


default search action
6. SecureComm 2010: Singapore
- Sushil Jajodia, Jianying Zhou:

Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 50, Springer 2010, ISBN 978-3-642-16160-5
Part 1 / Malware and Email Security
- Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi:

SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection. 1-19 - Jose Andre Morales

, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu:
Analyzing and Exploiting Network Behaviors of Malware. 20-34 - Aram Yegenian, Tassos Dimitriou:

Inexpensive Email Addresses An Email Spam-Combating System. 35-52
Part 2 / Anonymity and Privacy
- Nabil Ajam, Nora Cuppens-Boulahia, Frédéric Cuppens:

Privacy Administration in Distributed Service Infrastructure. 53-70 - Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:

On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS. 71-88 - Ming Li, Shucheng Yu

, Kui Ren
, Wenjing Lou:
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. 89-106
Part 3 / Wireless Security
- Dongho Kim, Yih-Chun Hu:

A Study on False Channel Condition Reporting Attacks in Wireless Networks. 107-124 - Patrick Traynor:

Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. 125-143 - Youngsang Shin, Steven A. Myers, Minaxi Gupta:

Saving Energy on WiFi with Required IPsec. 144-161
Part 4 / Systems Security - I
- Michael C. Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang

, Siarhei Liakh:
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. 162-180 - Jinguang Han

, Yi Mu, Willy Susilo
, Jun Yan
:
A Generic Construction of Dynamic Single Sign-on with Strong Security. 181-198 - Smitha Sundareswaran, Anna Cinzia Squicciarini

:
DeCore: Detecting Content Repurposing Attacks on Clients' Systems. 199-216
Part 5 / Network Security - I
- Toby Ehrenkranz, Jun Li, Patrick D. McDaniel:

Realizing a Source Authentic Internet. 217-234 - Jihyuk Choi, Jerry T. Chiang, Dongho Kim, Yih-Chun Hu:

Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks. 235-252 - Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem A. Beyah

:
Attacking Beacon-Enabled 802.15.4 Networks. 253-271 - Mihaela Ion, Giovanni Russello, Bruno Crispo:

Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. 272-289
Part 6 / Security Protocols - I
- Luciana Marconi, Mauro Conti

, Roberto Di Pietro
:
CED2: Communication Efficient Disjointness Decision. 290-306 - Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang:

Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes. 307-325 - Guangdong Bai, Liang Gu, Tao Feng, Yao Guo

, Xiangqun Chen:
Context-Aware Usage Control for Android. 326-343
Part 7 / System Security - II
- Raoul Strackx, Frank Piessens, Bart Preneel

:
Efficient Isolation of Trusted Subsystems in Embedded Systems. 344-361 - Ee-Chien Chang

, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu:
Enhancing Host Security Using External Environment Sensors. 362-379 - Yang Tang, Patrick P. C. Lee

, John C. S. Lui, Radia J. Perlman:
FADE: Secure Overlay Cloud Storage with File Assured Deletion. 380-397
Part 8 / Security Protocols - II
- Sami Zhioua

:
A New Information Leakage Measure for Anonymity Protocols. 398-414 - Sean Whalen, Matt Bishop

, James P. Crutchfield:
Hidden Markov Models for Automated Protocol Learning. 415-428 - Omar I. Al-Bataineh, Ron van der Meyden

:
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast. 429-447
Part 9 / Network Security - II
- Andrew J. Kalafut, Minaxi Gupta, Pairoj Rattadilok, Pragneshkumar Patel:

Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly. 448-465 - Sooel Son

, Vitaly Shmatikov:
The Hitchhiker's Guide to DNS Cache Poisoning. 466-483 - Ralf Küsters, Henning Schnoor, Tomasz Truderung:

A Formal Definition of Online Abuse-Freeness. 484-497

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














