Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/securecomm/securecomm2011.bht:"
@proceedings{DBLP:conf/securecomm/2011, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31909-9}, doi = {10.1007/978-3-642-31909-9}, isbn = {978-3-642-31908-2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AhmadzadehA11, author = {Seyed Ali Ahmadzadeh and Gordon B. Agnew}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Behavioral Mimicry Covert Communication}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {134--153}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_8}, doi = {10.1007/978-3-642-31909-9\_8}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/AhmadzadehA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Al-HajBA11, author = {Saeed Al{-}Haj and Padmalochan Bera and Ehab Al{-}Shaer}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Build and Test Your Own Network Configuration}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {522--532}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_33}, doi = {10.1007/978-3-642-31909-9\_33}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/Al-HajBA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/BeyeV11, author = {Michael Beye and Thijs Veugen}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Anonymity for Key-Trees with Adaptive Adversaries}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {409--425}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_23}, doi = {10.1007/978-3-642-31909-9\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/BeyeV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/CrottiFGPS11, author = {Manuel Crotti and Diego Ferri and Francesco Gringoli and Manuel Peli and Luca Salgarelli}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {PP2db: {A} Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {533--542}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_34}, doi = {10.1007/978-3-642-31909-9\_34}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/CrottiFGPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Dewri11, author = {Rinku Dewri}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Location Privacy and Attacker Knowledge: Who Are We Fighting against?}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {96--115}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_6}, doi = {10.1007/978-3-642-31909-9\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/Dewri11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/DuaBF11, author = {Akshay Dua and Nirupama Bulusu and Wu{-}chang Feng}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {470--479}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_28}, doi = {10.1007/978-3-642-31909-9\_28}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/DuaBF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GaoWLPZ11, author = {Hanjun Gao and Lina Wang and Wei Liu and Yang Peng and Hao Zhang}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {436--445}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_25}, doi = {10.1007/978-3-642-31909-9\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/GaoWLPZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GlassMPR11, author = {Stephen Mark Glass and Vallipuram Muthukkumarasamy and Marius Portmann and Matthew Robert}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Insecurity in Public-Safety Communications: {APCO} Project 25}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {116--133}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_7}, doi = {10.1007/978-3-642-31909-9\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/GlassMPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/HanYDG11, author = {Jin Han and Qiang Yan and Robert H. Deng and Debin Gao}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {On Detection of Erratic Arguments}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {172--189}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_10}, doi = {10.1007/978-3-642-31909-9\_10}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/HanYDG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/HerzbergS11, author = {Amir Herzberg and Haya Schulmann}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Unilateral Antidotes to {DNS} Poisoning}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {319--336}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_18}, doi = {10.1007/978-3-642-31909-9\_18}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/HerzbergS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/HyderGX11, author = {Chowdhury Sayeed Hyder and Brendan Grebur and Li Xiao}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {154--171}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_9}, doi = {10.1007/978-3-642-31909-9\_9}, timestamp = {Fri, 18 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/HyderGX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KongTLW11, author = {Deguang Kong and Donghai Tian and Peng Liu and Dinghao Wu}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {{SA3:} Automatic Semantic Aware Attribution Analysis of Remote Exploits}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {190--208}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_11}, doi = {10.1007/978-3-642-31909-9\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/KongTLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KrmicekV11, author = {Vojtech Krmicek and Jan Vykopal}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {NetFlow Based Network Protection}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {543--546}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_35}, doi = {10.1007/978-3-642-31909-9\_35}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/KrmicekV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LampesbergerWZH11, author = {Harald Lampesberger and Philipp Winter and Markus Zeilinger and Eckehard Hermann}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {An On-Line Learning Statistical Model to Detect Malicious Web Requests}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {19--38}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_2}, doi = {10.1007/978-3-642-31909-9\_2}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LampesbergerWZH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LeWJSGJ11, author = {Meixing Le and Zhaohui Wang and Quan Jia and Angelos Stavrou and Anup K. Ghosh and Sushil Jajodia}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Trading Elephants for Ants: Efficient Post-attack Reconstitution}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {460--469}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_27}, doi = {10.1007/978-3-642-31909-9\_27}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LeWJSGJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LiLW11, author = {Tieyan Li and Yingjiu Li and Guilin Wang}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Secure and Practical Key Distribution for RFID-Enabled Supply Chains}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {356--372}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_20}, doi = {10.1007/978-3-642-31909-9\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LiLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MajiB11, author = {Amiya Kumar Maji and Saurabh Bagchi}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {v-CAPS: {A} Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {281--302}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_16}, doi = {10.1007/978-3-642-31909-9\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/MajiB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MitraDM11, author = {Sarbari Mitra and Ratna Dutta and Sourav Mukhopadhyay}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Towards a Deterministic Hierarchical Key Predistribution for {WSN} Using Complementary Fano Plane}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {373--388}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_21}, doi = {10.1007/978-3-642-31909-9\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/MitraDM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Modelo-HowardSB11, author = {Gaspar Modelo{-}Howard and Jevin Sweval and Saurabh Bagchi}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {39--58}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_3}, doi = {10.1007/978-3-642-31909-9\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/Modelo-HowardSB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MostowskiV11, author = {Wojciech Mostowski and Pim Vullers}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {243--260}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_14}, doi = {10.1007/978-3-642-31909-9\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/MostowskiV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/PhamA11, author = {Viet Pham and Tuomas Aura}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Security Analysis of Leap-of-Faith Protocols}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {337--355}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_19}, doi = {10.1007/978-3-642-31909-9\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/PhamA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/PlosF11, author = {Thomas Plos and Martin Feldhofer}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost {RFID} Tag}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {426--435}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_24}, doi = {10.1007/978-3-642-31909-9\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/PlosF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/QianMRJ11, author = {Zhiyun Qian and Zhuoqing Morley Mao and Ammar Rayes and David Jaffe}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {1--18}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_1}, doi = {10.1007/978-3-642-31909-9\_1}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/QianMRJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/QuWM11, author = {Lie Qu and Guilin Wang and Yi Mu}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Optimistic Fair Exchange of Ring Signatures}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {227--242}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_13}, doi = {10.1007/978-3-642-31909-9\_13}, timestamp = {Mon, 24 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/QuWM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Romero-TrisCV11, author = {Cristina Romero{-}Tris and Jordi Castell{\`{a}}{-}Roca and Alexandre Viejo}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Multi-party Private Web Search with Untrusted Partners}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {261--280}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_15}, doi = {10.1007/978-3-642-31909-9\_15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/Romero-TrisCV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/SengarWN11, author = {Hemant Sengar and Xinyuan Wang and Arthur Nichols}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Call Behavioral Analysis to Thwart {SPIT} Attacks on VoIP Networks}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {501--510}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_31}, doi = {10.1007/978-3-642-31909-9\_31}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/SengarWN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/SrinivasanJ11, author = {Deepa Srinivasan and Xuxian Jiang}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {209--226}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_12}, doi = {10.1007/978-3-642-31909-9\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/SrinivasanJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/TangNW11, author = {Chunyu Tang and David A. Naumann and Susanne Wetzel}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract]}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {480--490}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_29}, doi = {10.1007/978-3-642-31909-9\_29}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/TangNW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Tzur-DavidLDA11, author = {Shimrit Tzur{-}David and Kiril Lashchiver and Danny Dolev and Tal Anker}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Delay Fast Packets {(DFP):} Prevention of {DNS} Cache Poisoning}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {303--318}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_17}, doi = {10.1007/978-3-642-31909-9\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/Tzur-DavidLDA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WagnerKE11, author = {Steffen Wagner and Christoph Krau{\ss} and Claudia Eckert}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {{T-CUP:} {A} TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {511--521}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_32}, doi = {10.1007/978-3-642-31909-9\_32}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/WagnerKE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WestermannCK11, author = {Benedikt Westermann and Pern Hui Chia and Dogan Kesdogan}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Analyzing the Gold Star Scheme in a Split Tor Network}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {77--95}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_5}, doi = {10.1007/978-3-642-31909-9\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/WestermannCK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/XiongZZY11, author = {Huijun Xiong and Xinwen Zhang and Wei Zhu and Danfeng Yao}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {491--500}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_30}, doi = {10.1007/978-3-642-31909-9\_30}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/XiongZZY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/XuBZLM11, author = {Zhi Xu and Kun Bai and Sencun Zhu and Leslie S. Liu and Randy Moulic}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Context-Related Access Control for Mobile Caching}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {389--408}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_22}, doi = {10.1007/978-3-642-31909-9\_22}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/XuBZLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/YadavR11, author = {Sandeep Yadav and A. L. Narasimha Reddy}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Winning with {DNS} Failures: Strategies for Faster Botnet Detection}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {446--459}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_26}, doi = {10.1007/978-3-642-31909-9\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/YadavR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZarandioonYG11, author = {Saman Zarandioon and Danfeng (Daphne) Yao and Vinod Ganapathy}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {{K2C:} Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {59--76}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_4}, doi = {10.1007/978-3-642-31909-9\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ZarandioonYG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.