


default search action
5. SecureComm 2009: Athens, Greece
- Yan Chen, Tassos Dimitriou, Jianying Zhou:

Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 19, Springer 2009, ISBN 978-3-642-05283-5
Part 1 / Wireless Network Security I
- Liang Cai, Gabriel Maganis, Hui Zang, Hao Chen

:
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages. 1-20 - Ioannis Broustis, Konstantinos Pelechrinis, Dimitris Syrivelis, Srikanth V. Krishnamurthy

, Leandros Tassiulas:
FIJI: Fighting Implicit Jamming in 802.11 WLANs. 21-40 - Mansoor Alicherry, Angelos D. Keromytis, Angelos Stavrou

:
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. 41-50
Part 2 / Network Intrusion Detection
- Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo:

Baiting Inside Attackers Using Decoy Documents. 51-70 - Shimrit Tzur-David, Danny Dolev, Tal Anker:

MULAN: Multi-Level Adaptive Network Filter. 71-90 - Guilherme Fernandes, Philippe Owezarski:

Automated Classification of Network Traffic Anomalies. 91-100
Part 3 / Security and Privacy for the General Internet
- Magdalena Payeras-Capellà

, Macià Mut Puigserver, Andreu Pere Isern-Deyà
, Josep Lluís Ferrer-Gomila
, Llorenç Huguet i Rotger:
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets. 101-120 - Ghassan Karame, David Gubler, Srdjan Capkun:

On the Security of Bottleneck Bandwidth Estimation Techniques. 121-141 - Andrey Garnaev

, Wade Trappe:
An Eavesdropping Game with SINR as an Objective Function. 142-162
Part 4 / Malware and Misbehavior
- Feng Qian, Zhiyun Qian

, Zhuoqing Morley Mao, Atul Prakash
:
Ensemble: Community-Based Anomaly Detection for Popular Applications. 163-184 - Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen:

Using Failure Information Analysis to Detect Enterprise Zombies. 185-206 - William Kozma

, Loukas Lazos:
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games. 207-227
Part 5 / Wireless Network Security II, Sensor Networks
- Toni Perkovic

, Ivo Stancic, Luka Malisa, Mario Cagalj:
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks. 228-247 - Wassim Znaidi, Marine Minier, Cédric Lauradoux:

Aggregated Authentication (AMAC) Using Universal Hash Functions. 248-264 - Andrea Gabrielli, Mauro Conti

, Roberto Di Pietro
, Luigi V. Mancini
:
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN. 265-284 - Yanjiang Yang, Jianying Zhou

, Robert H. Deng
, Feng Bao:
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. 285-295
Part 6 / Key Management, Credentials, Authentications
- Martijn Oostdijk, Dirk-Jan van Dijk, Maarten Wegdam:

User-Centric Identity Using ePassports. 296-310 - Shucheng Yu

, Kui Ren
, Wenjing Lou, Jin Li:
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. 311-329 - S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, C. Pandu Rangan:

Breaking and Building of Group Inside Signature. 330-339 - Thanassis Tiropanis, Tassos Dimitriou:

Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources. 340-349
Part 7 / Wireless Network Security III
- Julien Freudiger, Maxim Raya, Jean-Pierre Hubaux:

Self-organized Anonymous Authentication in Mobile Ad Hoc Networks. 350-372 - Yi Yang, Sencun Zhu, Guohong Cao, Thomas La Porta:

An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures. 373-393 - Aravind Venkataraman, Raheem A. Beyah

:
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC. 394-416
Part 8 / Secure Multicast, Emerging Technologies
- Yawen Wei, Zhen Yu, Yong Guan:

A Novel Architecture for Secure and Scalable Multicast over IP Network. 417-436 - Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, Nikos Triandopoulos:

Reliable Resource Searching in P2P Networks. 437-447 - Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim

:
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems. 448-458

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














