default search action
8. SecureComm 2012: Padua, Italy
- Angelos D. Keromytis, Roberto Di Pietro:
Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 106, Springer 2013, ISBN 978-3-642-36882-0 - Sarshad Abubaker, Kui Wu:
DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem. 1-18 - Zhiwei Wang:
Improvement on Ahn et al.'s RSA P-Homomorphic Signature Scheme. 19-28 - Chunhua Chen, Shaohua Tang, Chris J. Mitchell:
Building General-Purpose Security Services on EMV Payment Cards. 29-44 - Jiangxiao Zhang, Zhoujun Li, Hua Guo:
Anonymous Transferable Conditional E-cash. 45-60 - Jirí Kur, Vashek Matyás, Petr Svenda:
Two Improvements of Random Key Predistribution for Wireless Sensor Networks. 61-75 - Eun-Kyoung Kim, Patrick D. McDaniel, Thomas La Porta:
A Detection Mechanism for SMS Flooding Attacks in Cellular Networks. 76-93 - Tulio de Souza, Joss Wright, Piers O'Hanlon, Ian Brown:
Set Difference Attacks in Wireless Sensor Networks. 94-111 - Boxuan Gu, Wenbin Zhang, Xiaole Bai, Adam C. Champion, Feng Qin, Dong Xuan:
JSGuard: Shellcode Detection in JavaScript. 112-130 - Matteo Maria Casalino, Michele Mangili, Henrik Plate, Serena Elisa Ponta:
Detection of Configuration Vulnerabilities in Distributed (Web) Environments. 131-148 - Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam:
BINSPECT: Holistic Analysis and Detection of Malicious Web Pages. 149-166 - Govind Sreekar Shenoy, Jordi Tubella, Antonio González:
Improving the Resilience of an IDS against Performance Throttling Attacks. 167-184 - Tom Chothia, Marco Cova, Chris Novakovic, Camilo González Toro:
The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent. 185-202 - Yuxin Meng, Lam-for Kwok, Wenjuan Li:
Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection. 203-221 - Xiaokui Shu, Danfeng (Daphne) Yao:
Data Leak Detection as a Service. 222-240 - Jan Jusko, Martin Rehák:
Revealing Cooperating Hosts by Connection Graph Analysis. 241-255 - Abdun Naser Mahmood, Md. Enamul Kabir, Abdul K. Mustafa:
New Multi-dimensional Sorting Based K-Anonymity Microaggregation for Statistical Disclosure Control. 256-272 - Peng Zhou, Xiapu Luo, Rocky K. C. Chang:
More Anonymity through Trust Degree in Trust-Based Onion Routing. 273-291 - Jiawei Yuan, Shucheng Yu:
Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing. 292-309 - Ehab Al-Shaer, Qi Duan, Jafar Haadi Jafarian:
Random Host Mutation for Moving Target Defense. 310-327 - Ryan M. Gerdes, Mani Mina, Thomas E. Daniels:
Towards a Framework for Evaluating the Security of Physical-Layer Identification Systems. 328-348 - Seyed Amir Iranmanesh, Hemant Sengar, Haining Wang:
A Voice Spam Filter to Clean Subscribers' Mailbox. 349-367
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.