Wireless Network Security I |
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen |
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas |
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks / Mansoor Alicherry ; Angelos D. Keromytis ; Angelos Stavrou |
Network Intrusion Detection |
Baiting Inside Attackers Using Decoy Documents / Brian M. Bowen ; Shlomo Hershkop ; Salvatore J. Stolfo |
MULAN: Multi-Level Adaptive Network Filter / Shimrit Tzur-David ; Danny Dolev ; Tal Anker |
Automated Classification of Network Traffic Anomalies / Guilherme Fernandes ; Philippe Owezarski |
Security and Privacy for the General Internet |
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets / Magdalena Payeras-Capellà ; Macià Mut-Puigserver ; Andreu Pere Isern-Deyà ; Josep L. Ferrer-Gomila ; Llorenç Huguet-Rotger |
On the Security of Bottleneck Bandwidth Estimation Techniques / Ghassan Karame ; David Gubler ; Srdjan čapkun |
An Eavesdropping Game with SINR as an Objective Function / Andrey Garnaev ; Wade Trappe |
Malware and Misbehavior |
Ensemble: Community-Based Anomaly Detection for Popular Applications / Feng Qian ; Zhiyun Qian ; Z. Morley Mao ; Atul Prakash |
Using Failure Information Analysis to Detect Enterprise Zombies / Zhaosheng Zhu ; Vinod Yegneswaran ; Yan Chen |
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games / William Kozma Jr. ; Loukas Lazos |
Wireless Network Security II, Sensor Networks |
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks / Toni Perković ; Ivo Stančić ; Luka MaliÜa ; Mario Čagalj |
Aggregated Authentication (AMAC) Using Universal Hash Functions / Wassim Znaidi ; Marine Minier ; Cédric Lauradoux |
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN / Andrea Gabrielli ; Maura Conti ; Roberto Di Pietro ; Luigi V. Mancini |
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks / Yanjiang Yang ; Jianying Zhou ; Robert H. Deng ; Feng Bao |
Key Management, Credentials, Authentications |
User-Centric Identity Using ePassports / Martijn Oostdijk ; Dirk-Jan van Dijk ; Maarten Wegdam |
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems / Shucheng Yu ; Kui Ren ; Wenjing Lou ; Jin Li |
Breaking and Building of Group Inside Signature / S. Sree Vivek ; S. Sharmila Deva Selvi ; S. Gopi Nath ; C. Pandu Rangan |
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources / Thanassis Tiropanis ; Tassos Dimitriou |
Wireless Network Security III |
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks / Julien Freudiger ; Maxim Raya ; Jean-Pierre Hubaux |
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures / Yi Yang ; Sencun Zhu ; Guohong Cao ; Thomas LaPorta |
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC / Aravind Venkataraman ; Raheem Beyah |
Secure Multicast, Emerging Technologies |
A Novel Architecture for Secure and Scalable Multicast over IP Network / Yawen Wei ; Zhen Yu ; Yong Guan |
Reliable Resource Searching in P2P Networks / Michael T. Goodrich ; Jonathan Z. Sun ; Roberto Tamassia ; Nikos Triandopoulos |
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems / Eric Chan-Tin ; Daniel Feldman ; Nicholas Hopper ; Yongdae Kim |
Author Index |
Wireless Network Security I |
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen |
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas |