8th International Conference on Security and Privacy in Communication Networks

September 3–5, 2012 Padua, Italy
  • Sarshad Abubaker and Kui Wu. DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem
  • Zhiwei Wang. Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
  • Chunhua Chen, Shaohua Tang and Chris Mitchell. Building general-purpose security services on EMV payment cards
  • Jiri Kur, Vashek Matyas and Petr Svenda. Two Improvements of Random Key Predistribution for Wireless Sensor Networks
  • Jiangxiao Zhang, Zhoujun Li and Hua Guo. Anonymous Transferable Conditional E-cash
  • Govind Sreekarshenoy, Jordi Tubella and Antonio Gonzalez. Improving the Resilience of an IDS Against Performance Throttling Attacks
  • Xiaokui Shu and Danfeng Yao. Data Leak Detection As a Service
  • Boxuan Gu, Wenbin Zhang, Xiaole Bai, Adam Champion, Feng Qin and Dong Xuan. JSGuard: Shellcode Detection in JavaScript
  • Eun Kyoung Kim, Patrick McDaniel and Thomas La Porta. A Detection Mechanism for SMS Flooding Attacks in Cellular Networks
  • Peng Zhou, Xiapu Luo and Rocky K. C. Chang. More Anonymity Through Trust Degree in Trust-based Onion Routing
  • Tulio de Souza, Joss Wright, Piers O'Hanlon and Ian Brown. Set Difference Attacks in Wireless Sensor Networks
  • Jan Jusko and Martin Rehak. Revealing Cooperating Hosts by Connection Graph Analysis
  • Yuxin Meng, Lam-For Kwok and Wenjuan Li. Towards Designing Packet Filter with A Trust-based Approach using Bayesian Inference in Network Intrusion Detection
  • Abdun Mahmood, Md Enamul Kabir and Abdul K Mustafa. New Multi-Dimensional Sorting based K-Anonymity Microaggregation for Statistical Disclosure Control
  • Ehab Al-Shaer, Qi Duan and Jafar Haadi Jafarian. Random Host Mutation for Moving Target Defense
  • Matteo Maria Casalino, Michele Mangili, Henrik Plate and Serena Elisa Ponta. Detection of Conguration Vulnerabilities in Distributed (Web) Environments
  • Birhanu Eshete, Adolfo Villafiorita and Komminist Weldemariam. BINSPECT: Holistic Analysis and Detection of Malicious Web Pages
  • Tom Chothia, Marco Cova, Chris Novakovic and Camilo Gonzalez Toro. The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent
  • Jiawei Yuan and Shucheng Yu. Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing
  • Ryan Gerdes, Mani Mina and Thomas Daniels. Evaluating the security of physical-layer identification systems
  • Seyed Amir Iranmanesh, Hemant Sengar and Haining Wang. A Voice Spam Filter to Clean Subscribers' Mailbox