Security and Privacy in Communication Networks 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Jajodia, Sushil (Επιμελητής έκδοσης), Zhou, Jianying (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Σειρά:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 50
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Malware and Email Security
  • SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection
  • Analyzing and Exploiting Network Behaviors of Malware
  • Inexpensive Email Addresses An Email Spam-Combating System
  • Anonymity and Privacy
  • Privacy Administration in Distributed Service Infrastructure
  • On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS
  • Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings
  • Wireless Security
  • A Study on False Channel Condition Reporting Attacks in Wireless Networks
  • Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services
  • Saving Energy on WiFi with Required IPsec
  • Systems Security – I
  • Transparent Protection of Commodity OS Kernels Using Hardware Virtualization
  • A Generic Construction of Dynamic Single Sign-on with Strong Security
  • DeCore: Detecting Content Repurposing Attacks on Clients’ Systems
  • Network Security – I
  • Realizing a Source Authentic Internet
  • Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks
  • Attacking Beacon-Enabled 802.15.4 Networks
  • Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
  • Security Protocols – I
  • CED2: Communication Efficient Disjointness Decision
  • Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes
  • Context-Aware Usage Control for Android
  • System Security – II
  • Efficient Isolation of Trusted Subsystems in Embedded Systems
  • Enhancing Host Security Using External Environment Sensors
  • FADE: Secure Overlay Cloud Storage with File Assured Deletion
  • Security Protocols – II
  • A New Information Leakage Measure for Anonymity Protocols
  • Hidden Markov Models for Automated Protocol Learning
  • Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast
  • Network Security – II
  • Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly
  • The Hitchhiker’s Guide to DNS Cache Poisoning
  • A Formal Definition of Online Abuse-Freeness.