Abstract is missing.
- Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page MessagesLiang Cai, Gabriel Maganis, Hui Zang, Hao Chen. 1-20 [doi]
- FIJI: Fighting Implicit Jamming in 802.11 WLANsIoannis Broustis, Konstantinos Pelechrinis, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Leandros Tassiulas. 21-40 [doi]
- Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc NetworksMansoor Alicherry, Angelos D. Keromytis, Angelos Stavrou. 41-50 [doi]
- Baiting Inside Attackers Using Decoy DocumentsBrian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo. 51-70 [doi]
- MULAN: Multi-Level Adaptive Network FilterShimrit Tzur-David, Danny Dolev, Tal Anker. 71-90 [doi]
- Automated Classification of Network Traffic AnomaliesGuilherme Fernandes, Philippe Owezarski. 91-100 [doi]
- Formal Analysis of FPH Contract Signing Protocol Using Colored Petri NetsMagdalena Payeras-Capellà, Macià Mut Puigserver, Andreu Pere Isern-Deyà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger. 101-120 [doi]
- On the Security of Bottleneck Bandwidth Estimation TechniquesGhassan Karame, David Gubler, Srdjan Capkun. 121-141 [doi]
- An Eavesdropping Game with SINR as an Objective FunctionAndrey Garnaev, Wade Trappe. 142-162 [doi]
- Ensemble: Community-Based Anomaly Detection for Popular ApplicationsFeng Qian, Zhiyun Qian, Zhuoqing Morley Mao, Atul Prakash. 163-184 [doi]
- Using Failure Information Analysis to Detect Enterprise ZombiesZhaosheng Zhu, Vinod Yegneswaran, Yan Chen. 185-206 [doi]
- Dealing with Liars: Misbehavior Identification via Rényi-Ulam GamesWilliam Kozma, Loukas Lazos. 207-227 [doi]
- Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor NetworksToni Perkovic, Ivo Stancic, Luka Malisa, Mario Cagalj. 228-247 [doi]
- Aggregated Authentication (AMAC) Using Universal Hash FunctionsWassim Znaidi, Marine Minier, Cédric Lauradoux. 248-264 [doi]
- Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSNAndrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini. 265-284 [doi]
- Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor NetworksYanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao. 285-295 [doi]
- User-Centric Identity Using ::::e::::PassportsMartijn Oostdijk, Dirk-Jan van Dijk, Maarten Wegdam. 296-310 [doi]
- Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast SystemsShucheng Yu, Kui Ren, Wenjing Lou, Jin Li. 311-329 [doi]
- Breaking and Building of Group Inside SignatureS. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, C. Pandu Rangan. 330-339 [doi]
- Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web ResourcesThanassis Tiropanis, Tassos Dimitriou. 340-349 [doi]
- Self-organized Anonymous Authentication in Mobile Ad Hoc NetworksJulien Freudiger, Maxim Raya, Jean-Pierre Hubaux. 350-372 [doi]
- An Active Global Attack Model for Sensor Source Location Privacy: Analysis and CountermeasuresYi Yang, Sencun Zhu, Guohong Cao, Thomas LaPorta. 373-393 [doi]
- Rogue Access Point Detection Using Innate Characteristics of the 802.11 MACAravind Venkataraman, Raheem Beyah. 394-416 [doi]
- A Novel Architecture for Secure and Scalable Multicast over IP NetworkYawen Wei, Zhen Yu, Yong Guan. 417-436 [doi]
- Reliable Resource Searching in P2P NetworksMichael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, Nikos Triandopoulos. 437-447 [doi]
- The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate SystemsEric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim. 448-458 [doi]