Advances in Network and Information Security |
Computing of Trust in Ad-Hoc Networks / Huafei Zhu ; Feng Bao ; Jianwei Liu |
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation / Spiros Antonatos ; Kostas G. Anagnostakis |
On the Privacy Risks of Publishing Anonymized IP Network Traces / Dimitris Koukis |
Secure Mobile Notifications of Civilians in Case of a Disaster / Heiko Rossnagel ; Tobias Scherner |
A Fair Anonymous Submission and Review System / Vincent Naessens ; Liesje Demuynck ; Bart De Decker |
Attribute Delegation Based on Ontologies and Context Information / Isaac Agudo ; Javier Lopez ; Jose A. Montenegro |
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains / David W Chadwick ; Sassa Otenko ; Tuan Anh Nguyen |
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange / Jeong Ok Kwon ; Kouichi Sakurai ; Dong Hoon Lee |
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart / Elias Athanasopoulos |
Perturbing and Protecting a Traceable Block Cipher / Julien Bringer ; Herve Chabanne ; Emmanuelle Dottax |
A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors / Jorg Platte ; Raul Duran Diaz ; Edwin Naroska |
Timed Release Cryptography from Bilinear Pairings Using Hash Chains / Konstantinos Chalkias ; George Stephanides |
Compression of Encrypted Visual Data / Michael Gschwandtner ; Andreas Uhl ; Peter Wild |
Selective Encryption for Hierarchical MPEG / Heinz Hofbauer ; Thomas Stutz |
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods / Xiangyang Luo ; Chunfang Yang ; Fenlin Liu |
A Flexible and Open DRM Framework / Kristof Verslype |
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies / Giannakis Antoniou ; Campbell Wilson ; Dimitris Geneiatakis |
A Privacy Agent in Context-Aware Ubiquitous Computing Environments / Ni (Jenny) Zhang ; Chris Todd |
Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems / Seng-Phil Hong ; Sungmin Kang |
Attack Graph Based Evaluation of Network Security / Igor Kotenko ; Mikhail Stepashkin |
Information Modeling for Automated Risk Analysis / Howard Chivers |
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication / Andriy Panchenko ; Lexi Pimenidis |
Author Index |
Advances in Network and Information Security |
Computing of Trust in Ad-Hoc Networks / Huafei Zhu ; Feng Bao ; Jianwei Liu |
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation / Spiros Antonatos ; Kostas G. Anagnostakis |
On the Privacy Risks of Publishing Anonymized IP Network Traces / Dimitris Koukis |
Secure Mobile Notifications of Civilians in Case of a Disaster / Heiko Rossnagel ; Tobias Scherner |
A Fair Anonymous Submission and Review System / Vincent Naessens ; Liesje Demuynck ; Bart De Decker |