Security and Privacy in Communication Networks: 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers

Front Cover
Yan Chen, Tassos D. Dimitriou, Jianying Zhou
Springer Science & Business Media, Oct 27, 2009 - Computers - 460 pages
SecureComm 2009, the 5th International ICST Conference on Security and P- vacyinCommunicationNetworks,washeldinAthens,Greece,September14–17, 2009.SecureCommwasorganizedbytheInstituteforComputerSciences,Social- Informatics and Telecommunications Engineering (ICST). The General Chair of the conference was Peng Liu from the Pennsylvania State University, USA. The conference received 76 submissions (one withdrawn) and each subm- sion received at least three reviews, with some papers receiving as many as ?ve reviews. The ?rst phase of the review process (April 7 to May 27) generated 290 reviews overall or about 3.8 reviews per submission. In the second phase (May 28 to June 12), a two-week online discussion was initiated ensuring consensus for each accepted paper. The review process was challenging and we are deeply gratefultothecommitteemembersandtheexternalreviewersfortheiroutsta- ing work. The Program Committee consisted of 64 academics and professionals well known in their corresponding area of expertise. After meticulous deliberation, the Program Committee, which was chaired by Yan Chen from Northwestern University, USA and Tassos Dimitriou from Athens Information Technology,Greece, selected 19 full papers and 7 short ones for presentation in the academic track and inclusion in this volume. This gives the acceptance rates of 25.3% for the full papers and 34.7% for all papers.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages
1
Fighting Implicit Jamming in 80211 WLANs
21
DenybyDefault Distributed Security Policy Enforcement in Mobile Ad Hoc Networks
41
Baiting Inside Attackers Using Decoy Documents
51
MultiLevel Adaptive Network Filter
71
Automated Classification of Network Traffic Anomalies
91
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets
101
On the Security of Bottleneck Bandwidth Estimation Techniques
121
A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN
265
Hierarchical Selfhealing Key Distribution for Heterogeneous Wireless Sensor Networks
285
UserCentric Identity Using ePassports
296
Defending against Key Abuse Attacks in KPABE Enabled Broadcast Systems
311
Breaking and Building of Group Inside Signature
330
Use of IDBased Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources
340
Selforganized Anonymous Authentication in Mobile Ad Hoc Networks
350
Analysis and Countermeasures
373

An Eavesdropping Game with SINR as an Objective Function
142
CommunityBased Anomaly Detection for Popular Applications
163
Using Failure Information Analysis to Detect Enterprise Zombies
185
Misbehavior Identification via RényiUlam Games
207
Multichannel Protocols for UserFriendly and Scalable Initialization of Sensor Networks
228
Aggregated Authentication AMAC Using Universal Hash Functions
248
Rogue Access Point Detection Using Innate Characteristics of the 80211 MAC
394
A Novel Architecture for Secure and Scalable Multicast over IP Network
417
Reliable Resource Searching in P2P Networks
437
Limitations of Anomaly Detection for Secure Network Coordinate Systems
448
Author Index
459
Copyright

Other editions - View all

Common terms and phrases

About the author (2009)

Jianying Zhou holds an M.Sc. in computer science from the Chinese Academy of Sciences and a Ph.D. in information security from the University of London. Dr. Zhou is project manager at Kent Ridge Digital Labs in Singapore, where he leads an R&D team that develops network security technologies. He is actively involved in the academic world, serving on international conference committees and publishing papers for well-known journals.

Bibliographic information