:facetid:toc:\"db/conf/securecomm/securecomm2011.bht\"OK:facetid:toc:db/conf/securecomm/securecomm2011.bhtMuttukrishnan RajarajanFred PiperHaining WangGeorge KesidisSecurity and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected PapersSecureCommLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering96Springer2012Editorshipconf/securecomm/201110.1007/978-3-642-31909-9https://doi.org/10.1007/978-3-642-31909-9https://dblp.org/rec/conf/securecomm/2011URL#4516699Seyed Ali AhmadzadehGordon B. AgnewBehavioral Mimicry Covert Communication.SecureComm134-1532011Conference and Workshop Papersclosedconf/securecomm/AhmadzadehA1110.1007/978-3-642-31909-9_8https://doi.org/10.1007/978-3-642-31909-9_8https://dblp.org/rec/conf/securecomm/AhmadzadehA11URL#4744030Saeed Al-HajPadmalochan BeraEhab Al-ShaerBuild and Test Your Own Network Configuration.SecureComm522-5322011Conference and Workshop Papersclosedconf/securecomm/Al-HajBA1110.1007/978-3-642-31909-9_33https://doi.org/10.1007/978-3-642-31909-9_33https://dblp.org/rec/conf/securecomm/Al-HajBA11URL#4744031Michael BeyeThijs VeugenAnonymity for Key-Trees with Adaptive Adversaries.SecureComm409-4252011Conference and Workshop Papersclosedconf/securecomm/BeyeV1110.1007/978-3-642-31909-9_23https://doi.org/10.1007/978-3-642-31909-9_23https://dblp.org/rec/conf/securecomm/BeyeV11URL#4744032Manuel CrottiDiego FerriFrancesco GringoliManuel PeliLuca SalgarelliPP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks.SecureComm533-5422011Conference and Workshop Papersclosedconf/securecomm/CrottiFGPS1110.1007/978-3-642-31909-9_34https://doi.org/10.1007/978-3-642-31909-9_34https://dblp.org/rec/conf/securecomm/CrottiFGPS11URL#4744033Rinku DewriLocation Privacy and Attacker Knowledge: Who Are We Fighting against?SecureComm96-1152011Conference and Workshop Papersclosedconf/securecomm/Dewri1110.1007/978-3-642-31909-9_6https://doi.org/10.1007/978-3-642-31909-9_6https://dblp.org/rec/conf/securecomm/Dewri11URL#4744034Akshay DuaNirupama BulusuWu-chang FengPrivacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data.SecureComm470-4792011Conference and Workshop Papersclosedconf/securecomm/DuaBF1110.1007/978-3-642-31909-9_28https://doi.org/10.1007/978-3-642-31909-9_28https://dblp.org/rec/conf/securecomm/DuaBF11URL#4744035Hanjun GaoLina WangWei LiuYang PengHao ZhangPreventing Secret Data Leakage from Foreign Mappings in Virtual Machines.SecureComm436-4452011Conference and Workshop Papersclosedconf/securecomm/GaoWLPZ1110.1007/978-3-642-31909-9_25https://doi.org/10.1007/978-3-642-31909-9_25https://dblp.org/rec/conf/securecomm/GaoWLPZ11URL#4744036Stephen Mark GlassVallipuram MuthukkumarasamyMarius PortmannMatthew RobertInsecurity in Public-Safety Communications: APCO Project 25.SecureComm116-1332011Conference and Workshop Papersclosedconf/securecomm/GlassMPR1110.1007/978-3-642-31909-9_7https://doi.org/10.1007/978-3-642-31909-9_7https://dblp.org/rec/conf/securecomm/GlassMPR11URL#4744037Jin HanQiang Yan 0001Robert H. DengDebin GaoOn Detection of Erratic Arguments.SecureComm172-1892011Conference and Workshop Papersclosedconf/securecomm/HanYDG1110.1007/978-3-642-31909-9_10https://doi.org/10.1007/978-3-642-31909-9_10https://dblp.org/rec/conf/securecomm/HanYDG11URL#4744038Amir HerzbergHaya SchulmannUnilateral Antidotes to DNS Poisoning.SecureComm319-3362011Conference and Workshop Papersclosedconf/securecomm/HerzbergS1110.1007/978-3-642-31909-9_18https://doi.org/10.1007/978-3-642-31909-9_18https://dblp.org/rec/conf/securecomm/HerzbergS11URL#4744039Chowdhury Sayeed HyderBrendan GreburLi Xiao 0001Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks.SecureComm154-1712011Conference and Workshop Papersclosedconf/securecomm/HyderGX1110.1007/978-3-642-31909-9_9https://doi.org/10.1007/978-3-642-31909-9_9https://dblp.org/rec/conf/securecomm/HyderGX11URL#4744040Deguang KongDonghai TianPeng Liu 0005Dinghao WuSA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits.SecureComm190-2082011Conference and Workshop Papersclosedconf/securecomm/KongTLW1110.1007/978-3-642-31909-9_11https://doi.org/10.1007/978-3-642-31909-9_11https://dblp.org/rec/conf/securecomm/KongTLW11URL#4744041Vojtech KrmicekJan VykopalNetFlow Based Network Protection.SecureComm543-5462011Conference and Workshop Papersclosedconf/securecomm/KrmicekV1110.1007/978-3-642-31909-9_35https://doi.org/10.1007/978-3-642-31909-9_35https://dblp.org/rec/conf/securecomm/KrmicekV11URL#4744042Harald LampesbergerPhilipp WinterMarkus ZeilingerEckehard HermannAn On-Line Learning Statistical Model to Detect Malicious Web Requests.SecureComm19-382011Conference and Workshop Papersclosedconf/securecomm/LampesbergerWZH1110.1007/978-3-642-31909-9_2https://doi.org/10.1007/978-3-642-31909-9_2https://dblp.org/rec/conf/securecomm/LampesbergerWZH11URL#4744043Meixing LeZhaohui WangQuan JiaAngelos StavrouAnup K. GhoshSushil JajodiaTrading Elephants for Ants: Efficient Post-attack Reconstitution.SecureComm460-4692011Conference and Workshop Papersclosedconf/securecomm/LeWJSGJ1110.1007/978-3-642-31909-9_27https://doi.org/10.1007/978-3-642-31909-9_27https://dblp.org/rec/conf/securecomm/LeWJSGJ11URL#4744044Tieyan LiYingjiu LiGuilin WangSecure and Practical Key Distribution for RFID-Enabled Supply Chains.SecureComm356-3722011Conference and Workshop Papersclosedconf/securecomm/LiLW1110.1007/978-3-642-31909-9_20https://doi.org/10.1007/978-3-642-31909-9_20https://dblp.org/rec/conf/securecomm/LiLW11URL#4744045Amiya Kumar MajiSaurabh Bagchiv-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks.SecureComm281-3022011Conference and Workshop Papersclosedconf/securecomm/MajiB1110.1007/978-3-642-31909-9_16https://doi.org/10.1007/978-3-642-31909-9_16https://dblp.org/rec/conf/securecomm/MajiB11URL#4744046Sarbari MitraRatna DuttaSourav MukhopadhyayTowards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane.SecureComm373-3882011Conference and Workshop Papersclosedconf/securecomm/MitraDM1110.1007/978-3-642-31909-9_21https://doi.org/10.1007/978-3-642-31909-9_21https://dblp.org/rec/conf/securecomm/MitraDM11URL#4744047Gaspar Modelo-HowardJevin SwevalSaurabh BagchiSecure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems.SecureComm39-582011Conference and Workshop Papersclosedconf/securecomm/Modelo-HowardSB1110.1007/978-3-642-31909-9_3https://doi.org/10.1007/978-3-642-31909-9_3https://dblp.org/rec/conf/securecomm/Modelo-HowardSB11URL#4744048Wojciech MostowskiPim VullersEfficient U-Prove Implementation for Anonymous Credentials on Smart Cards.SecureComm243-2602011Conference and Workshop Papersclosedconf/securecomm/MostowskiV1110.1007/978-3-642-31909-9_14https://doi.org/10.1007/978-3-642-31909-9_14https://dblp.org/rec/conf/securecomm/MostowskiV11URL#4744049Viet PhamTuomas AuraSecurity Analysis of Leap-of-Faith Protocols.SecureComm337-3552011Conference and Workshop Papersclosedconf/securecomm/PhamA1110.1007/978-3-642-31909-9_19https://doi.org/10.1007/978-3-642-31909-9_19https://dblp.org/rec/conf/securecomm/PhamA11URL#4744050Thomas PlosMartin FeldhoferAnalyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag.SecureComm426-4352011Conference and Workshop Papersclosedconf/securecomm/PlosF1110.1007/978-3-642-31909-9_24https://doi.org/10.1007/978-3-642-31909-9_24https://dblp.org/rec/conf/securecomm/PlosF11URL#4744051Zhiyun QianZhuoqing Morley MaoAmmar RayesDavid JaffeDesigning Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks.SecureComm1-182011Conference and Workshop Papersclosedconf/securecomm/QianMRJ1110.1007/978-3-642-31909-9_1https://doi.org/10.1007/978-3-642-31909-9_1https://dblp.org/rec/conf/securecomm/QianMRJ11URL#4744052Lie QuGuilin WangYi Mu 0001Optimistic Fair Exchange of Ring Signatures.SecureComm227-2422011Conference and Workshop Papersclosedconf/securecomm/QuWM1110.1007/978-3-642-31909-9_13https://doi.org/10.1007/978-3-642-31909-9_13https://dblp.org/rec/conf/securecomm/QuWM11URL#4744053Cristina Romero-TrisJordi CastellĂ -RocaAlexandre ViejoMulti-party Private Web Search with Untrusted Partners.SecureComm261-2802011Conference and Workshop Papersclosedconf/securecomm/Romero-TrisCV1110.1007/978-3-642-31909-9_15https://doi.org/10.1007/978-3-642-31909-9_15https://dblp.org/rec/conf/securecomm/Romero-TrisCV11URL#4744054Hemant SengarXinyuan Wang 0005Arthur NicholsCall Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks.SecureComm501-5102011Conference and Workshop Papersclosedconf/securecomm/SengarWN1110.1007/978-3-642-31909-9_31https://doi.org/10.1007/978-3-642-31909-9_31https://dblp.org/rec/conf/securecomm/SengarWN11URL#4744055Deepa SrinivasanXuxian JiangTime-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots.SecureComm209-2262011Conference and Workshop Papersclosedconf/securecomm/SrinivasanJ1110.1007/978-3-642-31909-9_12https://doi.org/10.1007/978-3-642-31909-9_12https://dblp.org/rec/conf/securecomm/SrinivasanJ11URL#4744056Chunyu TangDavid A. NaumannSusanne WetzelSymbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract].SecureComm480-4902011Conference and Workshop Papersclosedconf/securecomm/TangNW1110.1007/978-3-642-31909-9_29https://doi.org/10.1007/978-3-642-31909-9_29https://dblp.org/rec/conf/securecomm/TangNW11URL#4744057Shimrit Tzur-DavidKiril LashchiverDanny DolevTal AnkerDelay Fast Packets (DFP): Prevention of DNS Cache Poisoning.SecureComm303-3182011Conference and Workshop Papersclosedconf/securecomm/Tzur-DavidLDA1110.1007/978-3-642-31909-9_17https://doi.org/10.1007/978-3-642-31909-9_17https://dblp.org/rec/conf/securecomm/Tzur-DavidLDA11URL#4744058Steffen WagnerChristoph KrauĂClaudia Eckert 0001T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks.SecureComm511-5212011Conference and Workshop Papersclosedconf/securecomm/WagnerKE1110.1007/978-3-642-31909-9_32https://doi.org/10.1007/978-3-642-31909-9_32https://dblp.org/rec/conf/securecomm/WagnerKE11URL#4744059Benedikt WestermannPern Hui ChiaDogan KesdoganAnalyzing the Gold Star Scheme in a Split Tor Network.SecureComm77-952011Conference and Workshop Papersclosedconf/securecomm/WestermannCK1110.1007/978-3-642-31909-9_5https://doi.org/10.1007/978-3-642-31909-9_5https://dblp.org/rec/conf/securecomm/WestermannCK11URL#4744060Huijun XiongXinwen ZhangWei ZhuDanfeng YaoCloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services.SecureComm491-5002011Conference and Workshop Papersclosedconf/securecomm/XiongZZY1110.1007/978-3-642-31909-9_30https://doi.org/10.1007/978-3-642-31909-9_30https://dblp.org/rec/conf/securecomm/XiongZZY11URL#4744061Zhi Xu 0004Kun BaiSencun ZhuLeslie S. Liu 0002Randy MoulicContext-Related Access Control for Mobile Caching.SecureComm389-4082011Conference and Workshop Papersclosedconf/securecomm/XuBZLM1110.1007/978-3-642-31909-9_22https://doi.org/10.1007/978-3-642-31909-9_22https://dblp.org/rec/conf/securecomm/XuBZLM11URL#4744062Sandeep YadavA. L. Narasimha ReddyWinning with DNS Failures: Strategies for Faster Botnet Detection.SecureComm446-4592011Conference and Workshop Papersclosedconf/securecomm/YadavR1110.1007/978-3-642-31909-9_26https://doi.org/10.1007/978-3-642-31909-9_26https://dblp.org/rec/conf/securecomm/YadavR11URL#4744063Saman ZarandioonDanfeng (Daphne) YaoVinod GanapathyK2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access.SecureComm59-762011Conference and Workshop Papersclosedconf/securecomm/ZarandioonYG1110.1007/978-3-642-31909-9_4https://doi.org/10.1007/978-3-642-31909-9_4https://dblp.org/rec/conf/securecomm/ZarandioonYG11URL#4744064