close
1.

電子ブック

EB
Ozgur Akan, Paolo Bellavista, Sushil Jajodia, Jianying Zhou
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
Inexpensive Email Addresses An Email Spam-Combating System / Aram Yegenian ; Tassos Dimitriou
Anonymity and Privacy
Privacy Administration in Distributed Service Infrastructure / Nabil Ajam ; Nora Cuppens-Boulahia ; Frederic Cuppens
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS / Rinku Dewri ; Indrakshi Ray ; Indrajit Ray ; Darrell Whitley
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings / Ming Li ; Shucheng Yu ; Kui Ren ; Wenjing Lou
Wireless Security
A Study on False Channel Condition Reporting Attacks in Wireless Networks / Dongho Kim ; Yih-Chun Hu
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services / Patrick Traynor
Saving Energy on WiFi with Required IPsec / Youngsang Shin ; Steven Myers ; Minaxi Gupta
Systems Security - I
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization / Michael Grace ; Zhi Wang ; Deepa Srinivasan ; Jinku Li ; Xuxian Jiang ; Zhenkai Liang ; Siarhei Liakh
A Generic Construction of Dynamic Single Sign-on with Strong Security / Jinguang Han ; Yi Mu ; Willy Susilo ; Jun Yan
DeCore: Detecting Content Repurposing Attacks on Client' Systems / Smitha Sundareswaran ; Anna C. Squicciarini
Network Security - I
Realizing a Source Authentic Internet / Toby Ehrenkranz ; Jun Li ; Patrick McDaniel
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks / Jihyuk Choi ; Jerry T. Chiang
Attacking Beacon-Enabled 802.15.4 Networks / Sang Shin Jung ; Marco Valero ; Anu Bourgeois ; Raheem Beyah
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks / Mihaela Ion ; Giovanni Russello ; Bruno Crispo
Security Protocols - I
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes / Luciana Marconi ; Mauro Conti ; Roberto Di Pietro ; Jingqiang Lin ; Jiwu Jing ; Qiongxiao Wang
Context-Aware Usage Control for Android / Guangdong Bai ; Liang Gu ; Tao Feng ; Yao Guo ; Xiangqun Chen
System Security - II
Efficient Isolation of Trusted Subsystems in Embedded Systems / Raoul Strackx ; Frank Piessens ; Bart Preneel
Enhancing Host Security Using External Environment Sensors / Ee-Chien Chang ; Liming Lu ; Yongzheng Wu ; Roland H.C. Yap ; Jie Yu
FADE: Secure Overlay Cloud Storage with File Assured Deletion / Yang Tang ; Patrick P.C. Lee ; John C.S. Lui ; Radia Perlman
Security Protocols - II
A New Information Leakage Measure for Anonymity Protocols / Sami Zhioua
Hidden Markov Models for Automated Protocol Learning / Sean Whalen ; Matt Bishop ; James P. Crutchfield
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast / Omar I. Al-Bataineh ; Ronr van der Meyden
Network Security - II
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly / Andrew Kalafut ; Pairoj Rattadilok ; Pragneshkumar Patel
The Hitchhiker's Guide to DNS Cache Poisoning / Sooel Son ; Vitaly Shmatikou
A Formal Definition of Online Abuse-Freeness / Ralf Küsters ; Henning Schnoor ; Tomasz Truderung
Author Index
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
2.

電子ブック

EB
Ozgur Akan, Paolo Bellavista, Sushil Jajodia, Jianying Zhou, Jiannong Cao
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
Inexpensive Email Addresses An Email Spam-Combating System / Aram Yegenian ; Tassos Dimitriou
Anonymity and Privacy
Privacy Administration in Distributed Service Infrastructure / Nabil Ajam ; Nora Cuppens-Boulahia ; Frederic Cuppens
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS / Rinku Dewri ; Indrakshi Ray ; Indrajit Ray ; Darrell Whitley
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings / Ming Li ; Shucheng Yu ; Kui Ren ; Wenjing Lou
Wireless Security
A Study on False Channel Condition Reporting Attacks in Wireless Networks / Dongho Kim ; Yih-Chun Hu
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services / Patrick Traynor
Saving Energy on WiFi with Required IPsec / Youngsang Shin ; Steven Myers ; Minaxi Gupta
Systems Security - I
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization / Michael Grace ; Zhi Wang ; Deepa Srinivasan ; Jinku Li ; Xuxian Jiang ; Zhenkai Liang ; Siarhei Liakh
A Generic Construction of Dynamic Single Sign-on with Strong Security / Jinguang Han ; Yi Mu ; Willy Susilo ; Jun Yan
DeCore: Detecting Content Repurposing Attacks on Client' Systems / Smitha Sundareswaran ; Anna C. Squicciarini
Network Security - I
Realizing a Source Authentic Internet / Toby Ehrenkranz ; Jun Li ; Patrick McDaniel
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks / Jihyuk Choi ; Jerry T. Chiang
Attacking Beacon-Enabled 802.15.4 Networks / Sang Shin Jung ; Marco Valero ; Anu Bourgeois ; Raheem Beyah
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks / Mihaela Ion ; Giovanni Russello ; Bruno Crispo
Security Protocols - I
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes / Luciana Marconi ; Mauro Conti ; Roberto Di Pietro ; Jingqiang Lin ; Jiwu Jing ; Qiongxiao Wang
Context-Aware Usage Control for Android / Guangdong Bai ; Liang Gu ; Tao Feng ; Yao Guo ; Xiangqun Chen
System Security - II
Efficient Isolation of Trusted Subsystems in Embedded Systems / Raoul Strackx ; Frank Piessens ; Bart Preneel
Enhancing Host Security Using External Environment Sensors / Ee-Chien Chang ; Liming Lu ; Yongzheng Wu ; Roland H.C. Yap ; Jie Yu
FADE: Secure Overlay Cloud Storage with File Assured Deletion / Yang Tang ; Patrick P.C. Lee ; John C.S. Lui ; Radia Perlman
Security Protocols - II
A New Information Leakage Measure for Anonymity Protocols / Sami Zhioua
Hidden Markov Models for Automated Protocol Learning / Sean Whalen ; Matt Bishop ; James P. Crutchfield
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast / Omar I. Al-Bataineh ; Ronr van der Meyden
Network Security - II
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly / Andrew Kalafut ; Pairoj Rattadilok ; Pragneshkumar Patel
The Hitchhiker's Guide to DNS Cache Poisoning / Sooel Son ; Vitaly Shmatikou
A Formal Definition of Online Abuse-Freeness / Ralf Küsters ; Henning Schnoor ; Tomasz Truderung
Author Index
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼