Security and Privacy in Communication Networks, Springer

E-books Shop
Security and Privacy in Communication Networks

5th International ICST Conference
SecureComm 2009
Athens, Greece, September 14-18, 2009
Revised Selected Papers
Yan Chen Tassos D. Dimitriou
Jianying Zhou (Eds.)

SecureComm 2009
5th International Conference on
Security and Privacy in Communication Networks
Athens, Greece
September 14–18, 2009
Organized and Sponsored by
Institute for Computer Sciences, Social-Informatics
and Telecommunications Engineering (ICST)

Volume Editors
Yan Chen
Northwestern University, Department of Electrical Engineering
and Computer Science, Robert R. McCormick School
of Engineering and Application Science, 2145 Sheridian Road
Evanston, IL 60208-3118, USA
E-mail: ychen@northwestern.edu
Tassos D. Dimitriou
Athens Information Technology
Markopoulo Ave.
GR-19002, Peania, Greece
Jianying Zhou
Institute for Infocomm Research
1 FusionopolisWay, 21-01
Connexis, South Tower, 138632 Singapore
E-mail: jyzhou@i2r.a-star.edu.sg

Table of Contents

Wireless Network Security
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages 1
Liang Cai, Gabriel Maganis, Hui Zang, and Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs   21
Ioannis Broustis, Konstantinos Pelechrinis, Dimitris Syrivelis,
Srikanth V. Krishnamurthy, and Leandros Tassiulas
Deny-by-Default Distributed Security Policy Enforcement in Mobile
Ad Hoc Networks  41
Mansoor Alicherry, Angelos D. Keromytis, and Angelos Stavrou
Network Intrusion Detection
Baiting Inside Attackers Using Decoy Documents   51
Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo
MULAN: Multi-Level Adaptive Network Filter  71
Shimrit Tzur-David, Danny Dolev, and Tal Anker
Automated Classification of Network Traffic Anomalies  91
Guilherme Fernandes and Philippe Owezarski
Security and Privacy for the General Internet
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets   101
Magdalena Payeras-Capell`a, Maci`a Mut-Puigserver,
Andreu Pere Isern-Dey`a, Josep L. Ferrer-Gomila, and Lloren¸c Huguet-Rotger
On the Security of Bottleneck Bandwidth Estimation Techniques  121
Ghassan Karame, David Gubler, and Srdjan ˇ Capkun
An Eavesdropping Game with SINR as an Objective Function  142
Andrey Garnaev and Wade Trappe
Malware and Misbehavior
Ensemble: Community-Based Anomaly Detection for Popular Applications  163
Feng Qian, Zhiyun Qian, Z. Morley Mao, and Atul Prakash
Using Failure Information Analysis to Detect Enterprise Zombies 185
Zhaosheng Zhu, Vinod Yegneswaran, and Yan Chen
Dealing with Liars: Misbehavior Identification via R´enyi-Ulam Games  207
William Kozma Jr. and Loukas Lazos
Wireless Network Security II, Sensor Networks
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks  228
Toni Perkovi´c, Ivo Stanˇci´c, Luka Maliˇsa, and Mario ˇ Cagalj
Aggregated Authentication (AMAC) Using Universal Hash Functions   248
Wassim Znaidi, Marine Minier, and C´edric Lauradoux
Sec-TMP: 
A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN 265
Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, and Luigi V. Mancini
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks  285
Yanjiang Yang, Jianying Zhou, Robert H. Deng, and Feng Bao
Key Management, Credentials, Authentications
User–Centric Identity Using ePassports  296
Martijn Oostdijk, Dirk-Jan van Dijk, and Maarten Wegdam
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems  311
Shucheng Yu, Kui Ren, Wenjing Lou, and Jin Li
Breaking and Building of Group Inside Signature 330
S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, and C. Pandu Rangan
Use of ID-Based Cryptography for the Efficient Verification of the
Integrity and Authenticity of Web Resources 340
Thanassis Tiropanis and Tassos Dimitriou
Wireless Network Security III
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks 350
Julien Freudiger, Maxim Raya, and Jean-Pierre Hubaux
An Active Global Attack Model for Sensor Source Location Privacy:
Analysis and Countermeasures  373
Yi Yang, Sencun Zhu, Guohong Cao, and Thomas LaPorta
Rogue Access Point Detection Using Innate Characteristics of the
802.11 MAC 394
Aravind Venkataraman and Raheem Beyah
Secure Multicast, Emerging Technologies
A Novel Architecture for Secure and Scalable Multicast over IP Network 417
Yawen Wei, Zhen Yu, and Yong Guan
Reliable Resource Searching in P2P Networks  437
Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, and
Nikos Triandopoulos
The Frog-Boiling Attack: 
Limitations of Anomaly Detection for Secure Network Coordinate Systems  448
Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, and Yongdae Kim
Author Index  459


 Screenshot 
E-books Shop


Purchase Now !
Just with Paypal



Product details
 Price
 File Size
 7,454 KB
 Pages
 474 p
 File Type
 PDF format
 ISBN-10
 ISBN-13
 3-642-05283-5
 978-3-642-05283-5
 Copyright
 2009 ICST 
 Institute for Computer Science, 
 Social Informatics and 
 Telecommunications Engineering 
●▬▬▬▬▬❂❂❂▬▬▬▬▬●
●▬▬❂❂▬▬●
●▬❂▬●


═════ ═════

Previous Post Next Post