|
Part I New Visions for a Trustworthy Internet |
|
|
|
1 Publish-Subscribe Internetworking Security Aspects |
|
|
3 | (14) |
|
|
|
|
2 Security Issues in Programmable Routers for Future Internet |
|
|
17 | (14) |
|
|
|
|
|
3 Secure Pseudonymous Access to Overlay Data Dissemination Network |
|
|
31 | (12) |
|
|
|
|
|
4 An Overlay Infrastructural Approach for a Web-Wide Trustworthy Identity and Profile Management |
|
|
43 | (18) |
|
|
|
|
|
|
Part II Security, Energy Efficiency, Resilience and Privacy |
|
|
|
5 Context Privacy in the Internet of Things |
|
|
61 | (14) |
|
|
|
|
|
6 Physical Layer Cryptography in Wireless Networks |
|
|
75 | (18) |
|
|
|
|
7 Gram-Schmidt Orthogonalization on Encrypted Vectors |
|
|
93 | (12) |
|
|
|
8 A Peer-to-Peer Secure VoIP Architecture |
|
|
105 | (12) |
|
|
|
|
9 Improving QoS of Femtocells in Multi-operator Environments |
|
|
117 | (12) |
|
|
|
|
|
10 Autonomic Network Configuration in IEEE 802.15.4: A Standard-Compliant Solution |
|
|
129 | (14) |
|
|
|
|
Part III Security in Online Social Networks |
|
|
|
11 On the Concept of Trust in Online Social Networks |
|
|
143 | (16) |
|
|
|
|
|
12 Participatory Sensing: The Tension Between Social Translucence and Privacy |
|
|
159 | (12) |
|
|
|
13 A Summary of Two Practical Attacks Against Social Networks |
|
|
171 | (16) |
|
|
|
|
|
14 Decentralized Social Networking Services |
|
|
187 | (16) |
|
|
|
|
Part IV Secure Collaborative Systems |
|
|
|
15 Access Control, Privacy and Trust in On-line Social Networks: Issues and Solutions |
|
|
203 | (10) |
|
|
16 Dynamic Resiliency to Changes |
|
|
213 | (8) |
|
|
|
|
17 Certifying Security and Privacy Properties in the Internet of Services |
|
|
221 | (14) |
|
|
|
|
18 Time-Continuous Authorization of Network Resources Based on Usage Control |
|
|
235 | (14) |
|
|
|
|
|
|
Part V Network Monitoring |
|
|
|
19 Towards Monitoring Programmability in Future Internet: Challenges and Solutions |
|
|
249 | (12) |
|
|
|
|
20 Analyzing Telemarketer Behavior in Massive Telecom Data Records |
|
|
261 | (12) |
|
|
|
|
21 SIP Overload Control: Where are We Today? |
|
|
273 | (16) |
|
|
22 Towards Smarter Probes: In-Network Traffic Capturing and Processing |
|
|
289 | (14) |
|
|
|
|
|
|
23 IDS Rules Adaptation for Packets Pre-filtering in Gbps Line Rates |
|
|
303 | (14) |
|
|
|
|
|
24 Introducing Privacy Awareness in Network Monitoring Ontologies |
|
|
317 | (18) |
|
|
|
|
|
|
|
|
25 Rights Management in Architectures for Distributed Multimedia Content Applications |
|
|
335 | (14) |
|
|
|
|
|
26 Scalable Video Coding in Content-Aware Networks: Research Challenges and Open Issues |
|
|
349 | (10) |
|
|
|
|
|
|
|
|
|
27 Network Layer Solutions for a Content-Centric Internet |
|
|
359 | |
|
|