Abstract is missing.
- Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case StudyRafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García Teodoro. 1-13 [doi]
- A Technology Independent Security Gateway for Real-Time Multimedia CommunicationFudong Li, Nathan L. Clarke, Steven Furnell. 14-25 [doi]
- Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc NetworkY. Sreenivasa Rao, Ratna Dutta. 26-39 [doi]
- Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion DetectionYuxin Meng, Wenjuan Li, Lam-for Kwok. 40-53 [doi]
- Model the Influence of Sybil Nodes in P2P BotnetsTianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi. 54-67 [doi]
- A Novel Security Protocol for Resolving Addresses in the Location/ID Split ArchitectureMahdi Aiash. 68-79 [doi]
- The OffPAD: Requirements and UsageKent Are Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang, Johann Vincent, Laurent Miralabé. 80-93 [doi]
- Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc NetworksSashi Gurung, Dan Lin, Anna Cinzia Squicciarini, Elisa Bertino. 94-108 [doi]
- Using Trusted Platform Modules for Location Assurance in Cloud NetworkingChristoph Krauß, Volker Fusenig. 109-121 [doi]
- Tracing Sources of Anonymous Slow Suspicious ActivitiesHarsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James. 122-134 [doi]
- Static Analysis for Regular Expression Denial-of-Service AttacksJames Kirrage, Asiri Rathnayake, Hayo Thielecke. 135-148 [doi]
- Next-Generation DoS at the Higher Layers: A Study of SMTP FloodingGabriel Cartier, Jean-François Cartier, José M. Fernandez. 149-163 [doi]
- Towards Hybrid Honeynets via Virtual Machine Introspection and CloningTamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias. 164-177 [doi]
- MADS: Malicious Android Applications Detection through String AnalysisBorja Sanz, Igor Santos, Javier Nieves, Carlos Laorden, Iñigo Alonso-Gonzalez, Pablo Garcia Bringas. 178-191 [doi]
- X-TIER: Kernel Module InjectionSebastian Vogl, Fatih Kilic, Christian Schneider, Claudia Eckert. 192-205 [doi]
- Leveraging String Kernels for Malware DetectionJonas Pfoh, Christian Schneider, Claudia Eckert. 206-219 [doi]
- Insiders Trapped in the Mirror Reveal Themselves in Social MediaMiltiadis Kandias, Konstantina Galbogini, Lilian Mitrou, Dimitris Gritzalis. 220-235 [doi]
- On Business Logic Vulnerabilities Hunting: The APP_LogGIC FrameworkGeorge Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis. 236-249 [doi]
- Using the Smart Card Web Server in Secure Branchless BankingSheila Cobourne, Keith Mayes, Konstantinos Markantonakis. 250-263 [doi]
- Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning ApproachMaurizio Naldi, Marta Flamini, Giuseppe D'Acquisto. 264-277 [doi]
- Efficient and Private Three-Party Publish/SubscribeGiovanni Di Crescenzo, Jim Burns, Brian A. Coan, John Schultz, Jonathan Robert Stanton, Simon Tsang, Rebecca N. Wright. 278-292 [doi]
- Marlin: A Fine Grained Randomization Approach to Defend against ROP AttacksAditi Gupta 0002, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino. 293-306 [doi]
- Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer PlatformWei Feng, Yu Qin, Dengguo Feng, Ge Wei, Lihui Xue, Dexian Chang. 307-320 [doi]
- Anomaly Detection for Ephemeral Cloud IaaS Virtual MachinesSuaad Alarifi, Stephen D. Wolthusen. 321-335 [doi]
- JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization AlgorithmsBenoît Bertholon, Sébastien Varrette, Pascal Bouvry. 336-349 [doi]
- Forward Secure Certificateless Proxy Signature SchemeJiguo Li, Yanqiong Li, Yichen Zhang. 350-364 [doi]
- Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NPHongda Li, Qihua Niu, Bei Liang. 365-380 [doi]
- On the Security of an Efficient Attribute-Based SignatureYan Zhang, Dengguo Feng, Zhengfeng Zhang, Liwu Zhang. 381-392 [doi]
- Factoring RSA Modulus with Known Bits from Both p and q: A Lattice MethodYao Lu, Rui Zhang 0002, Dongdai Lin. 393-404 [doi]
- Performance Prediction Model for Block Ciphers on GPU ArchitecturesNaoki Nishikawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa. 405-423 [doi]
- Threshold-Oriented Optimistic Fair ExchangeYang Wang, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Willy Susilo. 424-438 [doi]
- Secure Storage and Fuzzy Query over Encrypted DatabasesZheli Liu, Haoyu Ma, Jin Li, Chunfu Jia, Jingwei Li, Ke Yuan. 439-450 [doi]
- A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF EvaluationYunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie. 451-464 [doi]
- Privacy Preserving Context Aware Publish Subscribe SystemsMohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro P. Buchmann. 465-478 [doi]
- A New Unpredictability-Based RFID Privacy ModelAnjia Yang, Yunhui Zhuang, Duncan S. Wong, Guomin Yang. 479-492 [doi]
- Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic EncryptionFlorian Weingarten, Georg Neugebauer, Ulrike Meyer, Susanne Wetzel. 493-506 [doi]
- Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party SettingWeijia Wang, Lei Hu, Yong Li. 507-520 [doi]
- Light Weight Network Coding Based Key Distribution Scheme for MANETsJianwei Liu, Abdur Rashid Sangi, RuiYing Du, Qianhong Wu. 521-534 [doi]
- Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information NetworkChao Wang, Kefei Mao, Jianwei Liu, Jianhua Liu. 535-548 [doi]
- Authentication and Key Agreement Based on Hyper-sphere Using Smart CardsShaohua Tang, Lingling Xu. 549-562 [doi]
- An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc NetworksElisavet Konstantinou. 563-574 [doi]
- Human Identification with Electroencephalogram (EEG) for the Future Network SecurityXu Huang, Salahiddin Altahat, Dat Tran, Li Shutao. 575-581 [doi]
- Building Better Unsupervised Anomaly Detector with S-TransformSirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi. 582-589 [doi]
- Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNsJing Chen, RuiYing Du, Li Zhao, Chiheng Wang, Minghui Zheng, Yang Xiang. 590-598 [doi]
- Virtually Reconfigurable Secure Wireless Networks Using Broadcast TokensKannan Karthik. 599-606 [doi]
- On the Use of Key Assignment Schemes in Authentication ProtocolsJames Alderman, Jason Crampton. 607-613 [doi]
- On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing SystemsIdalides J. Vergara-Laurens, Diego Mendez-Chaves, Miguel A. Labrador. 614-620 [doi]
- Security Authentication of AODV Protocols in MANETsAhmad Alomari. 621-627 [doi]
- Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet ApproachMarkus Gruber, Christian Schanes, Florian Fankhauser, Martin Moutran, Thomas Grechenig. 628-634 [doi]
- Towards a Privacy-Preserving Solution for OSNsQiang Tang. 635-641 [doi]
- Measuring and Comparing the Protection Quality in Different Operating SystemsZhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng. 642-648 [doi]
- Collusion-Resistant Domain-Specific Pseudonymous SignaturesJulien Bringer, Hervé Chabanne, Alain Patey. 649-655 [doi]
- On the Applicability of Time-Driven Cache Attacks on Mobile DevicesRaphael Spreitzer, Thomas Plos. 656-662 [doi]
- Ancestor Excludable Hierarchical ID-Based Encryption RevisitedFan Zhang, Hua Guo, Zhoujun Li. 663-670 [doi]
- Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social NetworksYan Li, Yingjiu Li, Qiang Yan, Robert H. Deng. 671-677 [doi]
- A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless NetworksJia Hu, Hui Lin, Li Xu. 678-684 [doi]
- Distributed and Anonymous Publish-SubscribeJörg Daubert, Mathias Fischer, Stefan Schiffner, Max Mühlhäuser. 685-691 [doi]
- Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency GraphsGiovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale. 692-698 [doi]
- Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized EnvironmentsShun-Wen Hsiao, Yi-Ning Chen, Yeali S. Sun, Meng Chang Chen. 699-706 [doi]
- Filtering Trolling Comments through Collective ClassificationJorge de-la-Peña-Sordo, Igor Santos, Iker Pastor-López, Pablo Garcia Bringas. 707-713 [doi]
- Security Analysis of Touch Inputted Passwords - A Preliminary Study Based on the Resistance against Brute Force AttacksBruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto. 714-720 [doi]
- A Pairing-Free Identity Based Authentication Framework for Cloud ComputingDheerendra Mishra, Vinod Kumar, Sourav Mukhopadhyay. 721-727 [doi]
- Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication ProtocolsAlessandro Armando, Roberto Carbone, Luca Zanetti. 728-734 [doi]
- Towards a More Secure Apache Hadoop HDFS Infrastructure - Anatomy of a Targeted Advanced Persistent Threat against HDFS and Analysis of Trusted Computing Based CountermeasuresJason Cohen, Subatra Acharya. 735-741 [doi]
- A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDRMahdi Aiash. 742-748 [doi]
- A Comprehensive Access Control System for Scientific ApplicationsMuhammad I. Sarfraz, Peter Baker, Jia Xu, Elisa Bertino. 749-755 [doi]
- Partial Fingerprint Reconstruction with Improved Smooth ExtensionWei Zhou, Jiankun Hu, Ian Petersen, Mohammed Bennamoun. 756-762 [doi]
- Modeling and Analysis for Thwarting Worm Propagation in Email NetworksSheng Wen, Yang Xiang, Wanlei Zhou. 763-769 [doi]
- On Secure and Power-Efficient RFID-Based Wireless Body Area NetworkSana Ullah, Waleed Alsalih. 770-776 [doi]
- Towards Authenticated ObjectsDaniele Midi, Ashish Kundu, Elisa Bertino. 777-783 [doi]
- A Finger-Vein Based Cancellable Bio-cryptosystemWenCheng Yang, Jiankun Hu, Song Wang. 784-790 [doi]