close
1.

電子ブック

EB
Ozgur Akan, Paolo Bellavista, Yan Chen, Yang Chen, Tassos D. Dimitriou, Jianying Zhou
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Wireless Network Security I
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks / Mansoor Alicherry ; Angelos D. Keromytis ; Angelos Stavrou
Network Intrusion Detection
Baiting Inside Attackers Using Decoy Documents / Brian M. Bowen ; Shlomo Hershkop ; Salvatore J. Stolfo
MULAN: Multi-Level Adaptive Network Filter / Shimrit Tzur-David ; Danny Dolev ; Tal Anker
Automated Classification of Network Traffic Anomalies / Guilherme Fernandes ; Philippe Owezarski
Security and Privacy for the General Internet
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets / Magdalena Payeras-Capellà ; Macià Mut-Puigserver ; Andreu Pere Isern-Deyà ; Josep L. Ferrer-Gomila ; Llorenç Huguet-Rotger
On the Security of Bottleneck Bandwidth Estimation Techniques / Ghassan Karame ; David Gubler ; Srdjan čapkun
An Eavesdropping Game with SINR as an Objective Function / Andrey Garnaev ; Wade Trappe
Malware and Misbehavior
Ensemble: Community-Based Anomaly Detection for Popular Applications / Feng Qian ; Zhiyun Qian ; Z. Morley Mao ; Atul Prakash
Using Failure Information Analysis to Detect Enterprise Zombies / Zhaosheng Zhu ; Vinod Yegneswaran ; Yan Chen
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games / William Kozma Jr. ; Loukas Lazos
Wireless Network Security II, Sensor Networks
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks / Toni Perković ; Ivo Stančić ; Luka MaliÜa ; Mario Čagalj
Aggregated Authentication (AMAC) Using Universal Hash Functions / Wassim Znaidi ; Marine Minier ; Cédric Lauradoux
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN / Andrea Gabrielli ; Maura Conti ; Roberto Di Pietro ; Luigi V. Mancini
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks / Yanjiang Yang ; Jianying Zhou ; Robert H. Deng ; Feng Bao
Key Management, Credentials, Authentications
User-Centric Identity Using ePassports / Martijn Oostdijk ; Dirk-Jan van Dijk ; Maarten Wegdam
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems / Shucheng Yu ; Kui Ren ; Wenjing Lou ; Jin Li
Breaking and Building of Group Inside Signature / S. Sree Vivek ; S. Sharmila Deva Selvi ; S. Gopi Nath ; C. Pandu Rangan
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources / Thanassis Tiropanis ; Tassos Dimitriou
Wireless Network Security III
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks / Julien Freudiger ; Maxim Raya ; Jean-Pierre Hubaux
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures / Yi Yang ; Sencun Zhu ; Guohong Cao ; Thomas LaPorta
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC / Aravind Venkataraman ; Raheem Beyah
Secure Multicast, Emerging Technologies
A Novel Architecture for Secure and Scalable Multicast over IP Network / Yawen Wei ; Zhen Yu ; Yong Guan
Reliable Resource Searching in P2P Networks / Michael T. Goodrich ; Jonathan Z. Sun ; Roberto Tamassia ; Nikos Triandopoulos
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems / Eric Chan-Tin ; Daniel Feldman ; Nicholas Hopper ; Yongdae Kim
Author Index
Wireless Network Security I
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas
2.

電子ブック

EB
Yan Chen, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York NY : ACM, 2013
所蔵情報: loading…
3.

電子ブック

EB
Yan Chen, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York, NY : ACM, 2011
所蔵情報: loading…
4.

電子ブック

EB
Yan Chen, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York, NY : ACM, 2011
所蔵情報: loading…
5.

電子ブック

EB
Yan Chen, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York, NY : ACM, 2011
所蔵情報: loading…
6.

電子ブック

EB
Yan Chen, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York, NY : ACM, 2011
所蔵情報: loading…
7.

電子ブック

EB
Yan Chen, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York, NY : ACM, 2011
所蔵情報: loading…
8.

電子ブック

EB
Ozgur Akan, Paolo Bellavista, Yan Chen, Yang Chen, Tassos D. Dimitriou, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Wireless Network Security I
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks / Mansoor Alicherry ; Angelos D. Keromytis ; Angelos Stavrou
Network Intrusion Detection
Baiting Inside Attackers Using Decoy Documents / Brian M. Bowen ; Shlomo Hershkop ; Salvatore J. Stolfo
MULAN: Multi-Level Adaptive Network Filter / Shimrit Tzur-David ; Danny Dolev ; Tal Anker
Automated Classification of Network Traffic Anomalies / Guilherme Fernandes ; Philippe Owezarski
Security and Privacy for the General Internet
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets / Magdalena Payeras-Capellà ; Macià Mut-Puigserver ; Andreu Pere Isern-Deyà ; Josep L. Ferrer-Gomila ; Llorenç Huguet-Rotger
On the Security of Bottleneck Bandwidth Estimation Techniques / Ghassan Karame ; David Gubler ; Srdjan čapkun
An Eavesdropping Game with SINR as an Objective Function / Andrey Garnaev ; Wade Trappe
Malware and Misbehavior
Ensemble: Community-Based Anomaly Detection for Popular Applications / Feng Qian ; Zhiyun Qian ; Z. Morley Mao ; Atul Prakash
Using Failure Information Analysis to Detect Enterprise Zombies / Zhaosheng Zhu ; Vinod Yegneswaran ; Yan Chen
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games / William Kozma Jr. ; Loukas Lazos
Wireless Network Security II, Sensor Networks
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks / Toni Perković ; Ivo Stančić ; Luka MaliÜa ; Mario Čagalj
Aggregated Authentication (AMAC) Using Universal Hash Functions / Wassim Znaidi ; Marine Minier ; Cédric Lauradoux
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN / Andrea Gabrielli ; Maura Conti ; Roberto Di Pietro ; Luigi V. Mancini
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks / Yanjiang Yang ; Jianying Zhou ; Robert H. Deng ; Feng Bao
Key Management, Credentials, Authentications
User-Centric Identity Using ePassports / Martijn Oostdijk ; Dirk-Jan van Dijk ; Maarten Wegdam
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems / Shucheng Yu ; Kui Ren ; Wenjing Lou ; Jin Li
Breaking and Building of Group Inside Signature / S. Sree Vivek ; S. Sharmila Deva Selvi ; S. Gopi Nath ; C. Pandu Rangan
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources / Thanassis Tiropanis ; Tassos Dimitriou
Wireless Network Security III
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks / Julien Freudiger ; Maxim Raya ; Jean-Pierre Hubaux
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures / Yi Yang ; Sencun Zhu ; Guohong Cao ; Thomas LaPorta
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC / Aravind Venkataraman ; Raheem Beyah
Secure Multicast, Emerging Technologies
A Novel Architecture for Secure and Scalable Multicast over IP Network / Yawen Wei ; Zhen Yu ; Yong Guan
Reliable Resource Searching in P2P Networks / Michael T. Goodrich ; Jonathan Z. Sun ; Roberto Tamassia ; Nikos Triandopoulos
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems / Eric Chan-Tin ; Daniel Feldman ; Nicholas Hopper ; Yongdae Kim
Author Index
Wireless Network Security I
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas
9.

電子ブック

EB
Zhangxin Chen, Craig C. Douglas, Wu Zhang, Yan Chen Jiang Xie, Yan Chen, Zhangxin Chen, Craig C. Douglas, Wu Zhang
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2016
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼