


default search action
3. SecureComm 2007: Nice, France
- Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007. IEEE 2007, ISBN 978-1-4244-0974-7
- Mawloud Omar, Yacine Challal
, Abdelmadjid Bouabdallah:
NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography. 2-10 - Luca Longo
, Pierpaolo Dondio
, Stephen Barrett:
Temporal factors to evaluate trustworthiness of virtual identities. 11-19 - Jean-Marc Seigneur
:
Trustworthiness of collaborative Open Source Software quality assessment. 20-26 - Michele Bezzi:
An entropy based method for measuring anonymity. 28-32 - Michalis Foukarakis, Demetres Antoniades, Spyros Antonatos, Evangelos P. Markatos:
Flexible and high-performance anonymization of NetFlow records using anontool. 33-38 - Christer Andersson, Andriy Panchenko:
Practical anonymous communication on the mobile internet using Tor. 39-48 - William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan
, Bhavani Thuraisingham:
SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs. 49-56 - Meena Dilip Singh, Ashutosh Saxena
:
Secure computation for data privacy. 58-62 - Wassim Itani, Ayman I. Kayssi, Ali Chehab
:
An efficient and scalable Security ProtocoL for protecting fixed-Content Objects in ContEnt aDdressable StoraGe architEctures. 63-72 - Spyros Kotoulas
, Ronny Siebes:
Scalable discovery of private resources. 73-82 - Antonio Coronato
, Giuseppe De Pietro
:
A context service for multimodal pervasive environments. 84-87 - Giovanni Frattini, Pierpaolo Petriccione, Giuseppe Leone
, Gianluca Supino, Fabio Corvino:
Beyond web 2.0: enabling multimodal web interactions using VoIP and Ajax. 89-97 - Giuseppe Cattaneo
, Luigi Catuogno
, Fabio Petagna, G. Di Matteo, Luigi Romano:
iToken: aWireless smart card reader which provides handhelds with desk top equivalent security. 98-106 - Luigi Coppolino, Luigi Romano, Nicola Mazzocca
, Sergio Salvi:
Web Services workflow reliability estimation through reliability patterns. 107-115 - Susana Alcalde Bagüés, Jelena Mitic, Elisabeth-Anna Emberger:
The CONNECT platform: An architecture for Context-Aware Privacy in pervasive environments. 117-126 - Fen Liu, Lei Hu, Li Lu, Weijia Wang:
Privacy-preserving authentication with low computational overhead for RFID systems. 127-132 - Jang-Su Park, Soo-Young Kang, Im-Yeong Lee:
A study on secure RFID authentication protocol in insecure communication. 133-143 - Massimiliano Rak
, Valentina Casola
, Nicola Mazzocca, Emilio Pasquale Mancini, Umberto Villano:
Optimizing secure Web Services with MAWeS: A case study. 144-153 - Kyuhyung Cho, Jongsung Lee, Jongin Lim, Jongsub Moon:
Verification method of network simulation for pervasive environments. 155-161 - Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee:
A secure and efficient key management scheme for wireless sensor networks. 162-167 - Fabio Martinelli, Paolo Mori
:
A model for usage control in GRID systems. 169-175 - Jun Wang, Luigi Lo Iacono
:
Intrusion Detection and tolerance in Grid-based applications. 177-185 - Augusto Ciuffoletti
:
Secure token passing at application level. 187-192 - Dominic Battré, Karim Djemame
, Odej Kao, Kerstin Voß:
Gaining users' trust by publishing failure probabilities. 193-198 - Leonardo Mattes, Leonardo C. Militelli, João Antonio Zuffo:
Platform to enforce multiple access control policy in grid hosting environment. 199-205 - Angelo Gaeta
, Matteo Gaeta
, Alan Smith, Ivan Djordjevic, Theo Dimitrakos
, Maurizio Colombo, Sergio Miranda
:
Design patterns for secure virtual organization management architecture. 207-216 - Gautier Dallons, Philippe Massonet
, Jean-François Molderez, Christophe Ponsard, Alvaro Arenas:
An analysis of the chinese wall pattern for guaranteeing confidentiality in grid-based virtual organisations. 217-222 - Kevin Borders, Laura Falk, Atul Prakash
:
OpenFire: Using deception to reduce network attacks. 224-233 - Seyit Ahmet Çamtepe
, Bülent Yener:
Modeling and detection of complex attacks. 234-243 - Yuxin Wei, Muqing Wu:
Intrusion detection technology based on CEGA-SVM. 244-249 - Guofei Gu, Zesheng Chen, Phillip A. Porras, Wenke Lee:
Misleading and defeating importance-scanning malware propagation. 250-259 - Ashish Gehani, Surendar Chandra:
Parameterizing access control for heterogeneous peer-to-peer applications. 269-278 - Tom Chothia:
Securing pseudo identities in an anonymous peer-to-peer file-sharing network. 279-282 - Michael Rossberg, Guenter Schaefer, Thorsten Strufe:
Using recurring costs for reputation management in peer-to-peer streaming systems. 283-292 - João P. Vilela, João Barros
:
A feedback reputation mechanism to secure the optimized link state routing protocol. 294-303 - Maria Gorlatova, Marc Kelly, Ramiro Liscano, Peter C. Mason:
Enhancing frequency-based wormhole attack detection with novel jitter waveforms. 304-309 - Xiaoxin Wu, David K. Y. Yau:
Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach. 310-319 - Assed Jehangir, Sonia M. Heemstra de Groot:
Securing Personal Network clusters. 320-329 - Kasper Bonne Rasmussen, Srdjan Capkun:
Implications of radio fingerprinting on the security of sensor networks. 331-340 - Heesook Choi, Sencun Zhu, Thomas F. La Porta:
SET: Detecting node clones in sensor networks. 341-350 - Claude Castelluccia, Angelo Spognardi
:
RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks. 351-360 - Ruiyi Zhang, Johnson P. Thomas, Venkata Manoj Mulpuru:
Deception framework for sensor networks. 361-369 - Takehiro Takahashi, Wenke Lee:
An assessment of VoIP covert channel threats. 371-380 - Jian Qiu, Lixin Gao, Supranamaya Ranjan, Antonio Nucci:
Detecting bogus BGP route information: Going beyond prefix hijacking. 381-390 - Tuomas Aura, Michael Roe, Steven J. Murdoch
:
Securing network location awareness with authenticated DHCP. 391-402 - Frank J. Suraci, Arye R. Ephrath, John R. Wullert:
Global interoperability of national security and emergency preparedness (NS/EP) telecommunications services. 403-410 - Xun Wang, Wei Yu
, Adam C. Champion, Xinwen Fu, Dong Xuan:
Detecting worms via mining dynamic program execution. 412-421 - Ahren Studer, Mark Luk, Adrian Perrig:
Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs. 422-432 - Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis:
PWC: A proactive worm containment solution for enterprise networks. 433-442 - Sumair Ur Rahman, Urs Hengartner:
Secure crash reporting in vehicular Ad hoc networks. 443-452 - Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi
:
A layout-similarity-based approach for detecting phishing pages. 454-463 - Florian Kerschbaum:
Simple cross-site attack prevention. 464-472 - Timothy W. van der Horst, Kent E. Seamons
:
Simple Authentication for the Web. 473-482 - Jens Ove Lauf, Harald Sauff:
Secure lightweight tunnel for monitoring transport containers. 484-493 - Jian Yin, Sanjay Kumar Madria:
Sybil attack detection in a hierarchical sensor network. 494-503 - Aniket Kate, Gregory M. Zaverucha
, Urs Hengartner:
Anonymity and security in delay tolerant networks. 504-513 - Mihály Bárász, Balázs Boros, Péter Ligeti, Krisztina Lója, Daniel A. Nagy:
Breaking EMAP. 514-517 - Pekka Nikander:
Evolution of networking: Current problems and future directions. 518 - Pekka Nikander:
The Host Identity Protocol (HIP): Bringing mobility, multi- homing, and baseline security together. 518-519 - Fabio Martinelli:
A model for usage control in GRID systems. 520 - David Chadwick:
Aggregation of attributes from different authorities. 521

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.