Abstract is missing.
- SAS: Semantics Aware Signature Generation for Polymorphic Worm DetectionDeguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi. 1-19 [doi]
- Analyzing and Exploiting Network Behaviors of MalwareJose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu. 20-34 [doi]
- Inexpensive Email Addresses ::::An Email Spam-Combating System::::Aram Yegenian, Tassos Dimitriou. 35-52 [doi]
- Privacy Administration in Distributed Service InfrastructureNabil Ajam, Nora Cuppens-Boulahia, Frédéric Cuppens. 53-70 [doi]
- On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBSRinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley. 71-88 [doi]
- Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner SettingsMing Li, Shucheng Yu, Kui Ren, Wenjing Lou. 89-106 [doi]
- A Study on False Channel Condition Reporting Attacks in Wireless NetworksDongHo Kim, Yih-Chun Hu. 107-124 [doi]
- Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging ServicesPatrick Traynor. 125-143 [doi]
- Saving Energy on WiFi with Required IPsecYoungsang Shin, Steven A. Myers, Minaxi Gupta. 144-161 [doi]
- Transparent Protection of Commodity OS Kernels Using Hardware VirtualizationMichael C. Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh. 162-180 [doi]
- A Generic Construction of Dynamic Single Sign-on with Strong SecurityJinguang Han, Yi Mu, Willy Susilo, Jun Yan. 181-198 [doi]
- DeCore: Detecting Content Repurposing Attacks on Clients SystemsSmitha Sundareswaran, Anna Cinzia Squicciarini. 199-216 [doi]
- Realizing a Source Authentic InternetToby Ehrenkranz, Jun Li, Patrick McDaniel. 217-234 [doi]
- Partial Deafness: A Novel Denial-of-Service Attack in 802.11 NetworksJihyuk Choi, Jerry T. Chiang, DongHo Kim, Yih-Chun Hu. 235-252 [doi]
- Attacking Beacon-Enabled 802.15.4 NetworksSang Shin Jung, Marco Valero, Anu Bourgeois, Raheem Beyah. 253-271 [doi]
- Supporting Publication and Subscription Confidentiality in Pub/Sub NetworksMihaela Ion, Giovanni Russello, Bruno Crispo. 272-289 [doi]
- CED:::2:::: Communication Efficient Disjointness DecisionLuciana Marconi, Mauro Conti, Roberto Di Pietro. 290-306 [doi]
- Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature SchemesJingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang. 307-325 [doi]
- Context-Aware Usage Control for AndroidGuangdong Bai, Liang Gu, Tao Feng, Yao Guo, Xiangqun Chen. 326-343 [doi]
- Efficient Isolation of Trusted Subsystems in Embedded SystemsRaoul Strackx, Frank Piessens, Bart Preneel. 344-361 [doi]
- Enhancing Host Security Using External Environment SensorsEe-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu. 362-379 [doi]
- FADE: Secure Overlay Cloud Storage with File Assured DeletionYang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman. 380-397 [doi]
- A New Information Leakage Measure for Anonymity ProtocolsSami Zhioua. 398-414 [doi]
- Hidden Markov Models for Automated Protocol LearningSean Whalen, Matt Bishop, James P. Crutchfield. 415-428 [doi]
- Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous BroadcastOmar I. Al-Bataineh, Ron van der Meyden. 429-447 [doi]
- Surveying DNS Wildcard Usage among the Good, the Bad, and the UglyAndrew J. Kalafut, Minaxi Gupta, Pairoj Rattadilok, Pragneshkumar Patel. 448-465 [doi]
- The Hitchhiker s Guide to DNS Cache PoisoningSooel Son, Vitaly Shmatikov. 466-483 [doi]
- A Formal Definition of Online Abuse-FreenessRalf Küsters, Henning Schnoor, Tomasz Truderung. 484-497 [doi]