Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jens Ove Lauf, Harald Sauff |
Secure lightweight tunnel for monitoring transport containers. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Assed Jehangir, Sonia M. Heemstra de Groot |
Securing Personal Network clusters. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Tom Chothia |
Securing pseudo identities in an anonymous peer-to-peer file-sharing network. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Heesook Choi, Sencun Zhu, Thomas F. La Porta |
SET: Detecting node clones in sensor networks. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Pekka Nikander |
Evolution of networking: Current problems and future directions. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Frank J. Suraci, Arye R. Ephrath, John R. Wullert |
Global interoperability of national security and emergency preparedness (NS/EP) telecommunications services. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Frattini, Pierpaolo Petriccione, Giuseppe Leone, Gianluca Supino, Fabio Corvino |
Beyond web 2.0: enabling multimodal web interactions using VoIP and Ajax. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kasper Bonne Rasmussen, Srdjan Capkun |
Implications of radio fingerprinting on the security of sensor networks. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Wassim Itani, Ayman I. Kayssi, Ali Chehab |
An efficient and scalable Security ProtocoL for protecting fixed-Content Objects in ContEnt aDdressable StoraGe architEctures. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | João P. Vilela, João Barros |
A feedback reputation mechanism to secure the optimized link state routing protocol. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Maria Gorlatova, Marc Kelly, Ramiro Liscano, Peter C. Mason |
Enhancing frequency-based wormhole attack detection with novel jitter waveforms. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jian Qiu, Lixin Gao 0001, Supranamaya Ranjan, Antonio Nucci |
Detecting bogus BGP route information: Going beyond prefix hijacking. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Christer Andersson, Andriy Panchenko 0001 |
Practical anonymous communication on the mobile internet using Tor. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michalis Foukarakis, Demetres Antoniades, Spyros Antonatos, Evangelos P. Markatos |
Flexible and high-performance anonymization of NetFlow records using anontool. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | David Chadwick |
Aggregation of attributes from different authorities. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Meena Dilip Singh, Ashutosh Saxena |
Secure computation for data privacy. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah |
NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Augusto Ciuffoletti |
Secure token passing at application level. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michele Bezzi |
An entropy based method for measuring anonymity. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Fen Liu, Lei Hu, Li Lu 0001, Weijia Wang |
Privacy-preserving authentication with low computational overhead for RFID systems. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Borders, Laura Falk, Atul Prakash 0001 |
OpenFire: Using deception to reduce network attacks. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dominic Battré, Karim Djemame, Odej Kao, Kerstin Voß |
Gaining users' trust by publishing failure probabilities. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, G. Di Matteo, Luigi Romano |
iToken: aWireless smart card reader which provides handhelds with desk top equivalent security. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yoon-chan Jhi, Peng Liu 0005, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis |
PWC: A proactive worm containment solution for enterprise networks. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Timothy W. van der Horst, Kent E. Seamons |
Simple Authentication for the Web. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Seyit Ahmet Çamtepe, Bülent Yener |
Modeling and detection of complex attacks. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ruiyi Zhang, Johnson P. Thomas, Venkata Manoj Mulpuru |
Deception framework for sensor networks. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michael Rossberg, Guenter Schaefer, Thorsten Strufe |
Using recurring costs for reputation management in peer-to-peer streaming systems. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Pekka Nikander |
The Host Identity Protocol (HIP): Bringing mobility, multi- homing, and baseline security together. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Susana Alcalde Bagüés, Jelena Mitic, Elisabeth-Anna Emberger |
The CONNECT platform: An architecture for Context-Aware Privacy in pervasive environments. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Leonardo Mattes, Leonardo C. Militelli, João Antonio Zuffo |
Platform to enforce multiple access control policy in grid hosting environment. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Takehiro Takahashi, Wenke Lee |
An assessment of VoIP covert channel threats. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Aniket Kate, Gregory M. Zaverucha, Urs Hengartner |
Anonymity and security in delay tolerant networks. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jun Wang, Luigi Lo Iacono |
Intrusion Detection and tolerance in Grid-based applications. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Sumair Ur Rahman, Urs Hengartner |
Secure crash reporting in vehicular Ad hoc networks. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee 0001 |
A secure and efficient key management scheme for wireless sensor networks. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Gautier Dallons, Philippe Massonet, Jean-François Molderez, Christophe Ponsard, Alvaro Arenas |
An analysis of the chinese wall pattern for guaranteeing confidentiality in grid-based virtual organisations. |
SecureComm |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan |
Sensor Networks that Are Provably Resilient. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Sukumal Kitisin, Clifford Neuman |
Reputation-based Trust-Aware Recommender System. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Crane, Marco Casassa Mont |
A Customizable Reputation-based Privacy Assurance System using Active Feedback. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Abhijit Bose, Kang G. Shin |
On Mobile Viruses Exploiting Messaging and Bluetooth Services. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Chin-Tser Huang, Sachin Thareja, Yong-June Shin |
Wavelet-based Real Time Detection of Network Traffic Anomalies. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Mahmoud Taibah, Ehab Al-Shaer, Raouf Boutaba |
An Architecture for an Email Worm Prevention System. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jianqing Zhang, Nikita Borisov, William Yurcik |
Outsourcing Security Analysis with Anonymized Logs. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Hooper |
An Intelligent Infrastructure Strategy to Improving the Performance and Detection Capability of Intrusion Detection Systems. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ying Xu, Roch Guérin |
A Double Horizon Defense Design for Robust Regulation of Malicious Traffic. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Trent Jaeger, David H. King, Kevin R. B. Butler, Serge Hallyn, Joy Latten, Xiaolan Zhang 0001 |
Leveraging IPsec for Mandatory Per-Packet Access Control. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff |
MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Imad Aad, Claude Castelluccia, Jean-Pierre Hubaux |
Packet Coding for Strong Anonymity in Ad Hoc Networks. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Costin Raiciu, David S. Rosenblum |
Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Chad D. Mano, David A. Cieslak |
Passive Wireless Host Detection Using Local RTT Timing Characteristics on an Enterprise Network. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Liu Yang, Markus Jakobsson, Susanne Wetzel |
Discount Anonymous On Demand Routing for Mobile Ad hoc Networks. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Nenad Jovanovic, Engin Kirda, Christopher Kruegel |
Preventing Cross Site Request Forgery Attacks. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Qing Zhang 0014, Ting Yu 0001, Peng Ning |
A Framework for Identifying Compromised Nodes in Sensor Networks. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Frank Fransen, Sven Lachmund, Eddy Olk, Laurent Bussard |
An Infrastructure for Gaining Trust in Context Information. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michael J. Chapple, Timothy E. Wright, Robert M. Winding |
Flow Anomaly Detection in Firewalled Networks. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Chandana Gamage, Ben Gras, Bruno Crispo, Andrew S. Tanenbaum |
An Identity-based Ring Signature Scheme with Enhanced Privacy. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Stewart |
Efficient visualization of change events in enterprise networks. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel |
Non-Invasive Methods for Host Certification. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan T. Trostle |
Protecting Against Distributed Denial of Service (DDoS) Attacks Using Distributed Filtering. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Gary Pack, Jaeyoung Yoon, Eli Collins, Cristian Estan |
On Filtering of DDoS Attacks Based on Source Address Prefixes. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jared Cordasco, Ulrike Meyer, Susanne Wetzel |
Implementation and Performance Evaluation of EAP-TLS-KS. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Peter Kruus, Daniel Sterne, Richard Gopaul, Michael Heyman, Brian Rivera, Peter Budulas, Brian Luu, Tommy Johnson, Natalie Ivanic, Geoffrey Lawler |
In-Band Wormholes and Countermeasures in OLSR Networks. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Timothy E. Wright, Michael J. Chapple, Robert M. Winding |
Work in Progress: Streamlined IT Risk Management through a Micro Risk Management System (μRMS). |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Stephan Groß |
Towards Cooperative Self-Protecting Mobile Devices using Trustful Relationships. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Radmilo Racic, Denys Ma, Hao Chen 0003 |
Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001, Paul F. Syverson, LiWu Chang |
Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Songqing Chen, Shiping Chen 0003, Xinyuan Wang 0005, Sushil Jajodia |
DaTA - Data-Transparent Authentication Without Communication Overhead. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Wei Yu 0002, Xun Wang, Dong Xuan, David Lee |
Effective Detection of Active Worms with Varying Scan Rate. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jennifer Golbeck |
Computing with Trust: Definition, Properties, and Algorithms. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dingbang Xu, Peng Ning |
A Flexible Approach to Intrusion Alert Anonymization and Correlation. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | George Theodorakopoulos 0001, John S. Baras |
Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Kataria, Gaurav Anand, Rudolph Araujo, Ramayya Krishnan, Adrian Perrig |
A Distributed Stealthy Coordination Mechanism for Worm Synchronization. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Baik Hoh, Marco Gruteser, Hui Xiong 0001, Ansaf Alrabady |
Enhancing Privacy Preservation of Anonymous Location Sampling Techniques in Traffic Monitoring Systems. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Abdelaziz Babakhouya, Yacine Challal, Abdelmadjid Bouabdallah, Said Gharout |
S-DV: A new approach to Secure Distance Vector routing protocols. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Navid Jam, Elliot Proebstel |
Work in Progress: Who is Watching You? Video Conferencing Security. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Lara Srour, Ayman I. Kayssi, Ali Chehab |
Reputation-Based Algorithm for Managing Trust in File Sharing Networks. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Linfeng Zhang, Yong Guan |
TOPO: A Topology-aware Single Packet Attack Traceback Scheme. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Avinanta Tarigan |
Towards Communal Governed Transactions Among Decentralized Trading Agents. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Galice, Véronique Legrand, Marine Minier, John Mullins, Stéphane Ubéda |
A History-Based Framework to Build Trust Management Systems. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jiangtao Li 0001, Ninghui Li, XiaoFeng Wang 0001, Ting Yu 0001 |
Denial of Service Attacks and Defenses in Decentralized Trust Management. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Katharine Chang, Kang G. Shin |
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Lindskog, Anna Brunström, Zoltán Faigl, Katalin Toth |
Providing Tunable Security Services: An IEEE 802.11i Example. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Xuhua Ding, Shuhong Wang 0001, Baihua Zheng |
Secure Real-time User Preference Collection for Broadcast Scheduling. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006 |
SecureComm |
2006 |
DBLP BibTeX RDF |
|
1 | Sule Simsek |
Work in Progress - Tracking Correlated Attacks in Enterprise Intranets through Lattices. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Robert M. Winding, Timothy E. Wright, Michael J. Chapple |
System Anomaly Detection: Mining Firewall Logs. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mike Burmester, Tri Van Le, Breno de Medeiros |
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Nicholas Weaver, Vern Paxson, Robin Sommer |
Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN Traffic. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Liang Xie 0002, Sencun Zhu |
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Weiliang Zhao, Vijay Varadharajan, George Bryan |
A Unified Framework for Trust Management. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Chris Piro, Clay Shields, Brian Neil Levine |
Detecting the Sybil Attack in Mobile Ad hoc Networks. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jim Basney, Patrick Flanigan, Jin Heo, Himanshu Khurana, Joe Muggli, Meenal Pant, Adam J. Slagell, Von Welch |
Mithril: Adaptable Security for Survivability in Collaborative Computing Sites. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Marco Voss, Andreas Heinemann, Max Mühlhäuser |
A Privacy Preserving Reputation System for Mobile Information Dissemination Networks. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Indrakshi Ray, Lijun Yu |
Short Paper: Towards a Location-Aware Role-Based Access Control Model. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Socek, Shujun Li, Spyros S. Magliveras, Borko Furht |
Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Amir A. Sayegh, Mahmoud T. El-Hadidi |
A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005 |
SecureComm |
2005 |
DBLP BibTeX RDF |
|
1 | Xiaoxin Wu 0001, Cristina Nita-Rotaru |
On the Security of Distributed Position Services. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Rajeev Koodli, Vijay Devarapalli, Hannu Flinck, Charles E. Perkins |
Short Paper: Location Privacy with IP Mobility. |
SecureComm |
2005 |
DBLP DOI BibTeX RDF |
|