Security and Privacy in Communication Networks

8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers


ISBN: 978-3-642-36882-0 (Print) 978-3-642-36883-7 (Online)

Table of contents (21 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Chapter

    Pages 1-18

    DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem

  3. Chapter

    Pages 19-28

    Improvement on Ahn et al.’s RSA P-Homomorphic Signature Scheme

  4. Chapter

    Pages 29-44

    Building General-Purpose Security Services on EMV Payment Cards

  5. Chapter

    Pages 45-60

    Anonymous Transferable Conditional E-cash

  6. Chapter

    Pages 61-75

    Two Improvements of Random Key Predistribution for Wireless Sensor Networks

  7. Chapter

    Pages 76-93

    A Detection Mechanism for SMS Flooding Attacks in Cellular Networks

  8. Chapter

    Pages 94-111

    Set Difference Attacks in Wireless Sensor Networks

  9. Chapter

    Pages 112-130

    JSGuard: Shellcode Detection in JavaScript

  10. Chapter

    Pages 131-148

    Detection of Configuration Vulnerabilities in Distributed (Web) Environments

  11. Chapter

    Pages 149-166

    BINSPECT: Holistic Analysis and Detection of Malicious Web Pages

  12. Chapter

    Pages 167-184

    Improving the Resilience of an IDS against Performance Throttling Attacks

  13. Chapter

    Pages 185-202

    The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent

  14. Chapter

    Pages 203-221

    Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection

  15. Chapter

    Pages 222-240

    Data Leak Detection as a Service

  16. Chapter

    Pages 241-255

    Revealing Cooperating Hosts by Connection Graph Analysis

  17. Chapter

    Pages 256-272

    New Multi-dimensional Sorting Based K-Anonymity Microaggregation for Statistical Disclosure Control

  18. Chapter

    Pages 273-291

    More Anonymity through Trust Degree in Trust-Based Onion Routing

  19. Chapter

    Pages 292-309

    Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing

  20. Chapter

    Pages 310-327

    Random Host Mutation for Moving Target Defense

  21. Chapter

    Pages 328-348

    Towards a Framework for Evaluating the Security of Physical-Layer Identification Systems

previous Page of 2