Chen, Yan
Security and Privacy in Communication Networks
1. Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages
Liang Cai, Gabriel Maganis, Hui Zang, Hao Chen
2. FIJI: Fighting Implicit Jamming in 802.11 WLANs
Ioannis Broustis, Konstantinos Pelechrinis, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Leandros Tassiulas
3. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks
Mansoor Alicherry, Angelos D. Keromytis, Angelos Stavrou
4. Baiting Inside Attackers Using Decoy Documents
Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo
5. MULAN: Multi-Level Adaptive Network Filter
Shimrit Tzur-David, Danny Dolev, Tal Anker
6. Automated Classification of Network Traffic Anomalies
Guilherme Fernandes, Philippe Owezarski
7. Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets
Magdalena Payeras-Capellà, Macià Mut-Puigserver, Andreu Pere Isern-Deyà, Josep L. Ferrer-Gomila, Llorenç Huguet-Rotger
8. On the Security of Bottleneck Bandwidth Estimation Techniques
Ghassan Karame, David Gubler, Srdjan Čapkun
9. An Eavesdropping Game with SINR as an Objective Function
Andrey Garnaev, Wade Trappe
10. Ensemble: Community-Based Anomaly Detection for Popular Applications
Feng Qian, Zhiyun Qian, Z. Morley Mao, Atul Prakash
11. Using Failure Information Analysis to Detect Enterprise Zombies
Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen
12. Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games
William Kozma, Loukas Lazos
13. Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks
Toni Perković, Ivo Stančić, Luka Mališa, Mario Čagalj
14. Aggregated Authentication (AMAC) Using Universal Hash Functions
Wassim Znaidi, Marine Minier, Cédric Lauradoux
15. Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN
Andrea Gabrielli, Mauro Conti, Roberto Pietro, Luigi V. Mancini
16. Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao
17. User–Centric Identity Using
Martijn Oostdijk, Dirk-Jan Dijk, Maarten Wegdam
18. Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li
19. Breaking and Building of Group Inside Signature
S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, C. Pandu Rangan
20. Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources
Thanassis Tiropanis, Tassos Dimitriou
21. Self-organized Anonymous Authentication in Mobile Ad Hoc Networks
Julien Freudiger, Maxim Raya, Jean-Pierre Hubaux
22. An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures
Yi Yang, Sencun Zhu, Guohong Cao, Thomas LaPorta
23. Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC
Aravind Venkataraman, Raheem Beyah
24. A Novel Architecture for Secure and Scalable Multicast over IP Network
Yawen Wei, Zhen Yu, Yong Guan
25. Reliable Resource Searching in P2P Networks
Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, Nikos Triandopoulos
26. The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems
Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim
Nyckelord: Computer Science, Computer Communication Networks, Systems and Data Security, Data Encryption, Information Systems and Communication Service, Data Structures, Cryptology and Information Theory, Information Systems Applications (incl.Internet)
- Författare
- Chen, Yan
- Dimitriou, Tassos D.
- Zhou, Jianying
- Utgivare
- Springer
- Utgivningsår
- 2009
- Språk
- en
- Utgåva
- 1
- Serie
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- Kategori
- Datateknik, Datakommunikation
- Format
- E-bok
- eISBN (PDF)
- 9783642052842