Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Patrick Traynor |
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu 0005, Hongsheng Xi |
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michael C. Grace, Zhi Wang 0004, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh |
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley |
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS. |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia, Jianying Zhou 0001 (eds.) |
Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings |
SecureComm |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini |
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Julien Freudiger, Maxim Raya, Jean-Pierre Hubaux |
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | William Kozma, Loukas Lazos |
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo |
Baiting Inside Attackers Using Decoy Documents. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Feng Qian 0001, Zhiyun Qian, Zhuoqing Morley Mao, Atul Prakash 0001 |
Ensemble: Community-Based Anomaly Detection for Popular Applications. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Aravind Venkataraman, Raheem A. Beyah |
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Martijn Oostdijk, Dirk-Jan van Dijk, Maarten Wegdam |
User-Centric Identity Using ePassports. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Guilherme Fernandes, Philippe Owezarski |
Automated Classification of Network Traffic Anomalies. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Toni Perkovic, Ivo Stancic, Luka Malisa, Mario Cagalj |
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yan Chen, Tassos Dimitriou, Jianying Zhou 0001 (eds.) |
Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Magdalena Payeras-Capellà, Macià Mut Puigserver, Andreu Pere Isern-Deyà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger |
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, C. Pandu Rangan |
Breaking and Building of Group Inside Signature. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ghassan Karame, David Gubler, Srdjan Capkun |
On the Security of Bottleneck Bandwidth Estimation Techniques. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Liang Cai, Gabriel Maganis, Hui Zang, Hao Chen 0003 |
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yanjiang Yang, Jianying Zhou 0001, Robert H. Deng, Feng Bao 0001 |
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shimrit Tzur-David, Danny Dolev, Tal Anker |
MULAN: Multi-Level Adaptive Network Filter. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen 0004 |
Using Failure Information Analysis to Detect Enterprise Zombies. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wassim Znaidi, Marine Minier, Cédric Lauradoux |
Aggregated Authentication (AMAC) Using Universal Hash Functions. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ioannis Broustis, Konstantinos Pelechrinis, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Leandros Tassiulas |
FIJI: Fighting Implicit Jamming in 802.11 WLANs. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim |
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yi Yang 0002, Sencun Zhu, Guohong Cao, Thomas La Porta |
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shucheng Yu, Kui Ren 0001, Wenjing Lou, Jin Li 0002 |
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mansoor Alicherry, Angelos D. Keromytis, Angelos Stavrou |
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yawen Wei, Zhen Yu, Yong Guan |
A Novel Architecture for Secure and Scalable Multicast over IP Network. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Andrey Garnaev, Wade Trappe |
An Eavesdropping Game with SINR as an Objective Function. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, Nikos Triandopoulos |
Reliable Resource Searching in P2P Networks. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Thanassis Tiropanis, Tassos Dimitriou |
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources. |
SecureComm |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Eric Medvet, Engin Kirda, Christopher Kruegel |
Visual-similarity-based phishing detection. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Abhijit Bose, Kang G. Shin |
On capturing malware dynamics in mobile power-law networks. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Eyal Felstaine, Eldad Chai, Niv Gilboa, Avi Elisha |
Distributed flow detection over multi path sessions. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Mathias Fischer 0001, Guenter Schaefer, Robert Karl Schmidt, Thorsten Strufe |
A Key Management Solution for Overlay-Live-Streaming. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Erik-Oliver Blaß, Joachim Wilke, Martina Zitterbart |
Relaxed authenticity for data aggregation in wireless sensor networks. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker |
BitBlender: Light-Weight Anonymity for BitTorrent. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Urs Hengartner |
Location privacy based on trusted computing and secure logging. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Tansu Alpcan, Sinan Kesici, Daniel Bicher, Mehmet Kivanç Mihçak, Christian Bauckhage, Seyit Ahmet Çamtepe |
A lightweight biometric signature scheme for user authentication over networks. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Cirulli, Roberto Di Pietro |
PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lingjun Li, Liusheng Huang, Wei Yang 0011, Xinxin Zhao, Zhenshan Yu, Zhili Chen |
Detection of word shift steganography in PDF document. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Nouha Oualha, Yves Roudier |
Reputation and Audits for Self-Organizing Storage. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan |
Unassailable sensor networks. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shijin Kong, Randy Smith, Cristian Estan |
Efficient signature matching with multiple alphabet compression tables. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula |
Subjective logic based trust model for mobile ad hoc networks. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shawn Embleton, Sherri Sparks, Cliff C. Zou |
SMM rootkits: a new breed of OS independent malware. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xinyuan Wang 0005, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera |
Voice pharming attack and the trust of VoIP. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia |
Securely computing an approximate median in wireless sensor networks. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yan Wen, Jinjing Zhao, Huaimin Wang |
Hiding "real" machine from attackers and malware with a minimal virtual machine monitor. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sepideh Fouladgar, Hossam Afifi |
Scalable Privacy Protecting Scheme through Distributed RFID Tag Identification. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sherif M. Khattab, Daniel Mossé, Rami G. Melhem |
Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive? |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Tassos Dimitriou |
rfidDOT: RFID delegation and ownership transfer made simple. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yuanyuan Zeng, Xin Hu 0001, Haixiong Wang, Kang G. Shin, Abhijit Bose |
Containment of network worms via per-process rate-limiting. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ayse Gül Karatop, Erkay Savas |
An identity-based key infrastructure suitable for messaging and its application to e-mail. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Simpson |
On the need for user-defined fine-grained access control policies for social networking applications. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Gehani, Surendar Chandra |
Parameterized access control: from design to prototype. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Bazara I. A. Barry, H. Anthony Chan |
On the performance of a hybrid intrusion detection architecture for voice over IP systems. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Anh Le, Raouf Boutaba, Ehab Al-Shaer |
Correlation-based load balancing for network intrusion detection and prevention systems. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Min Shao, Sencun Zhu, Guohong Cao, Tom La Porta, Prasant Mohapatra |
A cross-layer dropping attack in video streaming over ad hoc networks. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim |
Attacking the Kad network. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yi Ouyang 0001, Zhengyi Le, Donggang Liu, James Ford, Fillia Makedon |
Source location privacy against laptop-class attacks in sensor networks. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Guenther Starnberger, Christopher Kruegel, Engin Kirda |
Overbot: a botnet protocol based on Kademlia. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shucheng Yu, Kui Ren 0001, Wenjing Lou |
Attribute-based on-demand multicast group setup with membership anonymity. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik |
Scalable and efficient provable data possession. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yafei Yang, Qinyuan Feng, Yan Lindsay Sun, Yafei Dai |
RepTrap: a novel attack on feedback-based reputation systems. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yoshifumi Manabe, Tatsuaki Okamoto |
Anonymous return route information for onion based mix-nets. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Wolf Müller 0001, Henryk Plötz, Jens-Peter Redlich, Takashi Shiraki |
Sybil proof anonymous reputation management. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xia Wang, Johnny Wong, Wensheng Zhang 0001 |
A heterogeneity-aware framework for group key management in wireless mesh networks. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Issa Khalil, Saurabh Bagchi |
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Min Gyu Cho, Kang G. Shin |
ARCMA: attack-resilient collaborative message authentication in wireless sensor networks. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Marco Benini, Sabrina Sicari |
Towards more secure systems: how to combine expert evaluations. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Joss Wright, Susan Stepney |
Enforcing Behaviour with Anonymity. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kiran Lakkaraju, Adam J. Slagell |
Evaluating the utility of anonymized network traces for intrusion detection. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou |
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. |
SecureComm |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Guofei Gu, Zesheng Chen, Phillip A. Porras, Wenke Lee |
Misleading and defeating importance-scanning malware propagation. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Mihály Bárász, Balázs Boros, Péter Ligeti, Krisztina Lója, Daniel A. Nagy |
Breaking EMAP. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoxin Wu 0001, David K. Y. Yau |
Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Angelo Gaeta, Matteo Gaeta, Alan Smith, Ivan Djordjevic, Theo Dimitrakos, Maurizio Colombo, Sergio Miranda |
Design patterns for secure virtual organization management architecture. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Luca Longo, Pierpaolo Dondio, Stephen Barrett |
Temporal factors to evaluate trustworthiness of virtual identities. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Coronato, Giuseppe De Pietro |
A context service for multimodal pervasive environments. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Marc Seigneur |
Trustworthiness of collaborative Open Source Software quality assessment. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yuxin Wei, Muqing Wu |
Intrusion detection technology based on CEGA-SVM. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kyuhyung Cho, Jongsung Lee 0005, Jongin Lim 0001, Jongsub Moon |
Verification method of network simulation for pervasive environments. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jang-Su Park, Soo-Young Kang, Im-Yeong Lee |
A study on secure RFID authentication protocol in insecure communication. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kerschbaum |
Simple cross-site attack prevention. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli |
A model for usage control in GRID systems. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Paolo Mori |
A model for usage control in GRID systems. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jian Yin 0006, Sanjay Kumar Madria |
Sybil attack detection in a hierarchical sensor network. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Luigi Coppolino, Luigi Romano, Nicola Mazzocca, Sergio Salvi |
Web Services workflow reliability estimation through reliability patterns. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ahren Studer, Mark Luk, Adrian Perrig |
Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Spyros Kotoulas, Ronny Siebes |
Scalable discovery of private resources. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi |
A layout-similarity-based approach for detecting phishing pages. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Claude Castelluccia, Angelo Spognardi |
RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Xun Wang, Wei Yu 0002, Adam C. Champion, Xinwen Fu, Dong Xuan |
Detecting worms via mining dynamic program execution. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Tuomas Aura, Michael Roe, Steven J. Murdoch |
Securing network location awareness with authenticated DHCP. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham |
SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Massimiliano Rak, Valentina Casola, Nicola Mazzocca, Emilio Pasquale Mancini, Umberto Villano |
Optimizing secure Web Services with MAWeS: A case study. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | |
Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007 |
SecureComm |
2007 |
DBLP BibTeX RDF |
|
1 | Ashish Gehani, Surendar Chandra |
Parameterizing access control for heterogeneous peer-to-peer applications. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|