default search action
9. SecureComm 2013: Sydney, NSW, Australia
- Tanveer A. Zia, Albert Y. Zomaya, Vijay Varadharajan, Zhuoqing Morley Mao:
Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 127, Springer 2013, ISBN 978-3-319-04282-4
Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks
- Eirini D. Karapistoli, Anastasios A. Economides:
Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks. 1-18 - Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li:
Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks. 19-34 - Mengjun Xie, Liang Hao, Kenji Yoshigoe, Jiang Bian:
CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones. 35-52
Session II: Malware, Botnets, and Distributed Denial of Service
- Xiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu:
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets. 53-68 - Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Margaret Batten:
Contrasting Permission Patterns between Clean and Malicious Android Applications. 69-85 - Yousra Aafer, Wenliang Du, Heng Yin:
DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. 86-103
Session III: Security for Emerging Technologies: VoIP, Peer-to-peer, and Cloud Computing
- Ryan Farley, Xinyuan Wang:
Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation. 104-121 - Jun Jiang, Meining Nie, Purui Su, Dengguo Feng:
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing. 122-139 - Vijay Varadharajan, Udaya Kiran Tupakula:
Integrated Security Architecture for Virtual Machines. 140-153
Session IV: Encryption and Key Management
- Ibrahim F. Elashry, Yi Mu, Willy Susilo:
Generic Mediated Encryption. 154-168 - Miao Li, Liangsheng He, Tongjie Yang, Neng Gao, Zongbin Liu, Qinglong Zhang:
An Efficient Reconfigurable II-ONB Modular Multiplier. 169-181 - Hui Cui, Yi Mu, Man Ho Au:
Public-Key Encryption Resilient to Linear Related-Key Attacks. 182-196
Session V: Security in Software and Machine Learning
- Silvio Cesare, Yang Xiang, Jun Zhang:
Clonewise - Detecting Package-Level Clones Using Machine Learning. 197-215 - Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng:
Automatic Polymorphic Exploit Generation for Software Vulnerabilities. 216-233
Session VI: Network and System Security Model
- Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang:
A Novel Web Tunnel Detection Method Based on Protocol Behaviors. 234-251 - Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens:
Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege. 252-269 - Jin B. Hong, Dong Seong Kim:
Scalable Security Model Generation and Analysis Using k-importance Measures. 270-287
Session VII: Security and Privacy in Pervasive and Ubiquitous Computing
- Mehari Msgna, Konstantinos Markantonakis, Keith Mayes:
The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. 288-304 - Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty, Christophe Rosenberger:
An e-payment Architecture Ensuring a High Level of Privacy Protection. 305-322 - Xin Ruan, Chuan Yue, Haining Wang:
Unveiling Privacy Setting Breaches in Online Social Networks. 323-341
ATIS 2013: 4th International Workshop on Applications and Techniques in Information Security
- Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy:
Securing a Web-Based Anti-counterfeit RFID System. 342-355 - Md. Anwar Hossain Masud, Md. Rafiqul Islam, Jemal H. Abawajy:
Security Concerns and Remedy in a Cloud Based E-learning System. 356-366 - Quazi Mamun, Md. Rafiqul Islam, Mohammed Kaosar:
Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs. 367-379 - Mohammed Kaosar, Quazi Mamun, Md. Rafiqul Islam, Xun Yi:
(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System. 380-392 - Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Android API Call Using Logging Mechanism within Android Framework. 393-404 - Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan:
Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform. 405-417
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.