Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai |
Detection of Android API Call Using Logging Mechanism within Android Framework. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Farley, Xinyuan Wang 0005 |
Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu |
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Md. Anwar Hossain Masud, Md. Rafiqul Islam 0001, Jemal H. Abawajy |
Security Concerns and Remedy in a Cloud Based E-learning System. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hui Cui 0001, Yi Mu 0001, Man Ho Au |
Public-Key Encryption Resilient to Linear Related-Key Attacks. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tanveer A. Zia, Albert Y. Zomaya, Vijay Varadharajan, Zhuoqing Morley Mao (eds.) |
Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yousra Aafer, Wenliang Du, Heng Yin 0001 |
DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ibrahim F. Elashry, Yi Mu 0001, Willy Susilo |
Generic Mediated Encryption. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy |
Securing a Web-Based Anti-counterfeit RFID System. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ting Zhou, Yaping Lin, Wei Zhang 0074, Sheng Xiao, Jinguo Li |
Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mengjun Xie, Liang Hao, Kenji Yoshigoe, Jiang Bian 0001 |
CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Silvio Cesare, Yang Xiang 0001, Jun Zhang 0010 |
Clonewise - Detecting Package-Level Clones Using Machine Learning. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Quazi Mamun, Md. Rafiqul Islam 0001, Mohammed Kaosar |
Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li 0009, Lynn Margaret Batten |
Contrasting Permission Patterns between Clean and Malicious Android Applications. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Kaosar, Quazi Mamun, Md. Rafiqul Islam 0001, Xun Yi |
(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Angelos D. Keromytis, Roberto Di Pietro (eds.) |
Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan |
Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jin B. Hong, Dong Seong Kim 0001 |
Scalable Security Model Generation and Analysis Using k-importance Measures. |
SecureComm |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jiangxiao Zhang, Zhoujun Li 0001, Hua Guo |
Anonymous Transferable Conditional E-cash. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis (eds.) |
Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Govind Sreekar Shenoy, Jordi Tubella, Antonio González 0001 |
Improving the Resilience of an IDS against Performance Throttling Attacks. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sarshad Abubaker, Kui Wu 0001 |
DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam |
BINSPECT: Holistic Analysis and Detection of Malicious Web Pages. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peng Zhou 0002, Xiapu Luo, Rocky K. C. Chang |
More Anonymity through Trust Degree in Trust-Based Onion Routing. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jan Jusko, Martin Rehák |
Revealing Cooperating Hosts by Connection Graph Analysis. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuxin Meng 0001, Lam-for Kwok, Wenjuan Li 0001 |
Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xiaokui Shu, Danfeng (Daphne) Yao |
Data Leak Detection as a Service. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chunhua Chen 0002, Shaohua Tang, Chris J. Mitchell |
Building General-Purpose Security Services on EMV Payment Cards. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ehab Al-Shaer, Qi Duan, Jafar Haadi Jafarian |
Random Host Mutation for Moving Target Defense. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tom Chothia, Marco Cova, Chris Novakovic, Camilo González Toro |
The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eun-Kyoung Kim, Patrick D. McDaniel, Thomas La Porta |
A Detection Mechanism for SMS Flooding Attacks in Cellular Networks. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Seyed Amir Iranmanesh, Hemant Sengar, Haining Wang |
A Voice Spam Filter to Clean Subscribers' Mailbox. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Boxuan Gu, Wenbin Zhang 0005, Xiaole Bai, Adam C. Champion, Feng Qin, Dong Xuan |
JSGuard: Shellcode Detection in JavaScript. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ryan M. Gerdes, Mani Mina, Thomas E. Daniels |
Towards a Framework for Evaluating the Security of Physical-Layer Identification Systems. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Matteo Maria Casalino, Michele Mangili, Henrik Plate, Serena Elisa Ponta |
Detection of Configuration Vulnerabilities in Distributed (Web) Environments. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jiawei Yuan, Shucheng Yu |
Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhiwei Wang |
Improvement on Ahn et al.'s RSA P-Homomorphic Signature Scheme. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Abdun Naser Mahmood, Md. Enamul Kabir, Abdul K. Mustafa |
New Multi-dimensional Sorting Based K-Anonymity Microaggregation for Statistical Disclosure Control. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jirí Kur, Vashek Matyás, Petr Svenda |
Two Improvements of Random Key Predistribution for Wireless Sensor Networks. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tulio de Souza, Joss Wright, Piers O'Hanlon, Ian Brown |
Set Difference Attacks in Wireless Sensor Networks. |
SecureComm |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Xu 0004, Kun Bai, Sencun Zhu, Leslie S. Liu 0002, Randy Moulic |
Context-Related Access Control for Mobile Caching. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael Beye, Thijs Veugen |
Anonymity for Key-Trees with Adaptive Adversaries. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wojciech Mostowski, Pim Vullers |
Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sarbari Mitra, Ratna Dutta, Sourav Mukhopadhyay |
Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Crotti, Diego Ferri, Francesco Gringoli, Manuel Peli, Luca Salgarelli |
PP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Harald Lampesberger, Philipp Winter, Markus Zeilinger, Eckehard Hermann |
An On-Line Learning Statistical Model to Detect Malicious Web Requests. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Deepa Srinivasan, Xuxian Jiang |
Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vojtech Krmicek, Jan Vykopal |
NetFlow Based Network Protection. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Huijun Xiong, Xinwen Zhang, Wei Zhu, Danfeng Yao |
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Saeed Al-Haj, Padmalochan Bera, Ehab Al-Shaer |
Build and Test Your Own Network Configuration. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann, Matthew Robert |
Insecurity in Public-Safety Communications: APCO Project 25. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Cristina Romero-Tris, Jordi Castellà-Roca, Alexandre Viejo |
Multi-party Private Web Search with Untrusted Partners. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chowdhury Sayeed Hyder, Brendan Grebur, Li Xiao 0001 |
Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tieyan Li, Yingjiu Li, Guilin Wang |
Secure and Practical Key Distribution for RFID-Enabled Supply Chains. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Plos, Martin Feldhofer |
Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rinku Dewri |
Location Privacy and Attacker Knowledge: Who Are We Fighting against? |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Seyed Ali Ahmadzadeh, Gordon B. Agnew |
Behavioral Mimicry Covert Communication. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Albert Levi, Peng Liu 0005, Refik Molva (eds.) |
4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008 |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hanjun Gao, Lina Wang, Wei Liu, Yang Peng, Hao Zhang |
Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jin Han, Qiang Yan 0001, Robert H. Deng, Debin Gao |
On Detection of Erratic Arguments. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Viet Pham, Tuomas Aura |
Security Analysis of Leap-of-Faith Protocols. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Haya Schulmann |
Unilateral Antidotes to DNS Poisoning. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Benedikt Westermann, Pern Hui Chia, Dogan Kesdogan |
Analyzing the Gold Star Scheme in a Split Tor Network. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gaspar Modelo-Howard, Jevin Sweval, Saurabh Bagchi |
Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shimrit Tzur-David, Kiril Lashchiver, Danny Dolev, Tal Anker |
Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Akshay Dua, Nirupama Bulusu, Wu-chang Feng |
Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia |
Trading Elephants for Ants: Efficient Post-attack Reconstitution. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lie Qu, Guilin Wang, Yi Mu 0001 |
Optimistic Fair Exchange of Ring Signatures. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Steffen Wagner, Christoph Krauß, Claudia Eckert 0001 |
T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hemant Sengar, Xinyuan Wang 0005, Arthur Nichols |
Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Saman Zarandioon, Danfeng (Daphne) Yao, Vinod Ganapathy |
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zhiyun Qian, Zhuoqing Morley Mao, Ammar Rayes, David Jaffe |
Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Deguang Kong, Donghai Tian, Peng Liu 0005, Dinghao Wu |
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amiya Kumar Maji, Saurabh Bagchi |
v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sandeep Yadav, A. L. Narasimha Reddy |
Winning with DNS Failures: Strategies for Faster Botnet Detection. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chunyu Tang, David A. Naumann, Susanne Wetzel |
Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract]. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mihaela Ion, Giovanni Russello, Bruno Crispo |
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jingqiang Lin, Peng Liu 0005, Jiwu Jing, Qiongxiao Wang |
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem A. Beyah |
Attacking Beacon-Enabled 802.15.4 Networks. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dongho Kim, Yih-Chun Hu |
A Study on False Channel Condition Reporting Attacks in Wireless Networks. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Andrew J. Kalafut, Minaxi Gupta, Pairoj Rattadilok, Pragneshkumar Patel |
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ralf Küsters, Henning Schnoor, Tomasz Truderung |
A Formal Definition of Online Abuse-Freeness. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jinguang Han, Yi Mu 0001, Willy Susilo, Jun Yan 0005 |
A Generic Construction of Dynamic Single Sign-on with Strong Security. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Youngsang Shin, Steven A. Myers, Minaxi Gupta |
Saving Energy on WiFi with Required IPsec. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu |
Analyzing and Exploiting Network Behaviors of Malware. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nabil Ajam, Nora Cuppens-Boulahia, Frédéric Cuppens |
Privacy Administration in Distributed Service Infrastructure. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jihyuk Choi, Jerry T. Chiang, Dongho Kim, Yih-Chun Hu |
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Smitha Sundareswaran, Anna Cinzia Squicciarini |
DeCore: Detecting Content Repurposing Attacks on Clients' Systems. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Raoul Strackx, Frank Piessens, Bart Preneel |
Efficient Isolation of Trusted Subsystems in Embedded Systems. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Aram Yegenian, Tassos Dimitriou |
Inexpensive Email Addresses An Email Spam-Combating System. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Toby Ehrenkranz, Jun Li 0001, Patrick D. McDaniel |
Realizing a Source Authentic Internet. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ming Li 0003, Shucheng Yu, Kui Ren 0001, Wenjing Lou |
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sooel Son, Vitaly Shmatikov |
The Hitchhiker's Guide to DNS Cache Poisoning. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sean Whalen, Matt Bishop, James P. Crutchfield |
Hidden Markov Models for Automated Protocol Learning. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Luciana Marconi, Mauro Conti, Roberto Di Pietro |
CED2: Communication Efficient Disjointness Decision. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Guangdong Bai, Liang Gu, Tao Feng, Yao Guo 0001, Xiangqun Chen |
Context-Aware Usage Control for Android. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Omar I. Al-Bataineh, Ron van der Meyden |
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sami Zhioua |
A New Information Leakage Measure for Anonymity Protocols. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia J. Perlman |
FADE: Secure Overlay Cloud Storage with File Assured Deletion. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu 0008 |
Enhancing Host Security Using External Environment Sensors. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|