Abstract is missing.
- Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise NetworksZhiyun Qian, Zhuoqing Morley Mao, Ammar Rayes, David Jaffe. 1-18 [doi]
- An On-Line Learning Statistical Model to Detect Malicious Web RequestsHarald Lampesberger, Philipp Winter, Markus Zeilinger, Eckehard Hermann. 19-38 [doi]
- Secure Configuration of Intrusion Detection Sensors for Changing Enterprise SystemsGaspar Modelo-Howard, Jevin Sweval, Saurabh Bagchi. 39-58 [doi]
- K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous AccessSaman Zarandioon, Danfeng (Daphne) Yao, Vinod Ganapathy. 59-76 [doi]
- Analyzing the Gold Star Scheme in a Split Tor NetworkBenedikt Westermann, Pern Hui Chia, Dogan Kesdogan. 77-95 [doi]
- Location Privacy and Attacker Knowledge: Who Are We Fighting against?Rinku Dewri. 96-115 [doi]
- Insecurity in Public-Safety Communications: APCO Project 25Stephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann, Matthew Robert. 116-133 [doi]
- Behavioral Mimicry Covert CommunicationSeyed Ali Ahmadzadeh, Gordon B. Agnew. 134-153 [doi]
- Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio NetworksChowdhury Sayeed Hyder, Brendan Grebur, Li Xiao. 154-171 [doi]
- On Detection of Erratic ArgumentsJin Han, Qiang Yan, Robert H. Deng, Debin Gao. 172-189 [doi]
- SA3: Automatic Semantic Aware Attribution Analysis of Remote ExploitsDeguang Kong, Donghai Tian, Peng Liu 0005, Dinghao Wu. 190-208 [doi]
- Time-Traveling Forensic Analysis of VM-Based High-Interaction HoneypotsDeepa Srinivasan, Xuxian Jiang. 209-226 [doi]
- Optimistic Fair Exchange of Ring SignaturesLie Qu, Guilin Wang, Yi Mu. 227-242 [doi]
- Efficient U-Prove Implementation for Anonymous Credentials on Smart CardsWojciech Mostowski, Pim Vullers. 243-260 [doi]
- Multi-party Private Web Search with Untrusted PartnersCristina Romero-Tris, Jordi CastellĂ -Roca, Alexandre Viejo. 261-280 [doi]
- v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe NetworksAmiya Kumar Maji, Saurabh Bagchi. 281-302 [doi]
- Delay Fast Packets (DFP): Prevention of DNS Cache PoisoningShimrit Tzur-David, Kiril Lashchiver, Danny Dolev, Tal Anker. 303-318 [doi]
- Unilateral Antidotes to DNS PoisoningAmir Herzberg, Haya Shulman. 319-336 [doi]
- Security Analysis of Leap-of-Faith ProtocolsViet Pham, Tuomas Aura. 337-355 [doi]
- Secure and Practical Key Distribution for RFID-Enabled Supply ChainsTieyan Li, Yingjiu Li, Guilin Wang. 356-372 [doi]
- Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano PlaneSarbari Mitra, Ratna Dutta, Sourav Mukhopadhyay. 373-388 [doi]
- Context-Related Access Control for Mobile CachingZhi Xu, Kun Bai, Sencun Zhu, Leslie S. Liu 0002, Randy Moulic. 389-408 [doi]
- Anonymity for Key-Trees with Adaptive AdversariesMichael Beye, Thijs Veugen. 409-425 [doi]
- Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID TagThomas Plos, Martin Feldhofer. 426-435 [doi]
- Preventing Secret Data Leakage from Foreign Mappings in Virtual MachinesHanjun Gao, Lina Wang, Wei Liu, Yang Peng, Hao Zhang. 436-445 [doi]
- Winning with DNS Failures: Strategies for Faster Botnet DetectionSandeep Yadav, A. L. Narasimha Reddy. 446-459 [doi]
- Trading Elephants for Ants: Efficient Post-attack ReconstitutionMeixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia. 460-469 [doi]
- Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user DataAkshay Dua, Nirupama Bulusu, Wu-chang Feng. 470-479 [doi]
- Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract]Chunyu Tang, David A. Naumann, Susanne Wetzel. 480-490 [doi]
- CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery ServicesHuijun Xiong, Xinwen Zhang, Wei Zhu, Danfeng Yao. 491-500 [doi]
- Call Behavioral Analysis to Thwart SPIT Attacks on VoIP NetworksHemant Sengar, Xinyuan Wang, Arthur Nichols. 501-510 [doi]
- T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor NetworksSteffen Wagner, Christoph KrauĂ, Claudia Eckert. 511-521 [doi]
- Build and Test Your Own Network ConfigurationSaeed Al-Haj, Padmalochan Bera, Ehab Al-Shaer. 522-532 [doi]
- PP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile NetworksManuel Crotti, Diego Ferri, Francesco Gringoli, Manuel Peli, Luca Salgarelli. 533-542 [doi]
- NetFlow Based Network ProtectionVojtech Krmicek, Jan Vykopal. 543-546 [doi]