Muutke küpsiste eelistusi

E-raamat: Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, September 7-9, 2011, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
Network Intrusion Detection
Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks
1(18)
Zhiyun Qian
Z. Morley Mao
Ammar Rayes
David Jaffe
An On-Line Learning Statistical Model to Detect Malicious Web Requests
19(20)
Harold Lampesberger
Philipp Winter
Markus Zeilinger
Eckehard Hermann
Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems
39(20)
Gaspar Modelo-Howard
Jevin Sweval
Saurabh Bagchi
Anonymity and Privacy (I)
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access
59(18)
Saman Zarandioon
Danfeng (Daphne) Yao
Vinod Ganapathy
Analyzing the Gold Star Scheme in a Split Tor Network
77(19)
Benedikt Westermann
Pern Hui Chia
Dogan Kesdogan
Location Privacy and Attacker Knowledge: Who Are We Fighting against?
96(20)
Rinku Dewri
Wireless Security (I)
Insecurity in Public-Safety Communications: APCO Project 25
116(18)
Stephen Glass
Vallipuram Muthukkumarasamy
Marius Portmann
Matthew Robert
Behavioral Mimicry Covert Communication
134(20)
Seyed Ali Ahmadzadeh
Gordon Agnew
Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks
154(18)
Chowdhury Sayeed Hyder
Brendan Grebur
Li Xiao
System Security
On Detection of Erratic Arguments
172(18)
Jin Han
Qiang Yan
Robert H. Deng
Debin Gao
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits
190(19)
Deguang Kong
Donghai Tian
Peng Liu
Dinghao Wu
Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots
209(18)
Deepa Srinivasan
Xuxian Jiang
Anonymity and Privacy (II)
Optimistic Fair Exchange of Ring Signatures
227(16)
Lie Qu
Guilin Wang
Yi Mu
Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards
243(18)
Wojciech Mostowski
Pim Vullers
Multi-party Private Web Search with Untrusted Partners
261(20)
Cristina Romero-Tris
Jordi Castella-Roca
Alexandre Viejo
DNS and Routing Security
υ-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks
281(22)
Amiya Kumar Maji
Saurabh Bagchi
Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning
303(16)
Shimrit Tzur-David
Kiril Lashchiver
Danny Dolev
Tal Anker
Unilateral Antidotes to DNS Poisoning
319(18)
Amir Herzberg
Haya Shulman
Key Management
Security Analysis of Leap-of-Faith Protocols
337(19)
Viet Pham
Tuomas Aura
Secure and Practical Key Distribution for RFID-Enabled Supply Chains
356(17)
Tieyan Li
Yingjiu Li
Guilin Wang
Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane
373(16)
Sarbari Mitra
Ratna Dutta
Sourav Mukhopadhyay
Wireless Security (II)
Context-Related Access Control for Mobile Caching
389(20)
Zhi Xu
Kun Bai
Sencun Zhu
Leslie Liu
Randy Moulic
Anonymity for Key-Trees with Adaptive Adversaries
409(17)
Michael Beye
Thijs Veugen
Short Papers
Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag
426(10)
Thomas Plos
Martin Feldhofer
Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines
436(10)
Hanjun Gao
Lina Wang
Wei Liu
Yang Peng
Hao Zhang
Winning with DNS Failures: Strategies for Faster Botnet Detection
446(14)
Sandeep Yadav
A.L. Narasimha Reddy
Trading Elephants for Ants: Efficient Post-attack Reconstitution
460(10)
Meixing Le
Zhaohui Wang
Quan Jia
Angelos Stavrou
Anup K. Ghosh
Sushil Jajodia
Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data
470(10)
Akshay Dua
Nirupama Bulusu
Wu-chang Feng
Symbolic Analysis for Security of Roaming Protocols in Mobile Networks (Extended Abstract)
480(11)
Chunyu Tang
David A. Naumann
Susanne Wetzel
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services
491(10)
Huijun Xiong
Xinwen Zhang
Wei Zhu
Danfeng Yao
Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks
501(10)
Hemant Sengar
Xinyuan Wang
Arthur Nichols
T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks
511(11)
Steffen Wagner
Christoph Krauß
Claudia Eckert
Build and Test Your Own Network Configuration
522(11)
Saeed Al-Haj
Padmalochan Bera
Ehab Al-Shaer
PP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks
533(10)
Manuel Crotti
Diego Ferri
Francesco Gringoli
Manuel Peli
Luca Salgarelli
NetFlow Based Network Protection
543(4)
Vojtech Krmicek
Jan Vykopal
Author Index 547