


default search action
7. SecureComm 2011: London, UK
- Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis:

Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 96, Springer 2012, ISBN 978-3-642-31908-2
Network Intrusion Detection
- Zhiyun Qian

, Zhuoqing Morley Mao, Ammar Rayes, David Jaffe:
Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks. 1-18 - Harald Lampesberger

, Philipp Winter, Markus Zeilinger, Eckehard Hermann:
An On-Line Learning Statistical Model to Detect Malicious Web Requests. 19-38 - Gaspar Modelo-Howard, Jevin Sweval

, Saurabh Bagchi:
Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems. 39-58
Anonymity and Privacy (I)
- Saman Zarandioon, Danfeng (Daphne) Yao

, Vinod Ganapathy:
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access. 59-76 - Benedikt Westermann, Pern Hui Chia, Dogan Kesdogan:

Analyzing the Gold Star Scheme in a Split Tor Network. 77-95 - Rinku Dewri:

Location Privacy and Attacker Knowledge: Who Are We Fighting against? 96-115
Wireless Security (I)
- Stephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann

, Matthew Robert:
Insecurity in Public-Safety Communications: APCO Project 25. 116-133 - Seyed Ali Ahmadzadeh, Gordon B. Agnew:

Behavioral Mimicry Covert Communication. 134-153 - Chowdhury Sayeed Hyder, Brendan Grebur, Li Xiao:

Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks. 154-171
System Security
- Jin Han, Qiang Yan, Robert H. Deng

, Debin Gao
:
On Detection of Erratic Arguments. 172-189 - Deguang Kong, Donghai Tian, Peng Liu, Dinghao Wu:

SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. 190-208 - Deepa Srinivasan, Xuxian Jiang:

Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots. 209-226
Anonymity and Privacy (II)
- Lie Qu, Guilin Wang, Yi Mu:

Optimistic Fair Exchange of Ring Signatures. 227-242 - Wojciech Mostowski, Pim Vullers:

Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards. 243-260 - Cristina Romero-Tris

, Jordi Castellà-Roca, Alexandre Viejo
:
Multi-party Private Web Search with Untrusted Partners. 261-280
DNS and Routing Security
- Amiya Kumar Maji, Saurabh Bagchi:

v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks. 281-302 - Shimrit Tzur-David, Kiril Lashchiver, Danny Dolev, Tal Anker:

Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning. 303-318 - Amir Herzberg

, Haya Schulmann:
Unilateral Antidotes to DNS Poisoning. 319-336
Key Management
- Viet Pham

, Tuomas Aura:
Security Analysis of Leap-of-Faith Protocols. 337-355 - Tieyan Li, Yingjiu Li, Guilin Wang:

Secure and Practical Key Distribution for RFID-Enabled Supply Chains. 356-372 - Sarbari Mitra, Ratna Dutta, Sourav Mukhopadhyay:

Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane. 373-388
Wireless Security (II)
- Zhi Xu, Kun Bai, Sencun Zhu, Leslie S. Liu, Randy Moulic:

Context-Related Access Control for Mobile Caching. 389-408 - Michael Beye, Thijs Veugen:

Anonymity for Key-Trees with Adaptive Adversaries. 409-425
Short Papers
- Thomas Plos, Martin Feldhofer:

Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag. 426-435 - Hanjun Gao, Lina Wang, Wei Liu, Yang Peng, Hao Zhang:

Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines. 436-445 - Sandeep Yadav, A. L. Narasimha Reddy:

Winning with DNS Failures: Strategies for Faster Botnet Detection. 446-459 - Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou

, Anup K. Ghosh, Sushil Jajodia
:
Trading Elephants for Ants: Efficient Post-attack Reconstitution. 460-469 - Akshay Dua, Nirupama Bulusu, Wu-chang Feng:

Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data. 470-479 - Chunyu Tang, David A. Naumann

, Susanne Wetzel:
Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract]. 480-490 - Huijun Xiong, Xinwen Zhang, Wei Zhu, Danfeng Yao

:
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services. 491-500 - Hemant Sengar, Xinyuan Wang, Arthur Nichols:

Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks. 501-510 - Steffen Wagner, Christoph Krauß

, Claudia Eckert:
T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks. 511-521 - Saeed Al-Haj, Padmalochan Bera, Ehab Al-Shaer:

Build and Test Your Own Network Configuration. 522-532 - Manuel Crotti, Diego Ferri

, Francesco Gringoli
, Manuel Peli, Luca Salgarelli:
PP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks. 533-542 - Vojtech Krmicek, Jan Vykopal

:
NetFlow Based Network Protection. 543-546

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














