Limit search to available items
Book Cover
E-book
Author SecureComm (2011 : London, England)

Title Security and privacy in communication networks : 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised selected papers / Muttukrishnan Rajarajan [and others] (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource
Series Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 1867-8211 ; 96
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ; 96.
Contents Part 1. Network Intrusion Detection -- Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks / Zhiyun Qian, Z. Morley Mao, Ammar Rayes and David Jaffe -- An On-Line Learning Statistical Model to Detect Malicious Web Requests / Harald Lampesberger, Philipp Winter, Markus Zeilinger and Eckehard Hermann -- Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems / Gaspar Modelo-Howard, Jevin Sweval and Saurabh Bagchi -- Part 2. Anonymity and Privacy (I) -- K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access / Saman Zarandioon, Danfeng (Daphne) Yao and Vinod Ganapathy -- Analyzing the Gold Star Scheme in a Split Tor Network / Benedikt Westermann, Pern Hui Chia and Dogan Kesdogan -- Location Privacy and Attacker Knowledge: Who Are We Fighting against? / Rinku Dewri -- Part 3. Wireless Security (I) -- Insecurity in Public-Safety Communications: APCO Project 25 / Stephen Glass, Vallipuram Muthukkumarasamy, Marius Portmann and Matthew Robert -- Behavioral Mimicry Covert Communication / Seyed Ali Ahmadzadeh and Gordon Agnew
Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks / Chowdhury Sayeed Hyder, Brendan Grebur and Li Xiao -- Part 4. System Security -- On Detection of Erratic Arguments / Jin Han, Qiang Yan, Robert H. Deng and Debin Gao -- SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits / Deguang Kong, Donghai Tian, Peng Liu and Dinghao Wu -- Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots / Deepa Srinivasan and Xuxian Jiang -- Part 5. Anonymity and Privacy (II) -- Optimistic Fair Exchange of Ring Signatures / Lie Qu, Guilin Wang and Yi Mu -- Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards / Wojciech Mostowski and Pim Vullers -- Multi-party Private Web Search with Untrusted Partners / Cristina Romero-Tris, Jordi Castellà-Roca and Alexandre Viejo -- Part 6. DNS and Routing Security -- v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks / Amiya Kumar Maji and Saurabh Bagchi -- Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning / Shimrit Tzur-David, Kiril Lashchiver, Danny Dolev and Tal Anker -- Unilateral Antidotes to DNS Poisoning / Amir Herzberg and Haya Shulman
Part 7. Key Management -- Security Analysis of Leap-of-Faith Protocols / Viet Pham and Tuomas Aura -- Secure and Practical Key Distribution for RFID-Enabled Supply Chains / Tieyan Li, Yingjiu Li and Guilin Wang -- Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane / Sarbari Mitra, Ratna Dutta and Sourav Mukhopadhyay -- Part 8. Wireless Security (II) -- Context-Related Access Control for Mobile Caching / Zhi Xu, Kun Bai, Sencun Zhu, Leslie Liu and Randy Moulic -- Anonymity for Key-Trees with Adaptive Adversaries / Michael Beye and Thijs Veugen -- Part 9. Short Papers -- Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag / Thomas Plos and Martin Feldhofer -- Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines / Hanjun Gao, Lina Wang, Wei Liu, Yang Peng and Hao Zhang -- Winning with DNS Failures: Strategies for Faster Botnet Detection / Sandeep Yadav and A.L. Narasimha Reddy
Trading Elephants for Ants: Efficient Post-attack Reconstitution / Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou and Anup K. Ghosh, et al. -- Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data / Akshay Dua, Nirupama Bulusu and Wu-chang Feng -- Symbolic Analysis for Security of Roaming Protocols in Mobile Networks [Extended Abstract] / Chunyu Tang, David A. Naumann and Susanne Wetzel -- CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services / Huijun Xiong, Xinwen Zhang, Wei Zhu and Danfeng Yao -- Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks / Hemant Sengar, Xinyuan Wang and Arthur Nichols -- T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks / Steffen Wagner, Christoph Krauß and Claudia Eckert -- Build and Test Your Own Network Configuration / Saeed Al-Haj, Padmalochan Bera and Ehab Al-Shaer -- PP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks / Manuel Crotti, Diego Ferri, Francesco Gringoli, Manuel Peli and Luca Salgarelli -- NetFlow Based Network Protection / Vojtech Krmicek and Jan Vykopal
Summary This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management
Analysis Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Information Systems
Systems and Data Security
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Operating Systems
Bibliography Includes bibliographical references and index
Subject Telecommunication systems -- Security measures -- Congresses
Computer networks -- Security measures -- Congresses
Data encryption (Computer science) -- Congresses
Informatique.
Computer networks -- Security measures
Data encryption (Computer science)
Telecommunication systems -- Security measures
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Rajarajan, M.
ISBN 9783642319099
3642319092
3642319084
9783642319082
Other Titles SecureComm 2011