP: an efficient four-party key exchange protocol for end-to-end communications.
Wei-Kuo Chiang, Jian-Hao Chen
2011The optimal linear multi-secret sharing scheme for non-threshold access structure(student contribution).
Shu-guang Dai, Chun-Ming Tang, Yuenai Chen
2011Towards hiding federated digital identity: stop-dissemination mechanism in content-centric networking.
Amine Elabidi, Ghazi Ben Ayed, Sonia Mettali Gammar, Farouk Kamoun
2011Trust based fusion over noisy channels through anomaly detection in cognitive radio networks.
Shameek Bhattacharjee, Saptarshi Debroy, Mainak Chatterjee, Kevin A. Kwiat
2011Using decision trees for generating adaptive SPIT signatures.
Mohamed Nassar, Sylvain Martin, Guy Leduc, Olivier Festor
2011WinSEND: Windows SEcure Neighbor Discovery.
Hosnieh Rafiee, Ahmad AlSa'deh, Christoph Meinel