Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Patrick Traynor |
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings, pp. 125-143, 2010, Springer, 978-3-642-16160-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu 0005, Hongsheng Xi |
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings, pp. 1-19, 2010, Springer, 978-3-642-16160-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michael C. Grace, Zhi Wang 0004, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh |
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings, pp. 162-180, 2010, Springer, 978-3-642-16160-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley |
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings, pp. 71-88, 2010, Springer, 978-3-642-16160-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia, Jianying Zhou 0001 (eds.) |
Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![Springer, 978-3-642-16160-5 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini |
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 265-284, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Julien Freudiger, Maxim Raya, Jean-Pierre Hubaux |
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 350-372, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | William Kozma, Loukas Lazos |
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 207-227, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo |
Baiting Inside Attackers Using Decoy Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 51-70, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Feng Qian 0001, Zhiyun Qian, Zhuoqing Morley Mao, Atul Prakash 0001 |
Ensemble: Community-Based Anomaly Detection for Popular Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 163-184, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Aravind Venkataraman, Raheem A. Beyah |
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 394-416, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Martijn Oostdijk, Dirk-Jan van Dijk, Maarten Wegdam |
User-Centric Identity Using ePassports. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 296-310, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Guilherme Fernandes, Philippe Owezarski |
Automated Classification of Network Traffic Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 91-100, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Toni Perkovic, Ivo Stancic, Luka Malisa, Mario Cagalj |
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 228-247, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yan Chen, Tassos Dimitriou, Jianying Zhou 0001 (eds.) |
Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![Springer, 978-3-642-05283-5 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Magdalena Payeras-Capellà, Macià Mut Puigserver, Andreu Pere Isern-Deyà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger |
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 101-120, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, C. Pandu Rangan |
Breaking and Building of Group Inside Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 330-339, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ghassan Karame, David Gubler, Srdjan Capkun |
On the Security of Bottleneck Bandwidth Estimation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 121-141, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Liang Cai, Gabriel Maganis, Hui Zang, Hao Chen 0003 |
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 1-20, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yanjiang Yang, Jianying Zhou 0001, Robert H. Deng, Feng Bao 0001 |
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 285-295, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shimrit Tzur-David, Danny Dolev, Tal Anker |
MULAN: Multi-Level Adaptive Network Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 71-90, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen 0004 |
Using Failure Information Analysis to Detect Enterprise Zombies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 185-206, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wassim Znaidi, Marine Minier, Cédric Lauradoux |
Aggregated Authentication (AMAC) Using Universal Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 248-264, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ioannis Broustis, Konstantinos Pelechrinis, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Leandros Tassiulas |
FIJI: Fighting Implicit Jamming in 802.11 WLANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 21-40, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim |
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 448-458, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yi Yang 0002, Sencun Zhu, Guohong Cao, Thomas La Porta |
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 373-393, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shucheng Yu, Kui Ren 0001, Wenjing Lou, Jin Li 0002 |
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 311-329, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mansoor Alicherry, Angelos D. Keromytis, Angelos Stavrou |
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 41-50, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yawen Wei, Zhen Yu, Yong Guan |
A Novel Architecture for Secure and Scalable Multicast over IP Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 417-436, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Andrey Garnaev, Wade Trappe |
An Eavesdropping Game with SINR as an Objective Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 142-162, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, Nikos Triandopoulos |
Reliable Resource Searching in P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 437-447, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Thanassis Tiropanis, Tassos Dimitriou |
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers, pp. 340-349, 2009, Springer, 978-3-642-05283-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Eric Medvet, Engin Kirda, Christopher Kruegel |
Visual-similarity-based phishing detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 22, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Abhijit Bose, Kang G. Shin |
On capturing malware dynamics in mobile power-law networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 12, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Eyal Felstaine, Eldad Chai, Niv Gilboa, Avi Elisha |
Distributed flow detection over multi path sessions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 3, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Mathias Fischer 0001, Guenter Schaefer, Robert Karl Schmidt, Thorsten Strufe |
A Key Management Solution for Overlay-Live-Streaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Erik-Oliver Blaß, Joachim Wilke, Martina Zitterbart |
Relaxed authenticity for data aggregation in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 4, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker |
BitBlender: Light-Weight Anonymity for BitTorrent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Urs Hengartner |
Location privacy based on trusted computing and secure logging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 16, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Tansu Alpcan, Sinan Kesici, Daniel Bicher, Mehmet Kivanç Mihçak, Christian Bauckhage, Seyit Ahmet Çamtepe |
A lightweight biometric signature scheme for user authentication over networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 33, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Cirulli, Roberto Di Pietro |
PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 29, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lingjun Li, Liusheng Huang, Wei Yang 0011, Xinxin Zhao, Zhenshan Yu, Zhili Chen |
Detection of word shift steganography in PDF document. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 15, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Nouha Oualha, Yves Roudier |
Reputation and Audits for Self-Organizing Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan |
Unassailable sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 26, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shijin Kong, Randy Smith, Cristian Estan |
Efficient signature matching with multiple alphabet compression tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 1, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula |
Subjective logic based trust model for mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 30, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shawn Embleton, Sherri Sparks, Cliff C. Zou |
SMM rootkits: a new breed of OS independent malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 11, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xinyuan Wang 0005, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera |
Voice pharming attack and the trust of VoIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 24, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia |
Securely computing an approximate median in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 6, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yan Wen, Jinjing Zhao, Huaimin Wang |
Hiding "real" machine from attackers and malware with a minimal virtual machine monitor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 21, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sepideh Fouladgar, Hossam Afifi |
Scalable Privacy Protecting Scheme through Distributed RFID Tag Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sherif M. Khattab, Daniel Mossé, Rami G. Melhem |
Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 27, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Tassos Dimitriou |
rfidDOT: RFID delegation and ownership transfer made simple. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 34, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yuanyuan Zeng, Xin Hu 0001, Haixiong Wang, Kang G. Shin, Abhijit Bose |
Containment of network worms via per-process rate-limiting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 14, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ayse Gül Karatop, Erkay Savas |
An identity-based key infrastructure suitable for messaging and its application to e-mail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 10, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Simpson |
On the need for user-defined fine-grained access control policies for social networking applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Gehani, Surendar Chandra |
Parameterized access control: from design to prototype. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 35, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Bazara I. A. Barry, H. Anthony Chan |
On the performance of a hybrid intrusion detection architecture for voice over IP systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 19, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Anh Le, Raouf Boutaba, Ehab Al-Shaer |
Correlation-based load balancing for network intrusion detection and prevention systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 2, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Min Shao, Sencun Zhu, Guohong Cao, Tom La Porta, Prasant Mohapatra |
A cross-layer dropping attack in video streaming over ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 25, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim |
Attacking the Kad network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 23, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yi Ouyang 0001, Zhengyi Le, Donggang Liu, James Ford, Fillia Makedon |
Source location privacy against laptop-class attacks in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 5, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Guenther Starnberger, Christopher Kruegel, Engin Kirda |
Overbot: a botnet protocol based on Kademlia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 13, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shucheng Yu, Kui Ren 0001, Wenjing Lou |
Attribute-based on-demand multicast group setup with membership anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 18, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik |
Scalable and efficient provable data possession. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 9, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yafei Yang, Qinyuan Feng, Yan Lindsay Sun, Yafei Dai |
RepTrap: a novel attack on feedback-based reputation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 8, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yoshifumi Manabe, Tatsuaki Okamoto |
Anonymous return route information for onion based mix-nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Wolf Müller 0001, Henryk Plötz, Jens-Peter Redlich, Takashi Shiraki |
Sybil proof anonymous reputation management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 7, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xia Wang, Johnny Wong, Wensheng Zhang 0001 |
A heterogeneity-aware framework for group key management in wireless mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 32, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Issa Khalil, Saurabh Bagchi |
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 28, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Min Gyu Cho, Kang G. Shin |
ARCMA: attack-resilient collaborative message authentication in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 31, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Marco Benini, Sabrina Sicari |
Towards more secure systems: how to combine expert evaluations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 36, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Joss Wright, Susan Stepney |
Enforcing Behaviour with Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kiran Lakkaraju, Adam J. Slagell |
Evaluating the utility of anonymized network traces for intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 17, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou |
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 20, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Guofei Gu, Zesheng Chen, Phillip A. Porras, Wenke Lee |
Misleading and defeating importance-scanning malware propagation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 250-259, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Mihály Bárász, Balázs Boros, Péter Ligeti, Krisztina Lója, Daniel A. Nagy |
Breaking EMAP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 514-517, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoxin Wu 0001, David K. Y. Yau |
Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 310-319, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Angelo Gaeta, Matteo Gaeta, Alan Smith, Ivan Djordjevic, Theo Dimitrakos, Maurizio Colombo, Sergio Miranda |
Design patterns for secure virtual organization management architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 207-216, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Luca Longo, Pierpaolo Dondio, Stephen Barrett |
Temporal factors to evaluate trustworthiness of virtual identities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 11-19, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Coronato, Giuseppe De Pietro |
A context service for multimodal pervasive environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 84-87, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Marc Seigneur |
Trustworthiness of collaborative Open Source Software quality assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 20-26, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yuxin Wei, Muqing Wu |
Intrusion detection technology based on CEGA-SVM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 244-249, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kyuhyung Cho, Jongsung Lee 0005, Jongin Lim 0001, Jongsub Moon |
Verification method of network simulation for pervasive environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 155-161, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jang-Su Park, Soo-Young Kang, Im-Yeong Lee |
A study on secure RFID authentication protocol in insecure communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 133-143, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kerschbaum |
Simple cross-site attack prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 464-472, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli |
A model for usage control in GRID systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 520, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Paolo Mori |
A model for usage control in GRID systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 169-175, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jian Yin 0006, Sanjay Kumar Madria |
Sybil attack detection in a hierarchical sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 494-503, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Luigi Coppolino, Luigi Romano, Nicola Mazzocca, Sergio Salvi |
Web Services workflow reliability estimation through reliability patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 107-115, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ahren Studer, Mark Luk, Adrian Perrig |
Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 422-432, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Spyros Kotoulas, Ronny Siebes |
Scalable discovery of private resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 73-82, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi |
A layout-similarity-based approach for detecting phishing pages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 454-463, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Claude Castelluccia, Angelo Spognardi |
RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 351-360, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Xun Wang, Wei Yu 0002, Adam C. Champion, Xinwen Fu, Dong Xuan |
Detecting worms via mining dynamic program execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 412-421, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Tuomas Aura, Michael Roe, Steven J. Murdoch |
Securing network location awareness with authenticated DHCP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 391-402, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham |
SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 49-56, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Massimiliano Rak, Valentina Casola, Nicola Mazzocca, Emilio Pasquale Mancini, Umberto Villano |
Optimizing secure Web Services with MAWeS: A case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 144-153, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | |
Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![IEEE, 978-1-4244-0974-7 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Ashish Gehani, Surendar Chandra |
Parameterizing access control for heterogeneous peer-to-peer applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007, pp. 269-278, 2007, IEEE, 978-1-4244-0974-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|