Security and Privacy in Communication Networks 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
50 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Malware and Email Security
- SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection
- Analyzing and Exploiting Network Behaviors of Malware
- Inexpensive Email Addresses An Email Spam-Combating System
- Anonymity and Privacy
- Privacy Administration in Distributed Service Infrastructure
- On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS
- Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings
- Wireless Security
- A Study on False Channel Condition Reporting Attacks in Wireless Networks
- Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services
- Saving Energy on WiFi with Required IPsec
- Systems Security - I
- Transparent Protection of Commodity OS Kernels Using Hardware Virtualization
- A Generic Construction of Dynamic Single Sign-on with Strong Security
- DeCore: Detecting Content Repurposing Attacks on Clients' Systems
- Network Security - I
- Realizing a Source Authentic Internet
- Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks
- Attacking Beacon-Enabled 802.15.4 Networks
- Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
- Security Protocols - I
- CED2: Communication Efficient Disjointness Decision
- Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes
- Context-Aware Usage Control for Android
- System Security - II
- Efficient Isolation of Trusted Subsystems in Embedded Systems
- Enhancing Host Security Using External Environment Sensors
- FADE: Secure Overlay Cloud Storage with File Assured Deletion
- Security Protocols - II
- A New Information Leakage Measure for Anonymity Protocols
- Hidden Markov Models for Automated Protocol Learning
- Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast
- Network Security - II
- Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly
- The Hitchhiker's Guide to DNS Cache Poisoning
- A Formal Definition of Online Abuse-Freeness.