|
International Workshop on Security in Systems and Networks - SSN
|
|
Workshop Introduction - SSN
|
Honeypot Back-propagation for Mitigating Spoofing Distributed Denial-of-Service Attacks Sherif Khattab, Rami Melhem, Daniel Mossé, Taieb Znati
|
Detecting Selective Forwarding Attacks in Wireless Sensor Networks Bo Yu, Bin Xiao
|
A Case for Exploit-Robust and Attack-Aware Protocol RFCs Venkat Pathamsetty, Prabhaker Mateti
|
Fault and Intrusion Tolerance of Wireless Sensor Networks Liang-min Wang, Jian-feng Ma, Chao Wang, Alex Chichung Kot
|
Network Intrusion Detection with Semantics-Aware Capability Walter Scheirer, Mooi Choo Chuah
|
Analysis of BGP Prefix Origins During Google's May 2005 Outage Tao Wan, Paul C. Van Oorschot
|
A Note on Broadcast Encryption Key Management with Applications to Large Scale Emergency Alert Systems Guoqiang Shu, David Lee, Mihalis Yannakakis
|
Coordinate Transformation - A Solution for the Privacy Problem of Location Based Services? Andreas Gutscher
|
Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks Yong Xi, Loren Schwiebert, Weisong Shi
|
Shubac: A Searchable P2P Network Utilizing Dynamic Paths for Client/Server Anonymity Aharon Brodie, Cheng-zhong Xu
|
Energy-Efficient ID-based Group Key Agreement Protocols for Wireless Networks Chik How Tan, Joseph Chee Ming Teo
|
Base Line Performance Measurements of Access Controls For Libraries and Modules Jason W Kim, Vassilis Prevelakis
|
Automated Refinement of Security Protocols Anders M. Hagalisletto
|
A Correctness Proof of the SRP Protocol Huabing Yang, Xingyuan Zhang, Yuanyuan Wang
|
Checkpointing and Rollback-Recovery Protocol for Mobile Systems with MW Session Guarantee Jerzy Brzezinski, Anna Kobusinska, Michal Szychowiak
|
|