close
1.

電子ブック

EB
Ozgur Akan, Paolo Bellavista, Sushil Jajodia, Jianying Zhou
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
Inexpensive Email Addresses An Email Spam-Combating System / Aram Yegenian ; Tassos Dimitriou
Anonymity and Privacy
Privacy Administration in Distributed Service Infrastructure / Nabil Ajam ; Nora Cuppens-Boulahia ; Frederic Cuppens
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS / Rinku Dewri ; Indrakshi Ray ; Indrajit Ray ; Darrell Whitley
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings / Ming Li ; Shucheng Yu ; Kui Ren ; Wenjing Lou
Wireless Security
A Study on False Channel Condition Reporting Attacks in Wireless Networks / Dongho Kim ; Yih-Chun Hu
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services / Patrick Traynor
Saving Energy on WiFi with Required IPsec / Youngsang Shin ; Steven Myers ; Minaxi Gupta
Systems Security - I
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization / Michael Grace ; Zhi Wang ; Deepa Srinivasan ; Jinku Li ; Xuxian Jiang ; Zhenkai Liang ; Siarhei Liakh
A Generic Construction of Dynamic Single Sign-on with Strong Security / Jinguang Han ; Yi Mu ; Willy Susilo ; Jun Yan
DeCore: Detecting Content Repurposing Attacks on Client' Systems / Smitha Sundareswaran ; Anna C. Squicciarini
Network Security - I
Realizing a Source Authentic Internet / Toby Ehrenkranz ; Jun Li ; Patrick McDaniel
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks / Jihyuk Choi ; Jerry T. Chiang
Attacking Beacon-Enabled 802.15.4 Networks / Sang Shin Jung ; Marco Valero ; Anu Bourgeois ; Raheem Beyah
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks / Mihaela Ion ; Giovanni Russello ; Bruno Crispo
Security Protocols - I
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes / Luciana Marconi ; Mauro Conti ; Roberto Di Pietro ; Jingqiang Lin ; Jiwu Jing ; Qiongxiao Wang
Context-Aware Usage Control for Android / Guangdong Bai ; Liang Gu ; Tao Feng ; Yao Guo ; Xiangqun Chen
System Security - II
Efficient Isolation of Trusted Subsystems in Embedded Systems / Raoul Strackx ; Frank Piessens ; Bart Preneel
Enhancing Host Security Using External Environment Sensors / Ee-Chien Chang ; Liming Lu ; Yongzheng Wu ; Roland H.C. Yap ; Jie Yu
FADE: Secure Overlay Cloud Storage with File Assured Deletion / Yang Tang ; Patrick P.C. Lee ; John C.S. Lui ; Radia Perlman
Security Protocols - II
A New Information Leakage Measure for Anonymity Protocols / Sami Zhioua
Hidden Markov Models for Automated Protocol Learning / Sean Whalen ; Matt Bishop ; James P. Crutchfield
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast / Omar I. Al-Bataineh ; Ronr van der Meyden
Network Security - II
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly / Andrew Kalafut ; Pairoj Rattadilok ; Pragneshkumar Patel
The Hitchhiker's Guide to DNS Cache Poisoning / Sooel Son ; Vitaly Shmatikou
A Formal Definition of Online Abuse-Freeness / Ralf Küsters ; Henning Schnoor ; Tomasz Truderung
Author Index
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
2.

電子ブック

EB
Sara Foresti, Sushil Jajodia
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Query and Data Privacy
Generalizing PIR for Practical Private Retrieval of Public Data / Shiyuan Wang ; Divyakant Agrawal ; Amr El Abbadi
A Logic of Privacy / Steve Barker ; Valerio Genovese
Understanding Privacy Risk of Publishing Decision Trees / Zutao Zhu ; Wenliang Du
Data Protection
Secure Outsourcing of DNA Searching via Finite Automata / Marina Blanton ; Mehrdad Aliasgari
A Labelling System for Derived Data Control / Enrico Scalavino ; Vaibhav Gowadia ; Emil C. Lupu
On the Identification of Property Based Generalizations in Microdata Anonymization / Rinku Dewri ; Indrajit Ray ; Indrakshi Ray ; Darrell Whitley
Access Control
Role Mining in the Presence of Noise / Jaideep Vaidya ; Vijayalakshmi Atluri ; Qi Guo ; Haibing Lu
Distributed and Secure Access Control in P2P Databases / Angela Bonifati ; Ruilin Liu ; Hui (Wendy) Wang
Constructing Key Assignment Schemes from Chain Partitions / Jason Crampton ; Rosli Daud ; Keith M. Martin
Data Confidentiality and Query Verification
fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality / Said Oulmakhzoune ; Nora Cuppens-Boulahia ; Frédéric Cuppens ; Stephane Morucci
Efficient Inference Control for Open Relational Queries / Joachim Biskup ; Sven Hartmann ; Sebastian Link ; Jan-Hendrik Lochner
Query Racing: Fast Completeness Certification of Query Results / Bernardo Palazzi ; Maurizio Pizzonia ; Stefano Pucacco
Policy Definition and Enforcement
Mining Likely Properties of Access Control Policies via Association Rule Mining / JeeHyun Hwang ; Tao Xie ; Vincent Hu ; Mine Altunay
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control / Tyrone Cadenhead ; Mirat Kantarcioglu ; Bhavani Thuraiaingham
Enforcing Request Integrity in Web Applications / Karthick Jayaraman ; Grzegorz Lewandowski ; Paul G. Talaga ; Steve J. Chapin
Trust and Identity Management
Using Trust-Based Information Aggregation for Predicting Security Level of Systems / Siv Hilde Houmb ; Sudip Chakraborty
Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms / Aarthi Nagarajan ; Vijay Varadharajan
Towards Privacy-Enhancing Identify Management in Mashup-Providing Platforms / Jan Zibuschka ; Matthias Herbert ; Heiko Roßnagel
Short Papers
An Access Control Model for Web Databases / Ahlem Bouchahda-Ben Tekaya ; Nhan Le Thanh ; Adel Bouhoula ; Faten Labbene-Ayachi
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems / Hasan Qunoo ; Mark Ryan
Evaluating the Risk of Adopting RBAC Roles / Alessandro Colantonio ; Roberto Di Pietro ; Alberto Ocello ; Nino Vincenzo Verde
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance / Amril Syalim ; Takashi Nishide ; Kouichi Sakurai
When ABE Meets RSS / Yu Chen ; Hyun Sung Kim ; Jianbin Hu ; Zhong Chen
PriMan: A Privacy-Preserving Identity Framework / Kristof Verslype ; Pieter Verhaeghe ; Jorn Lapon ; Vincent Naessens ; Bart De Decker
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach / Alex Hai Wang
Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach / Ramaswamy Chandramouli
A Secure RFID Ticket System for Public Transport / Kun Peng ; Feng Bao
Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols / Suratose Tritilanunt
Secure Location Verification: A Security Analysis of GPS Signal Authentication / Georg T. Becker ; Sherman C. Lo ; David S. De Lorenzo ; Per K. Enge ; Christof Paar
Author Index
Query and Data Privacy
Generalizing PIR for Practical Private Retrieval of Public Data / Shiyuan Wang ; Divyakant Agrawal ; Amr El Abbadi
A Logic of Privacy / Steve Barker ; Valerio Genovese
3.

電子ブック

EB
Douglas W. Frye, Sushil Jajodia
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Table of Contents
List of Figures
Preface
Acknowledgments and Dedication
Information Technology and its Role In the Modern Organization / Chapter 1:
The Extent of an Organization's Connectivity / Chapter 2:
Network Physical Components / Chapter 3:
Legitimate Network Access / Chapter 4:
Illegitimate Network Access / Chapter 5:
Encryption / Chapter 6:
Balanced Scorecard / Chapter 7:
Sarbanes-Oxley / Chapter 8:
Physical Security / Chapter 9:
Disaster Recovery / Chapter 10:
Initial Employee Communication / Chapter 11:
The Human Element / Chapter 12:
Email, Instant Messaging and Phishing / Chapter 13:
Network Administration / Chapter 14:
Network Monitoring / Chapter 15:
Executive Communication / Chapter 16:
Information Security Awareness / Chapter 17:
Synthesis and Conclusion / Chapter 18:
Draft Policies / Chapter 19:
Bibliography
Index
Table of Contents
List of Figures
Preface
4.

電子ブック

EB
Donggang Liu, Sushil Jajodia, Peng Ning
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Wireless Sensor Network / 1.1:
Design Challenges / 1.2:
Security Issues in Sensor Networks / 1.3:
Broadcast Authentication / 1.3.1:
Pairwise Key Establishment / 1.3.2:
Security in Localization / 1.3.3:
Orgnization of the Book / 1.4:
[mu]TESLA Broadcast Authentication / 2:
Multi-Level [mu]TESLA / 2.2:
Scheme I: Predetermined Key Chain Commitment / 2.2.1:
Scheme II: Naive Two-Level [mu]TESLA / 2.2.2:
Scheme III: Fault Tolerant Two-Level [mu]TESLA / 2.2.3:
Scheme IV: DOS-Tolerant Two-Level [mu]TESLA / 2.2.4:
Scheme V: DOS-Resistant Two-Level [mu]TESLA / 2.2.5:
Scheme VI: Multi-Level [mu]TESLA / 2.2.6:
Experimental Results / 2.2.7:
Tree-Based [mu]TESLA / 2.3:
The Basic Approach / 2.3.1:
A Scheme for Long-Lived Senders / 2.3.2:
Distributing Parameter Certificates / 2.3.3:
Revoking [mu]TESLA Instances / 2.3.4:
Implementation and Evaluation / 2.3.5:
Summary / 2.4:
Key Pre-Distribution Techniques in Sensor Networks / 3:
Polynomial-Based Key Pre-Distribution / 3.1.1:
Probabilistic Key Pre-Distribution / 3.1.2:
Polynomial Pool-Based Key Pre-Distribution / 3.2:
Phase 1: Setup / 3.2.1:
Phase 2: Direct Key Establishment / 3.2.2:
Phase 3: Path Key Establishment / 3.2.3:
Key Pre-Distribution Using Random Subset Assignment / 3.3:
The Random Subset Assignment Scheme / 3.3.1:
Performance / 3.3.2:
Overheads / 3.3.3:
Security Analysis / 3.3.4:
Comparison with Previous Schemes / 3.3.5:
Hypercube-based Key Pre-Distribution / 3.4:
The Hypercube-Based Scheme / 3.4.1:
Dynamic Key Path Discovery / 3.4.2:
Overhead / 3.4.3:
Optimization of Polynomial Evaluation / 3.4.5:
Evaluation / 3.5.2:
Improving Pairwise Key Establishment Using Deployment Knowledge / 3.6:
Improving Key Pre-Distribution with Prior Deployment Knowledge / 4.1:
A Location-Aware Deployment Model / 4.1.1:
Closest Pairwise Keys Scheme / 4.1.2:
Closest Polynomials Pre-Distribution Scheme / 4.1.3:
Improving Key Pre-Distribution with Post Deployment Knowledge / 4.2:
Key Prioritization Using Post Deployment Knowledge / 4.2.1:
Improving Random Subset Assignment Scheme with Deployment Locations / 4.2.2:
Improving Key Pre-Distribution with Group Deployment Knowledge / 4.3:
Group-Based Deployment Model / 4.3.1:
A General Framework / 4.3.2:
Performance Analysis / 4.3.3:
Secure Localization / 4.3.4:
Localization in Sensor Networks / 5.1:
Pitfalls of Current Localization Schemes under Attacks / 5.2:
Attack-Resistant Location Estimation / 5.3:
Assumptions / 5.3.1:
Attack-Resistant Minimum Mean Square Estimation (MMSE) / 5.3.2:
Voting-Based Location Estimation / 5.3.3:
Simulation Evaluation / 5.3.4:
Implementation and Field Experiments / 5.3.6:
A Detector for Malicious Beacon Nodes / 5.4:
Detecting Malicious Beacon Signals / 5.4.1:
Filtering Replayed Beacon Signals / 5.4.2:
Revoking Malicious Beacon Nodes / 5.4.3:
Summary and Future Work / 5.4.4:
Future Work / 6.1:
References
Index
Introduction / 1:
Wireless Sensor Network / 1.1:
Design Challenges / 1.2:
5.

電子ブック

EB
International Conference on Information Systems Security, Sushil Jajodia, Takeo Kanade, Chandan Mazumdar
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
6.

電子ブック

EB
Sara Foresti, Sushil Jajodia
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Query and Data Privacy
Generalizing PIR for Practical Private Retrieval of Public Data / Shiyuan Wang ; Divyakant Agrawal ; Amr El Abbadi
A Logic of Privacy / Steve Barker ; Valerio Genovese
Understanding Privacy Risk of Publishing Decision Trees / Zutao Zhu ; Wenliang Du
Data Protection
Secure Outsourcing of DNA Searching via Finite Automata / Marina Blanton ; Mehrdad Aliasgari
A Labelling System for Derived Data Control / Enrico Scalavino ; Vaibhav Gowadia ; Emil C. Lupu
On the Identification of Property Based Generalizations in Microdata Anonymization / Rinku Dewri ; Indrajit Ray ; Indrakshi Ray ; Darrell Whitley
Access Control
Role Mining in the Presence of Noise / Jaideep Vaidya ; Vijayalakshmi Atluri ; Qi Guo ; Haibing Lu
Distributed and Secure Access Control in P2P Databases / Angela Bonifati ; Ruilin Liu ; Hui (Wendy) Wang
Constructing Key Assignment Schemes from Chain Partitions / Jason Crampton ; Rosli Daud ; Keith M. Martin
Data Confidentiality and Query Verification
fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality / Said Oulmakhzoune ; Nora Cuppens-Boulahia ; Frédéric Cuppens ; Stephane Morucci
Efficient Inference Control for Open Relational Queries / Joachim Biskup ; Sven Hartmann ; Sebastian Link ; Jan-Hendrik Lochner
Query Racing: Fast Completeness Certification of Query Results / Bernardo Palazzi ; Maurizio Pizzonia ; Stefano Pucacco
Policy Definition and Enforcement
Mining Likely Properties of Access Control Policies via Association Rule Mining / JeeHyun Hwang ; Tao Xie ; Vincent Hu ; Mine Altunay
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control / Tyrone Cadenhead ; Mirat Kantarcioglu ; Bhavani Thuraiaingham
Enforcing Request Integrity in Web Applications / Karthick Jayaraman ; Grzegorz Lewandowski ; Paul G. Talaga ; Steve J. Chapin
Trust and Identity Management
Using Trust-Based Information Aggregation for Predicting Security Level of Systems / Siv Hilde Houmb ; Sudip Chakraborty
Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms / Aarthi Nagarajan ; Vijay Varadharajan
Towards Privacy-Enhancing Identify Management in Mashup-Providing Platforms / Jan Zibuschka ; Matthias Herbert ; Heiko Roßnagel
Short Papers
An Access Control Model for Web Databases / Ahlem Bouchahda-Ben Tekaya ; Nhan Le Thanh ; Adel Bouhoula ; Faten Labbene-Ayachi
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems / Hasan Qunoo ; Mark Ryan
Evaluating the Risk of Adopting RBAC Roles / Alessandro Colantonio ; Roberto Di Pietro ; Alberto Ocello ; Nino Vincenzo Verde
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance / Amril Syalim ; Takashi Nishide ; Kouichi Sakurai
When ABE Meets RSS / Yu Chen ; Hyun Sung Kim ; Jianbin Hu ; Zhong Chen
PriMan: A Privacy-Preserving Identity Framework / Kristof Verslype ; Pieter Verhaeghe ; Jorn Lapon ; Vincent Naessens ; Bart De Decker
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach / Alex Hai Wang
Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach / Ramaswamy Chandramouli
A Secure RFID Ticket System for Public Transport / Kun Peng ; Feng Bao
Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols / Suratose Tritilanunt
Secure Location Verification: A Security Analysis of GPS Signal Authentication / Georg T. Becker ; Sherman C. Lo ; David S. De Lorenzo ; Per K. Enge ; Christof Paar
Author Index
Query and Data Privacy
Generalizing PIR for Practical Private Retrieval of Public Data / Shiyuan Wang ; Divyakant Agrawal ; Amr El Abbadi
A Logic of Privacy / Steve Barker ; Valerio Genovese
7.

電子ブック

EB
Ozgur Akan, Paolo Bellavista, Sushil Jajodia, Jianying Zhou, Jiannong Cao
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
Inexpensive Email Addresses An Email Spam-Combating System / Aram Yegenian ; Tassos Dimitriou
Anonymity and Privacy
Privacy Administration in Distributed Service Infrastructure / Nabil Ajam ; Nora Cuppens-Boulahia ; Frederic Cuppens
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS / Rinku Dewri ; Indrakshi Ray ; Indrajit Ray ; Darrell Whitley
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings / Ming Li ; Shucheng Yu ; Kui Ren ; Wenjing Lou
Wireless Security
A Study on False Channel Condition Reporting Attacks in Wireless Networks / Dongho Kim ; Yih-Chun Hu
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services / Patrick Traynor
Saving Energy on WiFi with Required IPsec / Youngsang Shin ; Steven Myers ; Minaxi Gupta
Systems Security - I
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization / Michael Grace ; Zhi Wang ; Deepa Srinivasan ; Jinku Li ; Xuxian Jiang ; Zhenkai Liang ; Siarhei Liakh
A Generic Construction of Dynamic Single Sign-on with Strong Security / Jinguang Han ; Yi Mu ; Willy Susilo ; Jun Yan
DeCore: Detecting Content Repurposing Attacks on Client' Systems / Smitha Sundareswaran ; Anna C. Squicciarini
Network Security - I
Realizing a Source Authentic Internet / Toby Ehrenkranz ; Jun Li ; Patrick McDaniel
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks / Jihyuk Choi ; Jerry T. Chiang
Attacking Beacon-Enabled 802.15.4 Networks / Sang Shin Jung ; Marco Valero ; Anu Bourgeois ; Raheem Beyah
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks / Mihaela Ion ; Giovanni Russello ; Bruno Crispo
Security Protocols - I
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes / Luciana Marconi ; Mauro Conti ; Roberto Di Pietro ; Jingqiang Lin ; Jiwu Jing ; Qiongxiao Wang
Context-Aware Usage Control for Android / Guangdong Bai ; Liang Gu ; Tao Feng ; Yao Guo ; Xiangqun Chen
System Security - II
Efficient Isolation of Trusted Subsystems in Embedded Systems / Raoul Strackx ; Frank Piessens ; Bart Preneel
Enhancing Host Security Using External Environment Sensors / Ee-Chien Chang ; Liming Lu ; Yongzheng Wu ; Roland H.C. Yap ; Jie Yu
FADE: Secure Overlay Cloud Storage with File Assured Deletion / Yang Tang ; Patrick P.C. Lee ; John C.S. Lui ; Radia Perlman
Security Protocols - II
A New Information Leakage Measure for Anonymity Protocols / Sami Zhioua
Hidden Markov Models for Automated Protocol Learning / Sean Whalen ; Matt Bishop ; James P. Crutchfield
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast / Omar I. Al-Bataineh ; Ronr van der Meyden
Network Security - II
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly / Andrew Kalafut ; Pairoj Rattadilok ; Pragneshkumar Patel
The Hitchhiker's Guide to DNS Cache Poisoning / Sooel Son ; Vitaly Shmatikou
A Formal Definition of Online Abuse-Freeness / Ralf Küsters ; Henning Schnoor ; Tomasz Truderung
Author Index
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
8.

電子ブック

EB
Donggang Liu, Sushil Jajodia, Peng Ning
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Wireless Sensor Network / 1.1:
Design Challenges / 1.2:
Security Issues in Sensor Networks / 1.3:
Broadcast Authentication / 1.3.1:
Pairwise Key Establishment / 1.3.2:
Security in Localization / 1.3.3:
Orgnization of the Book / 1.4:
[mu]TESLA Broadcast Authentication / 2:
Multi-Level [mu]TESLA / 2.2:
Scheme I: Predetermined Key Chain Commitment / 2.2.1:
Scheme II: Naive Two-Level [mu]TESLA / 2.2.2:
Scheme III: Fault Tolerant Two-Level [mu]TESLA / 2.2.3:
Scheme IV: DOS-Tolerant Two-Level [mu]TESLA / 2.2.4:
Scheme V: DOS-Resistant Two-Level [mu]TESLA / 2.2.5:
Scheme VI: Multi-Level [mu]TESLA / 2.2.6:
Experimental Results / 2.2.7:
Tree-Based [mu]TESLA / 2.3:
The Basic Approach / 2.3.1:
A Scheme for Long-Lived Senders / 2.3.2:
Distributing Parameter Certificates / 2.3.3:
Revoking [mu]TESLA Instances / 2.3.4:
Implementation and Evaluation / 2.3.5:
Summary / 2.4:
Key Pre-Distribution Techniques in Sensor Networks / 3:
Polynomial-Based Key Pre-Distribution / 3.1.1:
Probabilistic Key Pre-Distribution / 3.1.2:
Polynomial Pool-Based Key Pre-Distribution / 3.2:
Phase 1: Setup / 3.2.1:
Phase 2: Direct Key Establishment / 3.2.2:
Phase 3: Path Key Establishment / 3.2.3:
Key Pre-Distribution Using Random Subset Assignment / 3.3:
The Random Subset Assignment Scheme / 3.3.1:
Performance / 3.3.2:
Overheads / 3.3.3:
Security Analysis / 3.3.4:
Comparison with Previous Schemes / 3.3.5:
Hypercube-based Key Pre-Distribution / 3.4:
The Hypercube-Based Scheme / 3.4.1:
Dynamic Key Path Discovery / 3.4.2:
Overhead / 3.4.3:
Optimization of Polynomial Evaluation / 3.4.5:
Evaluation / 3.5.2:
Improving Pairwise Key Establishment Using Deployment Knowledge / 3.6:
Improving Key Pre-Distribution with Prior Deployment Knowledge / 4.1:
A Location-Aware Deployment Model / 4.1.1:
Closest Pairwise Keys Scheme / 4.1.2:
Closest Polynomials Pre-Distribution Scheme / 4.1.3:
Improving Key Pre-Distribution with Post Deployment Knowledge / 4.2:
Key Prioritization Using Post Deployment Knowledge / 4.2.1:
Improving Random Subset Assignment Scheme with Deployment Locations / 4.2.2:
Improving Key Pre-Distribution with Group Deployment Knowledge / 4.3:
Group-Based Deployment Model / 4.3.1:
A General Framework / 4.3.2:
Performance Analysis / 4.3.3:
Secure Localization / 4.3.4:
Localization in Sensor Networks / 5.1:
Pitfalls of Current Localization Schemes under Attacks / 5.2:
Attack-Resistant Location Estimation / 5.3:
Assumptions / 5.3.1:
Attack-Resistant Minimum Mean Square Estimation (MMSE) / 5.3.2:
Voting-Based Location Estimation / 5.3.3:
Simulation Evaluation / 5.3.4:
Implementation and Field Experiments / 5.3.6:
A Detector for Malicious Beacon Nodes / 5.4:
Detecting Malicious Beacon Signals / 5.4.1:
Filtering Replayed Beacon Signals / 5.4.2:
Revoking Malicious Beacon Nodes / 5.4.3:
Summary and Future Work / 5.4.4:
Future Work / 6.1:
References
Index
Introduction / 1:
Wireless Sensor Network / 1.1:
Design Challenges / 1.2:
9.

電子ブック

EB
International Conference on Information Systems Security, Sushil Jajodia, Takeo Kanade, Chandan Mazumdar, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
10.

電子ブック

EB
Douglas W. Frye, Sushil Jajodia
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Table of Contents
List of Figures
Preface
Acknowledgments and Dedication
Information Technology and its Role In the Modern Organization / Chapter 1:
The Extent of an Organization's Connectivity / Chapter 2:
Network Physical Components / Chapter 3:
Legitimate Network Access / Chapter 4:
Illegitimate Network Access / Chapter 5:
Encryption / Chapter 6:
Balanced Scorecard / Chapter 7:
Sarbanes-Oxley / Chapter 8:
Physical Security / Chapter 9:
Disaster Recovery / Chapter 10:
Initial Employee Communication / Chapter 11:
The Human Element / Chapter 12:
Email, Instant Messaging and Phishing / Chapter 13:
Network Administration / Chapter 14:
Network Monitoring / Chapter 15:
Executive Communication / Chapter 16:
Information Security Awareness / Chapter 17:
Synthesis and Conclusion / Chapter 18:
Draft Policies / Chapter 19:
Bibliography
Index
Table of Contents
List of Figures
Preface
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼