Security and Privacy in Communication Networks

7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers

ISBN: 978-3-642-31908-2 (Print) 978-3-642-31909-9 (Online)

Table of contents (35 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Network Intrusion Detection

    1. No Access

      Book Chapter

      Pages 1-18

      Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks

    2. No Access

      Book Chapter

      Pages 19-38

      An On-Line Learning Statistical Model to Detect Malicious Web Requests

    3. No Access

      Book Chapter

      Pages 39-58

      Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems

  3. Anonymity and Privacy (I)

    1. No Access

      Book Chapter

      Pages 59-76

      K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access

    2. No Access

      Book Chapter

      Pages 77-95

      Analyzing the Gold Star Scheme in a Split Tor Network

    3. No Access

      Book Chapter

      Pages 96-115

      Location Privacy and Attacker Knowledge: Who Are We Fighting against?

  4. Wireless Security (I)

    1. No Access

      Book Chapter

      Pages 116-133

      Insecurity in Public-Safety Communications: APCO Project 25

    2. No Access

      Book Chapter

      Pages 134-153

      Behavioral Mimicry Covert Communication

    3. No Access

      Book Chapter

      Pages 154-171

      Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks

  5. System Security

    1. No Access

      Book Chapter

      Pages 172-189

      On Detection of Erratic Arguments

    2. No Access

      Book Chapter

      Pages 190-208

      SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits

    3. No Access

      Book Chapter

      Pages 209-226

      Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots

  6. Anonymity and Privacy (II)

    1. No Access

      Book Chapter

      Pages 227-242

      Optimistic Fair Exchange of Ring Signatures

    2. No Access

      Book Chapter

      Pages 243-260

      Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards

    3. No Access

      Book Chapter

      Pages 261-280

      Multi-party Private Web Search with Untrusted Partners

  7. DNS and Routing Security

    1. No Access

      Book Chapter

      Pages 281-302

      v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks

    2. No Access

      Book Chapter

      Pages 303-318

      Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning

    3. No Access

      Book Chapter

      Pages 319-336

      Unilateral Antidotes to DNS Poisoning

  8. Key Management

    1. No Access

      Book Chapter

      Pages 337-355

      Security Analysis of Leap-of-Faith Protocols

    2. No Access

      Book Chapter

      Pages 356-372

      Secure and Practical Key Distribution for RFID-Enabled Supply Chains

previous Page of 2