default search action
4. SecureComm 2008: Istanbul, Turkey
- Albert Levi, Peng Liu, Refik Molva:
4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008. ACM 2011, ISBN 978-1-60558-241-2
4th International ICST Conference on Security and Privacy in Communication Networks (SECURECOMM 2008)
Network intrusion detection I
- Shijin Kong, Randy Smith, Cristian Estan:
Efficient signature matching with multiple alphabet compression tables. 1 - Anh Le, Raouf Boutaba, Ehab Al-Shaer:
Correlation-based load balancing for network intrusion detection and prevention systems. 2 - Eyal Felstaine, Eldad Chai, Niv Gilboa, Avi Elisha:
Distributed flow detection over multi path sessions. 3
Wireless network security I
- Erik-Oliver Blaß, Joachim Wilke, Martina Zitterbart:
Relaxed authenticity for data aggregation in wireless sensor networks. 4 - Yi Ouyang, Zhengyi Le, Donggang Liu, James Ford, Fillia Makedon:
Source location privacy against laptop-class attacks in sensor networks. 5 - Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Securely computing an approximate median in wireless sensor networks. 6
Reputation management, storage server security, and IBE
- Wolf Müller, Henryk Plötz, Jens-Peter Redlich, Takashi Shiraki:
Sybil proof anonymous reputation management. 7 - Yafei Yang, Qinyuan Feng, Yan Lindsay Sun, Yafei Dai:
RepTrap: a novel attack on feedback-based reputation systems. 8 - Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik:
Scalable and efficient provable data possession. 9 - Ayse Gül Karatop, Erkay Savas:
An identity-based key infrastructure suitable for messaging and its application to e-mail. 10
Malware
- Shawn Embleton, Sherri Sparks, Cliff C. Zou:
SMM rootkits: a new breed of OS independent malware. 11 - Abhijit Bose, Kang G. Shin:
On capturing malware dynamics in mobile power-law networks. 12 - Guenther Starnberger, Christopher Kruegel, Engin Kirda:
Overbot: a botnet protocol based on Kademlia. 13 - Yuanyuan Zeng, Xin Hu, Haixiong Wang, Kang G. Shin, Abhijit Bose:
Containment of network worms via per-process rate-limiting. 14
Privacy, anonymity, and steganalysis
- Lingjun Li, Liusheng Huang, Wei Yang, Xinxin Zhao, Zhenshan Yu, Zhili Chen:
Detection of word shift steganography in PDF document. 15 - Urs Hengartner:
Location privacy based on trusted computing and secure logging. 16 - Kiran Lakkaraju, Adam J. Slagell:
Evaluating the utility of anonymized network traces for intrusion detection. 17 - Shucheng Yu, Kui Ren, Wenjing Lou:
Attribute-based on-demand multicast group setup with membership anonymity. 18
Network intrusion detection II
- Bazara I. A. Barry, H. Anthony Chan:
On the performance of a hybrid intrusion detection architecture for voice over IP systems. 19 - Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou:
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. 20 - Yan Wen, Jinjing Zhao, Huaimin Wang:
Hiding "real" machine from attackers and malware with a minimal virtual machine monitor. 21 - Eric Medvet, Engin Kirda, Christopher Kruegel:
Visual-similarity-based phishing detection. 22
Emerging attacks
- Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim:
Attacking the Kad network. 23 - Xinyuan Wang, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera:
Voice pharming attack and the trust of VoIP. 24 - Min Shao, Sencun Zhu, Guohong Cao, Tom La Porta, Prasant Mohapatra:
A cross-layer dropping attack in video streaming over ad hoc networks. 25
Wireless network security II
- Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan:
Unassailable sensor networks. 26 - Sherif M. Khattab, Daniel Mossé, Rami G. Melhem:
Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive? 27 - Issa Khalil, Saurabh Bagchi:
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks. 28
Wireless network security III
- Andrea Cirulli, Roberto Di Pietro:
PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications. 29 - Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula:
Subjective logic based trust model for mobile ad hoc networks. 30 - Min Gyu Cho, Kang G. Shin:
ARCMA: attack-resilient collaborative message authentication in wireless sensor networks. 31 - Xia Wang, Johnny Wong, Wensheng Zhang:
A heterogeneity-aware framework for group key management in wireless mesh networks. 32
Miscellaneous
- Tansu Alpcan, Sinan Kesici, Daniel Bicher, Mehmet Kivanç Mihçak, Christian Bauckhage, Seyit Ahmet Çamtepe:
A lightweight biometric signature scheme for user authentication over networks. 33 - Tassos Dimitriou:
rfidDOT: RFID delegation and ownership transfer made simple. 34 - Ashish Gehani, Surendar Chandra:
Parameterized access control: from design to prototype. 35 - Marco Benini, Sabrina Sicari:
Towards more secure systems: how to combine expert evaluations. 36
1st International ICST Workshop on Applications of Private and Anonymous Communications (AIPACA 2008)
- Yoshifumi Manabe, Tatsuaki Okamoto:
Anonymous return route information for onion based mix-nets. - Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker:
BitBlender: Light-Weight Anonymity for BitTorrent. - Sepideh Fouladgar, Hossam Afifi:
Scalable Privacy Protecting Scheme through Distributed RFID Tag Identification. - Joss Wright, Susan Stepney:
Enforcing Behaviour with Anonymity.
1st International ICST Workshop on Security in Opportunistic and Social Networks (SOSOC 2008)
- Andrew Simpson:
On the need for user-defined fine-grained access control policies for social networking applications. - Mathias Fischer, Guenter Schaefer, Robert Karl Schmidt, Thorsten Strufe:
A Key Management Solution for Overlay-Live-Streaming. - Nouha Oualha, Yves Roudier:
Reputation and Audits for Self-Organizing Storage.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.