Security and Privacy in Communication Networks 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Σειρά: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
50 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Malware and Email Security
- SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection
- Analyzing and Exploiting Network Behaviors of Malware
- Inexpensive Email Addresses An Email Spam-Combating System
- Anonymity and Privacy
- Privacy Administration in Distributed Service Infrastructure
- On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS
- Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings
- Wireless Security
- A Study on False Channel Condition Reporting Attacks in Wireless Networks
- Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services
- Saving Energy on WiFi with Required IPsec
- Systems Security – I
- Transparent Protection of Commodity OS Kernels Using Hardware Virtualization
- A Generic Construction of Dynamic Single Sign-on with Strong Security
- DeCore: Detecting Content Repurposing Attacks on Clients’ Systems
- Network Security – I
- Realizing a Source Authentic Internet
- Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks
- Attacking Beacon-Enabled 802.15.4 Networks
- Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
- Security Protocols – I
- CED2: Communication Efficient Disjointness Decision
- Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes
- Context-Aware Usage Control for Android
- System Security – II
- Efficient Isolation of Trusted Subsystems in Embedded Systems
- Enhancing Host Security Using External Environment Sensors
- FADE: Secure Overlay Cloud Storage with File Assured Deletion
- Security Protocols – II
- A New Information Leakage Measure for Anonymity Protocols
- Hidden Markov Models for Automated Protocol Learning
- Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast
- Network Security – II
- Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly
- The Hitchhiker’s Guide to DNS Cache Poisoning
- A Formal Definition of Online Abuse-Freeness.