


default search action
9. SecureComm 2013: Sydney, NSW, Australia
- Tanveer A. Zia

, Albert Y. Zomaya, Vijay Varadharajan, Zhuoqing Morley Mao:
Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 127, Springer 2013, ISBN 978-3-319-04282-4
Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks
- Eirini D. Karapistoli, Anastasios A. Economides

:
Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks. 1-18 - Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li:

Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks. 19-34 - Mengjun Xie

, Liang Hao, Kenji Yoshigoe, Jiang Bian:
CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones. 35-52
Session II: Malware, Botnets, and Distributed Denial of Service
- Xiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu:

Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets. 53-68 - Veelasha Moonsamy, Jia Rong

, Shaowu Liu
, Gang Li
, Lynn Margaret Batten:
Contrasting Permission Patterns between Clean and Malicious Android Applications. 69-85 - Yousra Aafer, Wenliang Du, Heng Yin

:
DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. 86-103
Session III: Security for Emerging Technologies: VoIP, Peer-to-peer, and Cloud Computing
- Ryan Farley, Xinyuan Wang:

Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation. 104-121 - Jun Jiang, Meining Nie, Purui Su, Dengguo Feng:

VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing. 122-139 - Vijay Varadharajan, Udaya Kiran Tupakula:

Integrated Security Architecture for Virtual Machines. 140-153
Session IV: Encryption and Key Management
- Ibrahim F. Elashry, Yi Mu, Willy Susilo

:
Generic Mediated Encryption. 154-168 - Miao Li, Liangsheng He, Tongjie Yang, Neng Gao, Zongbin Liu, Qinglong Zhang:

An Efficient Reconfigurable II-ONB Modular Multiplier. 169-181 - Hui Cui

, Yi Mu, Man Ho Au:
Public-Key Encryption Resilient to Linear Related-Key Attacks. 182-196
Session V: Security in Software and Machine Learning
- Silvio Cesare, Yang Xiang, Jun Zhang:

Clonewise - Detecting Package-Level Clones Using Machine Learning. 197-215 - Minghua Wang

, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng:
Automatic Polymorphic Exploit Generation for Software Vulnerabilities. 216-233
Session VI: Network and System Security Model
- Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang:

A Novel Web Tunnel Detection Method Based on Protocol Behaviors. 234-251 - Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens:

Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege. 252-269 - Jin B. Hong

, Dong Seong Kim
:
Scalable Security Model Generation and Analysis Using k-importance Measures. 270-287
Session VII: Security and Privacy in Pervasive and Ubiquitous Computing
- Mehari Msgna, Konstantinos Markantonakis, Keith Mayes:

The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. 288-304 - Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty, Christophe Rosenberger

:
An e-payment Architecture Ensuring a High Level of Privacy Protection. 305-322 - Xin Ruan, Chuan Yue, Haining Wang:

Unveiling Privacy Setting Breaches in Online Social Networks. 323-341
ATIS 2013: 4th International Workshop on Applications and Techniques in Information Security
- Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy:

Securing a Web-Based Anti-counterfeit RFID System. 342-355 - Md. Anwar Hossain Masud, Md. Rafiqul Islam

, Jemal H. Abawajy:
Security Concerns and Remedy in a Cloud Based E-learning System. 356-366 - Quazi Mamun

, Md. Rafiqul Islam
, Mohammed Kaosar
:
Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs. 367-379 - Mohammed Kaosar

, Quazi Mamun
, Md. Rafiqul Islam
, Xun Yi
:
(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System. 380-392 - Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai:

Detection of Android API Call Using Logging Mechanism within Android Framework. 393-404 - Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan

:
Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform. 405-417

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














