Message from EAI President regarding COVID-19

Thousands of EUDL articles are free to download thanks to the support from EAI, Europe's largest not-for-profit research community dedicated to employing the latest developments in information technology to build a greener, healthier and smarter world. EAI membership is free! Consider donating to help EAI's vision grow by engaging world's brightest minds to build a better future regardless of their age, economic status or country of origin. Learn more at www.eai.eu or donate by clicking the accompanying link.

X
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
SECURECOMM 2006
SECOVAL 2006WENS 2006
Other Years
SECURECOMM 2005SECURECOMM 2006SECURECOMM 2007SECURECOMM 2008SECURECOMM 2009SECURECOMM 2010SECURECOMM 2011SECURECOMM 2012SECURECOMM 2013SECURECOMM 2014SECURECOMM 2014SECURECOMM 2015SECURECOMM 2016SECURECOMM & ATCS & SEPRIOT 2017SECURECOMM 2017
Ethics and Malpractice Statement

    SECURECOMM

    2nd International ICST Conference on Security and Privacy in Comunication Networks

    The scope of SecureComm 2006 has been broadened since the inaugural 2005 event. SecureComm seeks high-quality research contributions in the form of well-developed full papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas …

    The scope of SecureComm 2006 has been broadened since the inaugural 2005 event. SecureComm seeks high-quality research contributions in the form of well-developed full papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated.

    more »
    Editor(s): Mukesh Singhal (University of Kentucky) and John Baras (University of Maryland, College Park)
    Publisher
    IEEE
    ISBN
    1-4244-0423-1
    Conference dates
    28th Aug–1st Sep 2006
    Location
    Baltimore, USA
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2021 IEEE

    Ordered by title or year
    Showing 1–33 of 33 results
    Page size: 102550
    • 1
    • A Distributed Stealthy Coordination Mechanism for Worm Synchronization

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Gaurav Kataria, Gaurav Anand, Rudolph Araujo, Ramayya Krishnan, Adrian Perrig
    • A Double Horizon Defense Design for Robust Regulation of Malicious Traffic

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Ying Xu, Roch Guerin
    • A Flexible Approach to Intrusion Alert Anonymization and Correlation

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Dingbang Xu , Peng Ning
    • A Framework for Identifying Compromised Nodes in Sensor Networks

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Qing Zhang , Ting Yu , Peng Ning
    • An Architecture for an Email Worm Prevention System

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Mohamed Mahmoud Taibah, Ehab Al-Shaer, Raouf Boutaba
    • An Identity-based Ring Signature Scheme with Enhanced Privacy

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Chandana Gamage, Ben Gras, Bruno Crispo, Andrew S Tanenbaum
    • An Intellilgent Infrastructure Strategy to Improving the Performance and Detection Capability of Intrusion Detection Systems

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Emmanuel Hooper
    • DaTA -- Data-Transparent Authentication Without Communication Overhead

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Songqing Chen, Shiping Chen, Xinyuan Wang, Sushil Jajodia
    • Denial of Service Attacks and Defenses in Decentralized Trust Management

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu
    • Detecting the Sybil Attack in Mobile Ad hoc Networks

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Chris Piro, Clay Shields, Brian Neil Levine
    • Discount Anonymous On Demand Routing for Mobile Ad hoc Networks

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Liu Yang, Markus Jakobsson, Susanne Wetzel
    • Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Katharine Chang, Kang G. Shin
    • Effective Detection of Active Worms with Varying Scan Rate

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Wei Yu, Xun Wang, Dong Xuan , David Lee
    • Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Costin Raiciu , David S. Rosenblum
    • Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      George Theodorakopoulos, John S. Baras
    • Enhancing Privacy Preservation of Anonymous Location Sampling Techniques in Traffic Monitoring Systems

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady
    • Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Radmilo Racic, Denys Ma, Hao Chen
    • Implementation and Performance Evaluation of EAP-TLS-KS

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Jared Cordasco, Ulrike Meyer , Susanne Wetzel
    • In-Band Wormholes and Countermeasures in OLSR Networks

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Peter Kruus, Dan Sterne, Richard Gopaul, Michael Heyman, Brian Rivera, Brian Luu, Peter Budulas, Tommy Johnson, Natalie Ivanic, Geoff Lawler
    • Leveraging IPsec for Mandatory Per-Packet Access Control

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Trent Jaeger, David H. King, Kevin R. Butler, Serge Hallyn, Joy Latten, Xiaolan Zhang
    • MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Issa Khalil, Saurabh Bagchi , Ness B. Shroff
    • Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Liang Xie, Sencun Zhu
    • Non-Invasive Methods for Host Certification

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick McDaniel
    • On Filtering of DDoS Attacks Based on Source Address Prefixes

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Gary Pack , Cristian Estan, Eli Collins, Jaeyoung Yoon
    • On Mobile Viruses Exploiting Messaging and Bluetooth Services

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Abhijit Bose, Kang G. Shin
    • Packet Coding for Strong Anonymity in Ad Hoc Networks

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Imad Aad, Claude Castelluccia, Jean-Pierre Hubaux
    • Preventing Cross Site Request Forgery Attacks

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Nenad Jovanovic, Engin Kirda, Christopher Kruegel
    • Protecting Against Distributed Denial of Service (DDoS) Attacks Using Distributed Filtering

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Jonathan Trostle
    • Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Mike Burmester, Tri van Le, Breno de Medeiros
    • Secure Real-time User Preference Collection for Broadcast Scheduling

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Xuhua Ding, Shuhong Wang, Baihua Zheng
    • Sensor Networks that Are Provably Resilient

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Jaikumar Radhakrishnan
    • TOPO: A Topology-aware Single Packet Attack Traceback Scheme

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Linfeng Zhang, Yong Guan
    • Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Catherine Meadows, Paul Syverson, LiWu Chang
    • 1
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico