Chen, Yan

Security and Privacy in Communication Networks

Chen, Yan - Security and Privacy in Communication Networks, ebook


Ebook, PDF with Adobe DRM
ISBN: 9783642052842
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages
Liang Cai, Gabriel Maganis, Hui Zang, Hao Chen

2. FIJI: Fighting Implicit Jamming in 802.11 WLANs
Ioannis Broustis, Konstantinos Pelechrinis, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Leandros Tassiulas

3. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks
Mansoor Alicherry, Angelos D. Keromytis, Angelos Stavrou

4. Baiting Inside Attackers Using Decoy Documents
Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo

5. MULAN: Multi-Level Adaptive Network Filter
Shimrit Tzur-David, Danny Dolev, Tal Anker

6. Automated Classification of Network Traffic Anomalies
Guilherme Fernandes, Philippe Owezarski

7. Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets
Magdalena Payeras-Capellà, Macià Mut-Puigserver, Andreu Pere Isern-Deyà, Josep L. Ferrer-Gomila, Llorenç Huguet-Rotger

8. On the Security of Bottleneck Bandwidth Estimation Techniques
Ghassan Karame, David Gubler, Srdjan Čapkun

9. An Eavesdropping Game with SINR as an Objective Function
Andrey Garnaev, Wade Trappe

10. Ensemble: Community-Based Anomaly Detection for Popular Applications
Feng Qian, Zhiyun Qian, Z. Morley Mao, Atul Prakash

11. Using Failure Information Analysis to Detect Enterprise Zombies
Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen

12. Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games
William Kozma, Loukas Lazos

13. Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks
Toni Perković, Ivo Stančić, Luka Mališa, Mario Čagalj

14. Aggregated Authentication (AMAC) Using Universal Hash Functions
Wassim Znaidi, Marine Minier, Cédric Lauradoux

15. Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN
Andrea Gabrielli, Mauro Conti, Roberto Pietro, Luigi V. Mancini

16. Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao

17. User–Centric Identity Using ePassports
Martijn Oostdijk, Dirk-Jan Dijk, Maarten Wegdam

18. Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li

19. Breaking and Building of Group Inside Signature
S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, C. Pandu Rangan

20. Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources
Thanassis Tiropanis, Tassos Dimitriou

21. Self-organized Anonymous Authentication in Mobile Ad Hoc Networks
Julien Freudiger, Maxim Raya, Jean-Pierre Hubaux

22. An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures
Yi Yang, Sencun Zhu, Guohong Cao, Thomas LaPorta

23. Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC
Aravind Venkataraman, Raheem Beyah

24. A Novel Architecture for Secure and Scalable Multicast over IP Network
Yawen Wei, Zhen Yu, Yong Guan

25. Reliable Resource Searching in P2P Networks
Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, Nikos Triandopoulos

26. The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems
Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim

Keywords: Computer Science, Computer Communication Networks, Systems and Data Security, Data Encryption, Information Systems and Communication Service, Data Structures, Cryptology and Information Theory, Information Systems Applications (incl.Internet)

Similar titles