Abstract is missing.
- Reputation and Audits for Self-Organizing StorageNouha Oualha, Yves Roudier. [doi]
- Scalable Privacy Protecting Scheme through Distributed RFID Tag IdentificationSepideh Fouladgar, Hossam Afifi. [doi]
- BitBlender: Light-Weight Anonymity for BitTorrentKevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker. [doi]
- Anonymous return route information for onion based mix-netsYoshifumi Manabe, Tatsuaki Okamoto. [doi]
- Enforcing Behaviour with AnonymityJoss Wright, Susan Stepney. [doi]
- On the need for user-defined fine-grained access control policies for social networking applicationsAndrew Simpson. [doi]
- A Key Management Solution for Overlay-Live-StreamingMathias Fischer, Guenter Schaefer, Robert Karl Schmidt, Thorsten Strufe. [doi]
- Efficient signature matching with multiple alphabet compression tablesShijin Kong, Randy Smith, Cristian Estan. 1 [doi]
- Correlation-based load balancing for network intrusion detection and prevention systemsAnh Le, Raouf Boutaba, Ehab Al-Shaer. 2 [doi]
- Distributed flow detection over multi path sessionsEyal Felstaine, Eldad Chai, Niv Gilboa, Avi Elisha. 3 [doi]
- Relaxed authenticity for data aggregation in wireless sensor networksErik-Oliver Blaß, Joachim Wilke, Martina Zitterbart. 4 [doi]
- Source location privacy against laptop-class attacks in sensor networksYi Ouyang, Zhengyi Le, Donggang Liu, James Ford, Fillia Makedon. 5 [doi]
- Securely computing an approximate median in wireless sensor networksSankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia. 6 [doi]
- Sybil proof anonymous reputation managementWolf Müller, Henryk Plötz, Jens-Peter Redlich, Takashi Shiraki. 7 [doi]
- RepTrap: a novel attack on feedback-based reputation systemsYafei Yang, Qinyuan Feng, Yan Lindsay Sun, Yafei Dai. 8 [doi]
- Scalable and efficient provable data possessionGiuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik. 9 [doi]
- An identity-based key infrastructure suitable for messaging and its application to e-mailAyse Gül Karatop, Erkay Savas. 10 [doi]
- SMM rootkits: a new breed of OS independent malwareShawn Embleton, Sherri Sparks, Cliff C. Zou. 11 [doi]
- On capturing malware dynamics in mobile power-law networksAbhijit Bose, Kang G. Shin. 12 [doi]
- Overbot: a botnet protocol based on KademliaGuenther Starnberger, Christopher Kruegel, Engin Kirda. 13 [doi]
- Containment of network worms via per-process rate-limitingYuanyuan Zeng, Xin Hu, Haixiong Wang, Kang G. Shin, Abhijit Bose. 14 [doi]
- Detection of word shift steganography in PDF documentLingjun Li, Liusheng Huang, Wei Yang, Xinxin Zhao, Zhenshan Yu, Zhili Chen. 15 [doi]
- Location privacy based on trusted computing and secure loggingUrs Hengartner. 16 [doi]
- Evaluating the utility of anonymized network traces for intrusion detectionKiran Lakkaraju, Adam J. Slagell. 17 [doi]
- Attribute-based on-demand multicast group setup with membership anonymityShucheng Yu, Kui Ren, Wenjing Lou. 18 [doi]
- On the performance of a hybrid intrusion detection architecture for voice over IP systemsBazara I. A. Barry, H. Anthony Chan. 19 [doi]
- LIDeA: a distributed lightweight intrusion detection architecture for sensor networksIoannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou. 20 [doi]
- Hiding "real" machine from attackers and malware with a minimal virtual machine monitorYan Wen, Jinjing Zhao, Huaimin Wang. 21 [doi]
- Visual-similarity-based phishing detectionEric Medvet, Engin Kirda, Christopher Kruegel. 22 [doi]
- Attacking the Kad networkPeng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim. 23 [doi]
- Voice pharming attack and the trust of VoIPXinyuan Wang, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera. 24 [doi]
- A cross-layer dropping attack in video streaming over ad hoc networksMin Shao, Sencun Zhu, Guohong Cao, Tom La Porta, Prasant Mohapatra. 25 [doi]
- Unassailable sensor networksAlessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan. 26 [doi]
- Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive?Sherif M. Khattab, Daniel Mossé, Rami G. Melhem. 27 [doi]
- MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networksIssa Khalil, Saurabh Bagchi. 28 [doi]
- PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communicationsAndrea Cirulli, Roberto Di Pietro. 29 [doi]
- Subjective logic based trust model for mobile ad hoc networksVenkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula. 30 [doi]
- ARCMA: attack-resilient collaborative message authentication in wireless sensor networksMin Gyu Cho, Kang G. Shin. 31 [doi]
- A heterogeneity-aware framework for group key management in wireless mesh networksXia Wang, Johnny Wong, Wensheng Zhang 0001. 32 [doi]
- A lightweight biometric signature scheme for user authentication over networksTansu Alpcan, Sinan Kesici, Daniel Bicher, Mehmet Kivanç Mihçak, Christian Bauckhage, Seyit Ahmet Çamtepe. 33 [doi]
- rfidDOT: RFID delegation and ownership transfer made simpleTassos Dimitriou. 34 [doi]
- Parameterized access control: from design to prototypeAshish Gehani, Surendar Chandra. 35 [doi]
- Towards more secure systems: how to combine expert evaluationsMarco Benini, Sabrina Sicari. 36 [doi]