


default search action
4th SIN 2011: Sydney, NSW, Australia
- Mehmet A. Orgun, Atilla Elçi, Oleg B. Makarevich, Sorin A. Huss, Josef Pieprzyk, Lyudmila K. Babenko, Alexander G. Chefranov, Rajan Shankaran:

Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. ACM 2011, ISBN 978-1-4503-1020-8
Keynote talks
- Kevin A. Kwiat:

Fault tolerance for fight-through: a basis for strategic survival. 1-2 - Vijay Varadharajan:

Rethinking cyber security. 3-4
Regular papers
- Andrew Z. Tirkel

, Thomas E. Hall, Charles F. Osborne, Nicholas Meinhold, Oscar Moreno:
Collusion resistant fingerprinting of digital audio. 5-12 - Mohamed Nassar

, Sylvain Martin, Guy Leduc, Olivier Festor:
Using decision trees for generating adaptive SPIT signatures. 13-20 - Martin Ågren, Martin Hell

:
Cryptanalysis of the stream cipher BEAN. 21-28 - Evgeny Sergeevich Abramov, Artem Viktorovich Andreev, Denis Valerievich Mordvin, Oleg B. Makarevich

:
Corporate networks security evaluation based on attack graphs. 29-36 - Iynkaran Natgunanathan, Yong Xiang:

Echo hiding based stereo audio watermarking against pitch-scaling attacks. 37-42 - Shu-guang Dai, Chun-Ming Tang, Yuenai Chen:

The optimal linear multi-secret sharing scheme for non-threshold access structure(student contribution). 43-48 - Long Hoang Nguyen:

Rational distance-bounding protocols over noisy channel. 49-56 - Ludmila K. Babenko

, Evgeniya Ishchukova, Ekaterina Maro
:
Algebraic analysis of GOST encryption algorithm. 57-62 - Alessandro Barenghi

, Guido Marco Bertoni
, Luca Breveglieri
, Gerardo Pelosi
, Andrea Palomba:
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults. 63-72 - Shameek Bhattacharjee

, Saptarshi Debroy, Mainak Chatterjee, Kevin A. Kwiat:
Trust based fusion over noisy channels through anomaly detection in cognitive radio networks. 73-80 - Michio Sonoda, Takeshi Matsuda, Daiki Koizumi

, Shigeichi Hirasawa:
On automatic detection of SQL injection attacks by the feature extraction of the single character. 81-86 - Chun Ruan, Seyed A. Shahrestani

:
Logic based authorization program and its implementation. 87-94 - Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert:

Security analysis of a femtocell device. 95-102 - Anderson Nunes Paiva Morais, Ana R. Cavalli

, Eliane Martins:
A model-based attack injection approach for security validation. 103-110 - Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi

:
Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol. 111-118 - Udaya Kiran Tupakula, Vijay Varadharajan

, Sunil Kumar Vuppala:
Counteracting DDoS attacks in WLAN. 119-126 - Helena Rifà-Pous

, Carles Garrigues
:
A secure and anonymous cooperative sensing protocol for cognitive radio networks. 127-132 - William Huba, Bo Yuan, Daryl Johnson, Peter Lutz:

A HTTP cookie covert channel. 133-136 - Manoj Singh Gaur, Vijay Laxmi

, Manish Kumar, Rajbir Kaur
:
Detour attack in OLSR. 137-142 - Haichang Gao, Licheng Ma, Jinhua Qiu, Xiyang Liu:

Exploration of a hand-based graphical password scheme. 143-150 - Jyoti Grover

, Manoj Singh Gaur, Vijay Laxmi
, Nitesh Kumar Prajapati:
A sybil attack detection approach using neighboring vehicles in VANET. 151-158 - Liang Cheng, Yang Zhang:

Model checking security policy model using both UML static and dynamic diagrams. 159-166 - Wei-Kuo Chiang

, Jian-Hao Chen:
TW-KEAP: an efficient four-party key exchange protocol for end-to-end communications. 167-174 - Giuseppe Lo Re

, Fabrizio Milazzo
, Marco Ortolani
:
Secure random number generation in wireless sensor networks. 175-182 - Bogdan Korel, Shangping Ren, Kevin A. Kwiat, Arnaud Auguste, Alban Vignaux:

Improving operation time bounded mission critical systems' attack-survivability through controlled source-code transformation. 183-190 - Mufeed Juma AlMashrafi:

A different algebraic analysis of the ZUC stream cipher. 191-198
Student papers
- Mufeed Juma AlMashrafi, Kenneth Koon-Ho Wong

, Leonie Simpson
, Harry Bartlett
, Ed Dawson
:
Algebraic analysis of the SSS stream cipher. 199-204 - Mahmoud Elkhodr

, Seyed A. Shahrestani
, Hon Cheung:
An approach to enhance the security of remote health monitoring systems. 205-208 - Ahmad Jafarabadi, Mohammad Abdollahi Azgomi

:
On the impacts of join and leave on the propagation ratio of topology-aware active worms. 209-214
Position papers
- Valeriy O. Osipyan:

Different models of information protection system, based on the functional knapsack. 215-218 - Suleyman Kondakci

:
Obscurity of network security course curriculum. 219-222 - Manuel Peralta, Supratik Mukhopadhyay, Ramesh Bharadwaj:

Counterfactually reasoning about security. 223-226
Short papers
- Manoj Singh Gaur, Vijay Laxmi

, Lakshminarayanan V., Kamal Cahndra, Mark Zwolinski
:
Acceleration of packet filtering using gpgpu. 227-230 - Boulares Ouchenne, Ousmane Koné:

Formal analysis of usage control policies. 231-234 - Haitham S. Al-Sinani, Chris J. Mitchell

:
Extending the Scope of cardspace. 235-238 - Amine Elabidi, Ghazi Ben Ayed, Sonia Mettali Gammar

, Farouk Kamoun
:
Towards hiding federated digital identity: stop-dissemination mechanism in content-centric networking. 239-242 - Hosnieh Rafiee, Ahmad AlSa'deh

, Christoph Meinel:
WinSEND: Windows SEcure Neighbor Discovery. 243-246 - Liang Ming, Minhuan Huang, Dongxia Wang, Xiaohui Kuang, Chunlei Wang, Xuewei Feng:

Research on survivability metrics based on survivable process of network system. 247-250 - Geong Sen Poh, Muhammad Reza Z'aba:

On the security and practicality of a buyer seller watermarking protocol for DRM. 251-254 - Zhaogong Guo, Kouichi Yasaki, Yousuke Nakamura, Kazuaki Nimura, Isamu Yamada:

Proposal and implementation of enhanced HDD authentication that enables self-wipe. 255-258 - Atilla Elçi, Behnam Rahnama, Reza Makvandi:

Microcontroller-based implementation of parsekey+ for limited resources embedded applications. 259-262

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














