Security and Privacy in Communication Networks: 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers / Edition 1by Yan Chen
SecureComm 2009, the 5th International ICST Conference on Security and P- vacyinCommunicationNetworks,washeldinAthens,Greece,September14–17, 2009.SecureCommwasorganizedbytheInstituteforComputerSciences,Social- Informatics and Telecommunications Engineering (ICST). The General Chair of the conference was Peng Liu from the Pennsylvania State University, USA.… See more details below
SecureComm 2009, the 5th International ICST Conference on Security and P- vacyinCommunicationNetworks,washeldinAthens,Greece,September14–17, 2009.SecureCommwasorganizedbytheInstituteforComputerSciences,Social- Informatics and Telecommunications Engineering (ICST). The General Chair of the conference was Peng Liu from the Pennsylvania State University, USA. The conference received 76 submissions (one withdrawn) and each subm- sion received at least three reviews, with some papers receiving as many asve reviews. Therst phase of the review process (April 7 to May 27) generated 290 reviews overall or about 3.8 reviews per submission. In the second phase (May 28 to June 12), a two-week online discussion was initiated ensuring consensus for each accepted paper. The review process was challenging and we are deeply gratefultothecommitteemembersandtheexternalreviewersfortheiroutsta- ing work. The Program Committee consisted of 64 academics and professionals well known in their corresponding area of expertise. After meticulous deliberation, the Program Committee, which was chaired by Yan Chen from Northwestern University, USA and Tassos Dimitriou from Athens Information Technology,Greece, selected 19 full papers and 7 short ones for presentation in the academic track and inclusion in this volume. This gives the acceptance rates of 25.3% for the full papers and 34.7% for all papers.
- Springer Berlin Heidelberg
- Publication date:
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series, #19
- Edition description:
- Product dimensions:
- 6.00(w) x 9.20(h) x 1.00(d)
Table of Contents
Wireless Network Security I.- Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages.- FIJI: Fighting Implicit Jamming in 802.11 WLANs.- Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks.- Network Intrusion Detection.- Baiting Inside Attackers Using Decoy Documents.- MULAN: Multi-Level Adaptive Network Filter.- Automated Classification of Network Traffic Anomalies.- Security and Privacy for the General Internet.- Formal Analysis of FPH Contract Signing Prool Using Colored Petri Nets.- On the Security of Bottleneck Bandwidth Estimation Techniques.- An Eavesdropping Game with SINR as an Objective Function.- Malware and Misbehavior.- Ensemble: Community-Based Anomaly Detection for Popular Applications.- Using Failure Information Analysis to Detect Enterprise Zombies.- Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games.- Wireless Network Security II, Sensor Networks.- Multichannel Prools for User-Friendly and Scalable Initialization of Sensor Networks.- Aggregated Authentication (AMAC) Using Universal Hash Functions.- Sec-TMP: A Secure Topology Maintenance Prool for Event Delivery Enforcement in WSN.- Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.- Key Management, Credentials, Authentications.- User–Centric Identity Using ePassports.- Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems.- Breaking and Building of Group Inside Signature.- Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources.- Wireless Network Security III.- Self-organized Anonymous Authentication in Mobile Ad Hoc Networks.- An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures.- Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC.- Secure Multicast, Emerging Technologies.- A Novel Architecture for Secure and Scalable Multicast over IP Network.- Reliable Resource Searching in P2P Networks.- The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems.
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >