default search action
6. SecureComm 2010: Singapore
- Sushil Jajodia, Jianying Zhou:
Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 50, Springer 2010, ISBN 978-3-642-16160-5
Part 1 / Malware and Email Security
- Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi:
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection. 1-19 - Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu:
Analyzing and Exploiting Network Behaviors of Malware. 20-34 - Aram Yegenian, Tassos Dimitriou:
Inexpensive Email Addresses An Email Spam-Combating System. 35-52
Part 2 / Anonymity and Privacy
- Nabil Ajam, Nora Cuppens-Boulahia, Frédéric Cuppens:
Privacy Administration in Distributed Service Infrastructure. 53-70 - Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley:
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS. 71-88 - Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou:
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. 89-106
Part 3 / Wireless Security
- Dongho Kim, Yih-Chun Hu:
A Study on False Channel Condition Reporting Attacks in Wireless Networks. 107-124 - Patrick Traynor:
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. 125-143 - Youngsang Shin, Steven A. Myers, Minaxi Gupta:
Saving Energy on WiFi with Required IPsec. 144-161
Part 4 / Systems Security - I
- Michael C. Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh:
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. 162-180 - Jinguang Han, Yi Mu, Willy Susilo, Jun Yan:
A Generic Construction of Dynamic Single Sign-on with Strong Security. 181-198 - Smitha Sundareswaran, Anna Cinzia Squicciarini:
DeCore: Detecting Content Repurposing Attacks on Clients' Systems. 199-216
Part 5 / Network Security - I
- Toby Ehrenkranz, Jun Li, Patrick D. McDaniel:
Realizing a Source Authentic Internet. 217-234 - Jihyuk Choi, Jerry T. Chiang, Dongho Kim, Yih-Chun Hu:
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks. 235-252 - Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem A. Beyah:
Attacking Beacon-Enabled 802.15.4 Networks. 253-271 - Mihaela Ion, Giovanni Russello, Bruno Crispo:
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. 272-289
Part 6 / Security Protocols - I
- Luciana Marconi, Mauro Conti, Roberto Di Pietro:
CED2: Communication Efficient Disjointness Decision. 290-306 - Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang:
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes. 307-325 - Guangdong Bai, Liang Gu, Tao Feng, Yao Guo, Xiangqun Chen:
Context-Aware Usage Control for Android. 326-343
Part 7 / System Security - II
- Raoul Strackx, Frank Piessens, Bart Preneel:
Efficient Isolation of Trusted Subsystems in Embedded Systems. 344-361 - Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu:
Enhancing Host Security Using External Environment Sensors. 362-379 - Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia J. Perlman:
FADE: Secure Overlay Cloud Storage with File Assured Deletion. 380-397
Part 8 / Security Protocols - II
- Sami Zhioua:
A New Information Leakage Measure for Anonymity Protocols. 398-414 - Sean Whalen, Matt Bishop, James P. Crutchfield:
Hidden Markov Models for Automated Protocol Learning. 415-428 - Omar I. Al-Bataineh, Ron van der Meyden:
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast. 429-447
Part 9 / Network Security - II
- Andrew J. Kalafut, Minaxi Gupta, Pairoj Rattadilok, Pragneshkumar Patel:
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly. 448-465 - Sooel Son, Vitaly Shmatikov:
The Hitchhiker's Guide to DNS Cache Poisoning. 466-483 - Ralf Küsters, Henning Schnoor, Tomasz Truderung:
A Formal Definition of Online Abuse-Freeness. 484-497
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.