


default search action
4. SecureComm 2008: Istanbul, Turkey
- Albert Levi, Peng Liu, Refik Molva:

4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008. ACM 2011, ISBN 978-1-60558-241-2
4th International ICST Conference on Security and Privacy in Communication Networks (SECURECOMM 2008)
Network intrusion detection I
- Shijin Kong, Randy Smith, Cristian Estan:

Efficient signature matching with multiple alphabet compression tables. 1 - Anh Le, Raouf Boutaba, Ehab Al-Shaer:

Correlation-based load balancing for network intrusion detection and prevention systems. 2 - Eyal Felstaine, Eldad Chai, Niv Gilboa

, Avi Elisha:
Distributed flow detection over multi path sessions. 3
Wireless network security I
- Erik-Oliver Blaß, Joachim Wilke, Martina Zitterbart:

Relaxed authenticity for data aggregation in wireless sensor networks. 4 - Yi Ouyang, Zhengyi Le, Donggang Liu, James Ford, Fillia Makedon:

Source location privacy against laptop-class attacks in sensor networks. 5 - Sankardas Roy, Mauro Conti

, Sanjeev Setia, Sushil Jajodia:
Securely computing an approximate median in wireless sensor networks. 6
Reputation management, storage server security, and IBE
- Wolf Müller, Henryk Plötz, Jens-Peter Redlich, Takashi Shiraki:

Sybil proof anonymous reputation management. 7 - Yafei Yang

, Qinyuan Feng, Yan Lindsay Sun, Yafei Dai:
RepTrap: a novel attack on feedback-based reputation systems. 8 - Giuseppe Ateniese

, Roberto Di Pietro
, Luigi V. Mancini
, Gene Tsudik:
Scalable and efficient provable data possession. 9 - Ayse Gül Karatop, Erkay Savas:

An identity-based key infrastructure suitable for messaging and its application to e-mail. 10
Malware
- Shawn Embleton, Sherri Sparks, Cliff C. Zou:

SMM rootkits: a new breed of OS independent malware. 11 - Abhijit Bose, Kang G. Shin:

On capturing malware dynamics in mobile power-law networks. 12 - Guenther Starnberger, Christopher Kruegel, Engin Kirda:

Overbot: a botnet protocol based on Kademlia. 13 - Yuanyuan Zeng, Xin Hu, Haixiong Wang, Kang G. Shin, Abhijit Bose:

Containment of network worms via per-process rate-limiting. 14
Privacy, anonymity, and steganalysis
- Lingjun Li, Liusheng Huang, Wei Yang, Xinxin Zhao, Zhenshan Yu, Zhili Chen:

Detection of word shift steganography in PDF document. 15 - Urs Hengartner:

Location privacy based on trusted computing and secure logging. 16 - Kiran Lakkaraju, Adam J. Slagell:

Evaluating the utility of anonymized network traces for intrusion detection. 17 - Shucheng Yu

, Kui Ren
, Wenjing Lou:
Attribute-based on-demand multicast group setup with membership anonymity. 18
Network intrusion detection II
- Bazara I. A. Barry, H. Anthony Chan:

On the performance of a hybrid intrusion detection architecture for voice over IP systems. 19 - Ioannis Krontiris, Thanassis Giannetsos

, Tassos Dimitriou:
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. 20 - Yan Wen, Jinjing Zhao, Huaimin Wang:

Hiding "real" machine from attackers and malware with a minimal virtual machine monitor. 21 - Eric Medvet

, Engin Kirda, Christopher Kruegel:
Visual-similarity-based phishing detection. 22
Emerging attacks
- Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim

:
Attacking the Kad network. 23 - Xinyuan Wang, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera:

Voice pharming attack and the trust of VoIP. 24 - Min Shao, Sencun Zhu, Guohong Cao, Tom La Porta, Prasant Mohapatra:

A cross-layer dropping attack in video streaming over ad hoc networks. 25
Wireless network security II
- Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan:

Unassailable sensor networks. 26 - Sherif M. Khattab

, Daniel Mossé, Rami G. Melhem:
Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive? 27 - Issa Khalil

, Saurabh Bagchi:
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks. 28
Wireless network security III
- Andrea Cirulli, Roberto Di Pietro

:
PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications. 29 - Venkatesan Balakrishnan, Vijay Varadharajan

, Udaya Kiran Tupakula:
Subjective logic based trust model for mobile ad hoc networks. 30 - Min Gyu Cho, Kang G. Shin:

ARCMA: attack-resilient collaborative message authentication in wireless sensor networks. 31 - Xia Wang, Johnny Wong, Wensheng Zhang:

A heterogeneity-aware framework for group key management in wireless mesh networks. 32
Miscellaneous
- Tansu Alpcan

, Sinan Kesici, Daniel Bicher, Mehmet Kivanç Mihçak, Christian Bauckhage
, Seyit Ahmet Çamtepe
:
A lightweight biometric signature scheme for user authentication over networks. 33 - Tassos Dimitriou:

rfidDOT: RFID delegation and ownership transfer made simple. 34 - Ashish Gehani, Surendar Chandra:

Parameterized access control: from design to prototype. 35 - Marco Benini, Sabrina Sicari:

Towards more secure systems: how to combine expert evaluations. 36
1st International ICST Workshop on Applications of Private and Anonymous Communications (AIPACA 2008)
- Yoshifumi Manabe, Tatsuaki Okamoto:

Anonymous return route information for onion based mix-nets. - Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker

:
BitBlender: Light-Weight Anonymity for BitTorrent. - Sepideh Fouladgar, Hossam Afifi:

Scalable Privacy Protecting Scheme through Distributed RFID Tag Identification. - Joss Wright, Susan Stepney:

Enforcing Behaviour with Anonymity.
1st International ICST Workshop on Security in Opportunistic and Social Networks (SOSOC 2008)
- Andrew Simpson

:
On the need for user-defined fine-grained access control policies for social networking applications. - Mathias Fischer, Guenter Schaefer, Robert Karl Schmidt, Thorsten Strufe:

A Key Management Solution for Overlay-Live-Streaming. - Nouha Oualha

, Yves Roudier:
Reputation and Audits for Self-Organizing Storage.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














