


default search action
8. SecureComm 2012: Padua, Italy
- Angelos D. Keromytis, Roberto Di Pietro:

Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 106, Springer 2013, ISBN 978-3-642-36882-0 - Sarshad Abubaker, Kui Wu:

DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem. 1-18 - Zhiwei Wang:

Improvement on Ahn et al.'s RSA P-Homomorphic Signature Scheme. 19-28 - Chunhua Chen, Shaohua Tang, Chris J. Mitchell

:
Building General-Purpose Security Services on EMV Payment Cards. 29-44 - Jiangxiao Zhang, Zhoujun Li, Hua Guo:

Anonymous Transferable Conditional E-cash. 45-60 - Jirí Kur, Vashek Matyás, Petr Svenda

:
Two Improvements of Random Key Predistribution for Wireless Sensor Networks. 61-75 - Eun-Kyoung Kim, Patrick D. McDaniel, Thomas La Porta:

A Detection Mechanism for SMS Flooding Attacks in Cellular Networks. 76-93 - Tulio de Souza, Joss Wright, Piers O'Hanlon, Ian Brown:

Set Difference Attacks in Wireless Sensor Networks. 94-111 - Boxuan Gu, Wenbin Zhang, Xiaole Bai, Adam C. Champion, Feng Qin, Dong Xuan:

JSGuard: Shellcode Detection in JavaScript. 112-130 - Matteo Maria Casalino, Michele Mangili, Henrik Plate, Serena Elisa Ponta:

Detection of Configuration Vulnerabilities in Distributed (Web) Environments. 131-148 - Birhanu Eshete

, Adolfo Villafiorita
, Komminist Weldemariam:
BINSPECT: Holistic Analysis and Detection of Malicious Web Pages. 149-166 - Govind Sreekar Shenoy, Jordi Tubella, Antonio González

:
Improving the Resilience of an IDS against Performance Throttling Attacks. 167-184 - Tom Chothia, Marco Cova, Chris Novakovic

, Camilo González Toro:
The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent. 185-202 - Yuxin Meng, Lam-for Kwok

, Wenjuan Li
:
Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection. 203-221 - Xiaokui Shu, Danfeng (Daphne) Yao

:
Data Leak Detection as a Service. 222-240 - Jan Jusko, Martin Rehák:

Revealing Cooperating Hosts by Connection Graph Analysis. 241-255 - Abdun Naser Mahmood

, Md. Enamul Kabir
, Abdul K. Mustafa:
New Multi-dimensional Sorting Based K-Anonymity Microaggregation for Statistical Disclosure Control. 256-272 - Peng Zhou, Xiapu Luo

, Rocky K. C. Chang:
More Anonymity through Trust Degree in Trust-Based Onion Routing. 273-291 - Jiawei Yuan, Shucheng Yu

:
Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing. 292-309 - Ehab Al-Shaer, Qi Duan, Jafar Haadi Jafarian:

Random Host Mutation for Moving Target Defense. 310-327 - Ryan M. Gerdes, Mani Mina, Thomas E. Daniels:

Towards a Framework for Evaluating the Security of Physical-Layer Identification Systems. 328-348 - Seyed Amir Iranmanesh, Hemant Sengar, Haining Wang:

A Voice Spam Filter to Clean Subscribers' Mailbox. 349-367

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














