Cargando…

Security and Privacy in Communication Networks 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Jajodia, Sushil (Editor ), Zhou, Jianying (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 50
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Malware and Email Security
  • SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection
  • Analyzing and Exploiting Network Behaviors of Malware
  • Inexpensive Email Addresses An Email Spam-Combating System
  • Anonymity and Privacy
  • Privacy Administration in Distributed Service Infrastructure
  • On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS
  • Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings
  • Wireless Security
  • A Study on False Channel Condition Reporting Attacks in Wireless Networks
  • Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services
  • Saving Energy on WiFi with Required IPsec
  • Systems Security - I
  • Transparent Protection of Commodity OS Kernels Using Hardware Virtualization
  • A Generic Construction of Dynamic Single Sign-on with Strong Security
  • DeCore: Detecting Content Repurposing Attacks on Clients' Systems
  • Network Security - I
  • Realizing a Source Authentic Internet
  • Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks
  • Attacking Beacon-Enabled 802.15.4 Networks
  • Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
  • Security Protocols - I
  • CED2: Communication Efficient Disjointness Decision
  • Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes
  • Context-Aware Usage Control for Android
  • System Security - II
  • Efficient Isolation of Trusted Subsystems in Embedded Systems
  • Enhancing Host Security Using External Environment Sensors
  • FADE: Secure Overlay Cloud Storage with File Assured Deletion
  • Security Protocols - II
  • A New Information Leakage Measure for Anonymity Protocols
  • Hidden Markov Models for Automated Protocol Learning
  • Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast
  • Network Security - II
  • Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly
  • The Hitchhiker's Guide to DNS Cache Poisoning
  • A Formal Definition of Online Abuse-Freeness.