default search action
4th SIN 2011: Sydney, NSW, Australia
- Mehmet A. Orgun, Atilla Elçi, Oleg B. Makarevich, Sorin A. Huss, Josef Pieprzyk, Lyudmila K. Babenko, Alexander G. Chefranov, Rajan Shankaran:
Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. ACM 2011, ISBN 978-1-4503-1020-8
Keynote talks
- Kevin A. Kwiat:
Fault tolerance for fight-through: a basis for strategic survival. 1-2 - Vijay Varadharajan:
Rethinking cyber security. 3-4
Regular papers
- Andrew Z. Tirkel, Thomas E. Hall, Charles F. Osborne, Nicholas Meinhold, Oscar Moreno:
Collusion resistant fingerprinting of digital audio. 5-12 - Mohamed Nassar, Sylvain Martin, Guy Leduc, Olivier Festor:
Using decision trees for generating adaptive SPIT signatures. 13-20 - Martin Ågren, Martin Hell:
Cryptanalysis of the stream cipher BEAN. 21-28 - Evgeny Sergeevich Abramov, Artem Viktorovich Andreev, Denis Valerievich Mordvin, Oleg B. Makarevich:
Corporate networks security evaluation based on attack graphs. 29-36 - Iynkaran Natgunanathan, Yong Xiang:
Echo hiding based stereo audio watermarking against pitch-scaling attacks. 37-42 - Shu-guang Dai, Chun-Ming Tang, Yuenai Chen:
The optimal linear multi-secret sharing scheme for non-threshold access structure(student contribution). 43-48 - Long Hoang Nguyen:
Rational distance-bounding protocols over noisy channel. 49-56 - Ludmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro:
Algebraic analysis of GOST encryption algorithm. 57-62 - Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Andrea Palomba:
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults. 63-72 - Shameek Bhattacharjee, Saptarshi Debroy, Mainak Chatterjee, Kevin A. Kwiat:
Trust based fusion over noisy channels through anomaly detection in cognitive radio networks. 73-80 - Michio Sonoda, Takeshi Matsuda, Daiki Koizumi, Shigeichi Hirasawa:
On automatic detection of SQL injection attacks by the feature extraction of the single character. 81-86 - Chun Ruan, Seyed A. Shahrestani:
Logic based authorization program and its implementation. 87-94 - Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert:
Security analysis of a femtocell device. 95-102 - Anderson Nunes Paiva Morais, Ana R. Cavalli, Eliane Martins:
A model-based attack injection approach for security validation. 103-110 - Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi:
Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol. 111-118 - Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala:
Counteracting DDoS attacks in WLAN. 119-126 - Helena Rifà-Pous, Carles Garrigues:
A secure and anonymous cooperative sensing protocol for cognitive radio networks. 127-132 - William Huba, Bo Yuan, Daryl Johnson, Peter Lutz:
A HTTP cookie covert channel. 133-136 - Manoj Singh Gaur, Vijay Laxmi, Manish Kumar, Rajbir Kaur:
Detour attack in OLSR. 137-142 - Haichang Gao, Licheng Ma, Jinhua Qiu, Xiyang Liu:
Exploration of a hand-based graphical password scheme. 143-150 - Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Nitesh Kumar Prajapati:
A sybil attack detection approach using neighboring vehicles in VANET. 151-158 - Liang Cheng, Yang Zhang:
Model checking security policy model using both UML static and dynamic diagrams. 159-166 - Wei-Kuo Chiang, Jian-Hao Chen:
TW-KEAP: an efficient four-party key exchange protocol for end-to-end communications. 167-174 - Giuseppe Lo Re, Fabrizio Milazzo, Marco Ortolani:
Secure random number generation in wireless sensor networks. 175-182 - Bogdan Korel, Shangping Ren, Kevin A. Kwiat, Arnaud Auguste, Alban Vignaux:
Improving operation time bounded mission critical systems' attack-survivability through controlled source-code transformation. 183-190 - Mufeed Juma AlMashrafi:
A different algebraic analysis of the ZUC stream cipher. 191-198
Student papers
- Mufeed Juma AlMashrafi, Kenneth Koon-Ho Wong, Leonie Simpson, Harry Bartlett, Ed Dawson:
Algebraic analysis of the SSS stream cipher. 199-204 - Mahmoud Elkhodr, Seyed A. Shahrestani, Hon Cheung:
An approach to enhance the security of remote health monitoring systems. 205-208 - Ahmad Jafarabadi, Mohammad Abdollahi Azgomi:
On the impacts of join and leave on the propagation ratio of topology-aware active worms. 209-214
Position papers
- Valeriy O. Osipyan:
Different models of information protection system, based on the functional knapsack. 215-218 - Suleyman Kondakci:
Obscurity of network security course curriculum. 219-222 - Manuel Peralta, Supratik Mukhopadhyay, Ramesh Bharadwaj:
Counterfactually reasoning about security. 223-226
Short papers
- Manoj Singh Gaur, Vijay Laxmi, Lakshminarayanan V., Kamal Cahndra, Mark Zwolinski:
Acceleration of packet filtering using gpgpu. 227-230 - Boulares Ouchenne, Ousmane Koné:
Formal analysis of usage control policies. 231-234 - Haitham S. Al-Sinani, Chris J. Mitchell:
Extending the Scope of cardspace. 235-238 - Amine Elabidi, Ghazi Ben Ayed, Sonia Mettali Gammar, Farouk Kamoun:
Towards hiding federated digital identity: stop-dissemination mechanism in content-centric networking. 239-242 - Hosnieh Rafiee, Ahmad AlSa'deh, Christoph Meinel:
WinSEND: Windows SEcure Neighbor Discovery. 243-246 - Liang Ming, Minhuan Huang, Dongxia Wang, Xiaohui Kuang, Chunlei Wang, Xuewei Feng:
Research on survivability metrics based on survivable process of network system. 247-250 - Geong Sen Poh, Muhammad Reza Z'aba:
On the security and practicality of a buyer seller watermarking protocol for DRM. 251-254 - Zhaogong Guo, Kouichi Yasaki, Yousuke Nakamura, Kazuaki Nimura, Isamu Yamada:
Proposal and implementation of enhanced HDD authentication that enables self-wipe. 255-258 - Atilla Elçi, Behnam Rahnama, Reza Makvandi:
Microcontroller-based implementation of parsekey+ for limited resources embedded applications. 259-262
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.