


default search action
4th AsiaCCS 2009: Sydney, Australia
- Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan:

Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009. ACM 2009, ISBN 978-1-60558-394-5
Keynote
- Paul A. Karger:

Securing virtual machine monitors: what is needed? 1 - Bhavani Thuraisingham:

Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners. 2
Network security-I
- Wei Lu

, Mahbod Tavallaee, Ali A. Ghorbani:
Automatic discovery of botnet communities on large-scale communication networks. 1-10 - Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson:

Automating analysis of large-scale botnet probing events. 11-22 - Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim

:
Towards complete node enumeration in a peer-to-peer botnet. 23-34
Software security
- Fei Yan, Philip W. L. Fong:

Efficient IRM enforcement of history-based access control policies. 35-46 - Phu H. Phung

, David Sands, Andrey Chudnov:
Lightweight self-protecting JavaScript. 47-60
Network security-II
- Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui Yang, Xuxian Jiang:

On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. 61-69 - Rui Zhang, Goichiro Hanaoka, Hideki Imai:

A generic construction of useful client puzzles. 70-79 - Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis

:
An integrated approach to detection of fast and slow scanning worms. 80-91 - Mark Manulis

, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated wireless roaming via tunnels: making mobile guests feel at home. 92-103
Systems security
- Kari Kostiainen, Jan-Erik Ekberg, N. Asokan

, Aarne Rantala:
On-board credentials with open provisioning. 104-115 - Klaus Kursawe, Dries Schellekens:

Flexible muTPMs through disembedding. 116-124 - Sherri Sparks, Shawn Embleton, Cliff Changchun Zou:

A chipset level network backdoor: bypassing host-based firewall & IDS. 125-134 - Khalid Elbadawi, Ehab Al-Shaer:

TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay. 135-145
Crypto protocols
- M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:

Universally composable contributory group key exchange. 146-156 - Jung Yeon Hwang, Dong Hoon Lee, Moti Yung:

Universal forgery of the identity-based sequential aggregate signature scheme. 157-160 - Kazukuni Kobara, SeongHan Shin, Mario Strefler:

Partnership in key exchange protocols. 161-170
Theory of security
- Kannan Srinathan, Arpita Patra, Ashish Choudhary

, C. Pandu Rangan:
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary. 171-182 - Stefan Fenz, Andreas Ekelhart

:
Formalizing information security knowledge. 183-194
Anonymity and privacy
- Julien Bringer, Hervé Chabanne, Thomas Icart:

Efficient zero-knowledge identification schemes which respect privacy. 195-205 - Han Chen, Pasquale Malacaria:

Quantifying maximal loss of anonymity in protocols. 206-217 - Brian Thompson, Danfeng Yao

:
The union-split algorithm and cluster-based anonymization of social networks. 218-227 - Xavier Boyen:

Hidden credential retrieval from a reusable password. 228-238
Access control
- Robert Craven, Jorge Lobo

, Jiefei Ma, Alessandra Russo
, Emil C. Lupu
, Arosha K. Bandara:
Expressive policy analysis with enhanced system dynamicity. 239-250 - Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro

, Laurent Toutain, Yehia Elrakaiby
:
Semantic context aware security policy deployment. 251-261 - Rakeshbabu Bobba

, Himanshu Khurana, Musab AlTurki
, Farhana Ashraf:
PBES: a policy based encryption system with application to data sharing in the power grid. 262-275 - Xiaohui Liang

, Zhenfu Cao, Huang Lin, Jun Shao:
Attribute based proxy re-encryption with delegating capabilities. 276-286
Security policies and verification
- Adam J. Lee

, Kazuhiro Minami, Nikita Borisov
:
Confidentiality-preserving distributed proofs of conjunctive queries. 287-297 - Qun Ni, Elisa Bertino, Jorge Lobo

:
D-algebra for composing access control policy decisions. 298-309 - Mark Reith, Jianwei Niu, William H. Winsborough:

Toward practical analysis for trust management policy. 310-321
Public key and hash functions
- Jian Weng

, Robert H. Deng
, Xuhua Ding
, Cheng-Kang Chu, Junzuo Lai:
Conditional proxy re-encryption secure against chosen-ciphertext attack. 322-332 - Hai Huang, Zhenfu Cao:

An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. 333-342 - Xiaohui Liang

, Zhenfu Cao, Huang Lin, Dongsheng Xing:
Provably secure and efficient bounded ciphertext policy attribute based encryption. 343-352 - Somitra Kumar Sanadhya

, Palash Sarkar:
A new hash family obtained by modifying the SHA-2 family. 353-363
Short papers-I
- Fabio Massacci

, Gene Tsudik, Artsiom Yautsiukhin
:
Logging key assurance indicators in business processes. 364-367 - Zhiguo Wan, Kui Ren

, Bo Zhu, Bart Preneel
, Ming Gu:
Anonymous user communication for privacy protection in wireless metropolitan mesh networks. 368-371 - Ribao Wei, Dingfeng Ye:

Delegate predicate encryption and its application to anonymous authentication. 372-375 - Hyun Sook Rhee, Jong Hwan Park, Willy Susilo

, Dong Hoon Lee:
Improved searchable public key encryption with designated tester. 376-379
Short papers-II
- Liting Zhang, Wenling Wu, Lei Zhang, Yanjun Li:

A note on Cook's elastic block cipher. 380-383 - Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough:

A conceptual framework for Group-Centric secure information sharing. 384-387 - Chris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong:

Intrusion response cost assessment methodology. 388-391

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














