- Sarshad Abubaker and Kui Wu. DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem
- Zhiwei Wang. Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
- Chunhua Chen, Shaohua Tang and Chris Mitchell. Building general-purpose security services on EMV payment cards
- Jiri Kur, Vashek Matyas and Petr Svenda. Two Improvements of Random Key Predistribution for Wireless Sensor Networks
- Jiangxiao Zhang, Zhoujun Li and Hua Guo. Anonymous Transferable Conditional E-cash
- Govind Sreekarshenoy, Jordi Tubella and Antonio Gonzalez. Improving the Resilience of an IDS Against Performance Throttling Attacks
- Xiaokui Shu and Danfeng Yao. Data Leak Detection As a Service
- Boxuan Gu, Wenbin Zhang, Xiaole Bai, Adam Champion, Feng Qin and Dong Xuan. JSGuard: Shellcode Detection in JavaScript
- Eun Kyoung Kim, Patrick McDaniel and Thomas La Porta. A Detection Mechanism for SMS Flooding Attacks in Cellular Networks
- Peng Zhou, Xiapu Luo and Rocky K. C. Chang. More Anonymity Through Trust Degree in Trust-based Onion Routing
- Tulio de Souza, Joss Wright, Piers O'Hanlon and Ian Brown. Set Difference Attacks in Wireless Sensor Networks
- Jan Jusko and Martin Rehak. Revealing Cooperating Hosts by Connection Graph Analysis
- Yuxin Meng, Lam-For Kwok and Wenjuan Li. Towards Designing Packet Filter with A Trust-based Approach using Bayesian Inference in Network Intrusion Detection
- Abdun Mahmood, Md Enamul Kabir and Abdul K Mustafa. New Multi-Dimensional Sorting based K-Anonymity Microaggregation for Statistical Disclosure Control
- Ehab Al-Shaer, Qi Duan and Jafar Haadi Jafarian. Random Host Mutation for Moving Target Defense
- Matteo Maria Casalino, Michele Mangili, Henrik Plate and Serena Elisa Ponta. Detection of Conguration Vulnerabilities in Distributed (Web) Environments
- Birhanu Eshete, Adolfo Villafiorita and Komminist Weldemariam. BINSPECT: Holistic Analysis and Detection of Malicious Web Pages
- Tom Chothia, Marco Cova, Chris Novakovic and Camilo Gonzalez Toro. The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent
- Jiawei Yuan and Shucheng Yu. Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing
- Ryan Gerdes, Mani Mina and Thomas Daniels. Evaluating the security of physical-layer identification systems
- Seyed Amir Iranmanesh, Hemant Sengar and Haining Wang. A Voice Spam Filter to Clean Subscribers' Mailbox
Home › Accepted papers › | Important dates
Previous Securecomm ConferencesSponsors |