Abstract is missing.
- Securing virtual machine monitors: what is needed?Paul A. Karger. 1 [doi]
- Automatic discovery of botnet communities on large-scale communication networksWei Lu, Mahbod Tavallaee, Ali A. Ghorbani. 1-10 [doi]
- Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partnersBhavani M. Thuraisingham. 2 [doi]
- Automating analysis of large-scale botnet probing eventsZhichun Li, Anup Goyal, Yan Chen, Vern Paxson. 11-22 [doi]
- Towards complete node enumeration in a peer-to-peer botnetBrent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim. 23-34 [doi]
- Efficient IRM enforcement of history-based access control policiesFei Yan, Philip W. L. Fong. 35-46 [doi]
- Lightweight self-protecting JavaScriptPhu H. Phung, David Sands, Andrey Chudnov. 47-60 [doi]
- On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackersRuishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui Yang, Xuxian Jiang. 61-69 [doi]
- A generic construction of useful client puzzlesRui Zhang 0002, Goichiro Hanaoka, Hideki Imai. 70-79 [doi]
- An integrated approach to detection of fast and slow scanning wormsFrank Akujobi, Ioannis Lambadaris, Evangelos Kranakis. 80-91 [doi]
- Authenticated wireless roaming via tunnels: making mobile guests feel at homeMark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater. 92-103 [doi]
- On-board credentials with open provisioningKari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala. 104-115 [doi]
- Flexible muTPMs through disembeddingKlaus Kursawe, Dries Schellekens. 116-124 [doi]
- A chipset level network backdoor: bypassing host-based firewall & IDSSherri Sparks, Shawn Embleton, Cliff Changchun Zou. 125-134 [doi]
- TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replayKhalid Elbadawi, Ehab Al-Shaer. 135-145 [doi]
- Universally composable contributory group key exchangeM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto. 146-156 [doi]
- Universal forgery of the identity-based sequential aggregate signature schemeJung Yeon Hwang, Dong-Hoon Lee, Moti Yung. 157-160 [doi]
- Partnership in key exchange protocolsKazukuni Kobara, SeongHan Shin, Mario Strefler. 161-170 [doi]
- Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversaryKannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan. 171-182 [doi]
- Formalizing information security knowledgeStefan Fenz, Andreas Ekelhart. 183-194 [doi]
- Efficient zero-knowledge identification schemes which respect privacyJulien Bringer, Hervé Chabanne, Thomas Icart. 195-205 [doi]
- Quantifying maximal loss of anonymity in protocolsHan Chen, Pasquale Malacaria. 206-217 [doi]
- The union-split algorithm and cluster-based anonymization of social networksBrian Thompson, Danfeng Yao. 218-227 [doi]
- Hidden credential retrieval from a reusable passwordXavier Boyen. 228-238 [doi]
- Expressive policy analysis with enhanced system dynamicityRobert Craven, Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil C. Lupu, Arosha K. Bandara. 239-250 [doi]
- Semantic context aware security policy deploymentStere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain, Yehia Elrakaiby. 251-261 [doi]
- PBES: a policy based encryption system with application to data sharing in the power gridRakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, Farhana Ashraf. 262-275 [doi]
- Attribute based proxy re-encryption with delegating capabilitiesXiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao. 276-286 [doi]
- Confidentiality-preserving distributed proofs of conjunctive queriesAdam J. Lee, Kazuhiro Minami, Nikita Borisov. 287-297 [doi]
- D-algebra for composing access control policy decisionsQun Ni, Elisa Bertino, Jorge Lobo. 298-309 [doi]
- Toward practical analysis for trust management policyMark Reith, Jianwei Niu, William H. Winsborough. 310-321 [doi]
- Conditional proxy re-encryption secure against chosen-ciphertext attackJian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai. 322-332 [doi]
- An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problemHai Huang, Zhenfu Cao. 333-342 [doi]
- Provably secure and efficient bounded ciphertext policy attribute based encryptionXiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing. 343-352 [doi]
- A new hash family obtained by modifying the SHA-2 familySomitra Kumar Sanadhya, Palash Sarkar. 353-363 [doi]
- Logging key assurance indicators in business processesFabio Massacci, Gene Tsudik, Artsiom Yautsiukhin. 364-367 [doi]
- Anonymous user communication for privacy protection in wireless metropolitan mesh networksZhiguo Wan, Kui Ren, Bo Zhu, Bart Preneel, Ming Gu. 368-371 [doi]
- Delegate predicate encryption and its application to anonymous authenticationRibao Wei, Dingfeng Ye. 372-375 [doi]
- Improved searchable public key encryption with designated testerHyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong-Hoon Lee. 376-379 [doi]
- A note on Cook s elastic block cipherLiting Zhang, Wenling Wu, Lei Zhang, Yanjun Li. 380-383 [doi]
- A conceptual framework for Group-Centric secure information sharingRam Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough. 384-387 [doi]
- Intrusion response cost assessment methodologyChris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong. 388-391 [doi]