default search action
3rd CNS 2015: Florence, Italy
- 2015 IEEE Conference on Communications and Network Security, CNS 2015, Florence, Italy, September 28-30, 2015. IEEE 2015, ISBN 978-1-4673-7876-5
- Derrick Wing Kwan Ng, Yan Sun, Robert Schober:
Power efficient and secure full-duplex wireless communication systems. 1-6 - Yanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, Jie Yang:
Critical segment based real-time E-signature for securing mobile transactions. 7-15 - Carsten Rudolf Janda, Moritz Wiese, Janis Nötzel, Holger Boche, Eduard A. Jorswieck:
Wiretap-channels under constrained active and passive attacks. 16-21 - Xihui Chen, Andrzej Mizera, Jun Pang:
Activity tracking: A new attack on location privacy. 22-30 - Jingyao Fan, Qinghua Li, Guohong Cao:
Privacy-aware and trustworthy data aggregation in mobile sensing. 31-39 - Paul Cuff:
A stronger soft-covering lemma and applications. 40-43 - Changmin Lee, Chen Shen, Gokhan Sahin, Kwanghee Choi, Hyeong-Ah Choi:
A novel and scalable communication-history-based Knapsack authentication framework for IEEE 802.11 networks. 44-52 - Ronit Bustin, Rafael F. Schaefer, H. Vincent Poor, Shlomo Shamai:
An I-MMSE based graphical representation of rate and equivocation for the Gaussian broadcast channel. 53-58 - Somayeh Salimi, Eduard A. Jorswieck, Mikael Skoglund, Panos Papadimitratos:
Key agreement over an interference channel with noiseless feedback: Achievable region & distributed allocation. 59-64 - Daisuke Moriyama, Moti Yung:
The bright side arguments for the coming smartphones crypto war: The added value of device encryption. 65-73 - Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi Vincenzo Mancini:
Boten ELISA: A novel approach for botnet C&C in Online Social Networks. 74-82 - Kittipong Kittichokechai, Giuseppe Caire:
Optimal tradeoff of secure PUF-based authentication. 83-88 - Onur Günlü, Gerhard Kramer, Maciej Skorski:
Privacy and secrecy with multiple measurements of physical and biometric identifiers. 89-94 - Sridhar Venkatesan, Massimiliano Albanese, Sushil Jajodia:
Disrupting stealthy botnets through strategic placement of detectors. 95-103 - Han Zhang, Christos Papadopoulos:
Early detection of high entropy traffic. 104-112 - Cornelius Saiki, Arsenia Chorti:
A novel physical layer authenticated encryption protocol exploiting shared randomness. 113-118 - Stefano Tomasin:
A Gale-Shapley algorithm for allocation of relayed parallel wiretap coding channels. 119-124 - Hesham Mekky, Aziz Mohaisen, Zhi-Li Zhang:
Separation of benign and malicious network events for accurate malware family classification. 125-133 - Dmitri Bekerman, Bracha Shapira, Lior Rokach, Ariel Bar:
Unknown malware detection using network traffic classification. 134-142 - Frederic Gabry, Ragnar Thobaben, Mikael Skoglund:
Secrecy games in cognitive radio networks with multiple secondary users. 143-148 - Rong Jin, Kai Zeng:
SecNFC: Securing inductively-coupled Near Field Communication at physical layer. 149-157 - Mohamed Haj Taieb, Jean-Yves Chouinard:
Reliable and secure communications over Gaussian wiretap channel using HARQ LDPC codes and error contamination. 158-163 - Yinzhi Cao, Xiang Pan, Yan Chen:
SafePay: Protecting against credit card forgery with existing magnetic card readers. 164-172 - Yufeng Wang, Waqas Latif, Chiu C. Tan, Yifan Zhang:
Security and privacy for body cameras used in law enforcement. 173-181 - Boyang Wang, Ming Li, Haitao Wang, Hui Li:
Circular range search on encrypted spatial data. 182-190 - Dilara Akdogan, Duygu Karaoglan Altop, Albert Levi:
Secure key agreement using pure biometrics. 191-199 - Bing Wang, Wenjing Lou, Y. Thomas Hou:
Modeling the side-channel attacks in data deduplication with game theory. 200-208 - Jiska Classen, Matthias Schulz, Matthias Hollick:
Practical covert channels for WiFi systems. 209-217 - Visal Chea, Miguel Vargas Martin, Ramiro Liscano:
Hamming distance as a metric for the detection of CRC-based side-channel communications in 802.11 wireless networks. 218-226 - Pradhumna Lal Shrestha, Michael Hempel, Fahimeh Rezaei, Hamid Sharif:
A novel analytical model and its test bed verification for network covert timing channels. 227-235 - Rennie Archibald, Dipak Ghosal:
Design and analysis of a model-based Covert Timing Channel for Skype traffic. 236-244 - Bocan Hu, Yan Zhang, Loukas Lazos:
PHYVOS: Physical layer voting for secure and fast cooperation. 245-253 - Rong Jin, Kai Zeng:
Physical layer key agreement under signal injection attacks. 254-262 - Sadegh Farhang, Yezekael Hayel, Quanyan Zhu:
PHY-layer location privacy-preserving access point selection mechanism in next-generation wireless networks. 263-271 - Yuksel Ozan Basciftci, Can Emre Koksal, Alexei E. Ashikhmin:
Securing massive MIMO at the physical layer. 272-280 - Pengwei Wang, Reihaneh Safavi-Naini:
Adversarial wiretap channel with public discussion. 281-289 - Andrew Fisher, Carson Kent, David Zage, John Jarocki:
Using linkography to understand cyberattacks. 290-298 - Chu Huang, Sencun Zhu, Quanlong Guan:
Multi-objective software assignment for active cyber defense. 299-307 - Michael C. Kotson, Alexia Schulz:
Characterizing phishing threats with Natural Language Processing. 308-316 - Massimiliano Albanese, Ermanno Battista, Sushil Jajodia:
A deception based approach for defeating OS and service fingerprinting. 317-325 - Jan-Ole Malchow, Daniel Marzin, Johannes Klick, Robert Kovacs, Volker Roth:
PLC Guard: A practical defense against attacks on cyber-physical systems. 326-334 - Daniel Steinmetzer, Joe Chen, Jiska Classen, Edward W. Knightly, Matthias Hollick:
Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves. 335-343 - Sebastian Bittl, Arturo A. Gonzalez, Matthias Myrtus, Hanno Beckmann, Stefan Sailer, Bernd Eissfeller:
Emerging attacks on VANET security based on GPS Time Spoofing. 344-352 - Majid Gerami, Ming Xiao, Somayeh Salimi, Mikael Skoglund:
Secure partial repair in wireless caching networks with broadcast channels. 353-360 - Liyang Zhang, Tommaso Melodia:
Hammer and anvil: The threat of a cross-layer jamming-aided data control attack in multihop wireless networks. 361-369 - Sang-Yoon Chang, Yih-Chun Hu, Zhuotao Liu:
Securing wireless medium access control against insider denial-of-service attackers. 370-378 - Nolen Scaife, Henry Carter, Patrick Traynor:
OnionDNS: A seizure-resistant top-level Domain. 379-387 - Rahul Hiran, Niklas Carlsson, Nahid Shahmehri:
Crowd-based detection of routing anomalies on the internet. 388-396 - Reuven Cohen, Raziel Hess-Green, Gabi Nakibly:
Small lies, lots of damage: a partition attack on link-state routing protocols. 397-405 - Pengkui Luo, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Sung-Ju Lee, Antonio Nucci, Marco Mellia:
Leveraging client-side DNS failure patterns to identify malicious behaviors. 406-414 - Laurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie, Eran Messeri:
Efficient gossip protocols for verifying the consistency of Certificate logs. 415-423 - Jinxue Zhang, Jingchao Sun, Rui Zhang, Yanchao Zhang:
Your actions tell where you are: Uncovering Twitter users in a metropolitan area. 424-432 - Qinglong Wang, Amir Yahyavi, Bettina Kemme, Wenbo He:
I know what you did on your smartphone: Inferring app usage over encrypted data traffic. 433-441 - Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Songwu Lu:
How voice call technology poses security threats in 4G LTE networks. 442-450 - Ruei-Hau Hsu, Jemin Lee:
Group anonymous D2D communication with end-to-end security in LTE-A. 451-459 - Muhammad Qasim Ali, Ayesha Binte Ashfaq, Ehab Al-Shaer, Qi Duan:
Towards a science of anomaly detection system evasion. 460-468 - Weijie Liu, Rakesh B. Bobba, Sibin Mohan, Roy H. Campbell:
Inter-flow consistency: A novel SDN update abstraction for supporting inter-flow constraints. 469-478 - Lei Yang, Fengjun Li:
mTor: A multipath Tor routing beyond bandwidth throttling. 479-487 - Guangchi Liu, Qing Yang, Honggang Wang, Shaoen Wu, Mike P. Wittie:
Uncovering the mystery of trust in an online social network. 488-496 - Whitney A. Drazen, Emmanuel Ekwedike, Rosario Gennaro:
Highly scalable verifiable encrypted search. 497-505 - Aida Calvino, Sara Ricci, Josep Domingo-Ferrer:
Privacy-preserving distributed statistical computation to a semi-honest multi-cloud. 506-514 - Riccardo Lazzeretti, Tommaso Pignata:
Privacy preserving cloud computing through piecewise approximation of multivariate functions. 515-523 - Johannes Klick, Stephan Lau, Daniel Marzin, Jan-Ole Malchow, Volker Roth:
Internet-facing PLCs as a network backdoor. 524-532 - Mats Näslund, Elena Dubrova, Göran Selander, Fredrik Lindqvist:
A random access procedure based on tunable puzzles. 533-540 - Simon N. Foley, Ultan Neville:
A firewall algebra for OpenStack. 541-549 - Andrei Costin:
All your cluster-grids are belong to us: Monitoring the (in)security of infrastructure monitoring systems. 550-558 - Massimiliano Mattetti, Alexandra Shulman-Peleg, Yair Allouche, Antonio Corradi, Shlomi Dolev, Luca Foschini:
Securing the infrastructure and the workloads of linux containers. 559-567 - Samson Yoseph Esayas, Tobias Mahler, Fredrik Seehusen, Frode Bjornstad, Veda Brubakk:
An integrated method for compliance and risk assessment. 568-576 - Matthias Carlier, Kris Steenhaut, An Braeken, Ruben Smeets, Nele Mentens, Kris Aerts:
Study on impact of adding security in a 6LoWPAN based network. 577-584 - Dare Abodunrin, Yoan Miche, Silke Holtmanns:
Some dangers from 2G networks legacy support and a possible mitigation. 585-593 - Kyprianos Papadimitriou, Polydoros Petrakis, Miltos D. Grammatikakis, Marcello Coppola:
Security Enhancements for building saturation-free, low-power NoC-based MPSoCs. 594-600 - Kanishka Ariyapala, Mauro Conti, Cristina M. Pinotti:
CaT: Evaluating cloud-aided TLS for smartphone energy efficiency. 601-609 - Santosh Chandrasekhar, Mukesh Singhal:
Efficient and scalable aggregate signcryption scheme based on multi-trapdoor hash functions. 610-618 - Monir Azraoui, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Publicly verifiable conjunctive keyword search in outsourced databases. 619-627 - Yao Chen, Guang Gong:
Integer arithmetic over ciphertext and homomorphic data aggregation. 628-632 - Ayantika Chatterjee, Indranil Sengupta:
Windowing technique for Lazy Sorting of Encrypted data. 633-637 - Quang Hieu Vu, Maurizio Colombo, Rasool Asal, Ali Sajjad, Fadi Ali El-Moussa, Theo Dimitrakos:
Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment. 638-642 - Antonio M. Ortiz, Erkuden Rios, Wissam Mallouli, Eider Iturbe, Edgardo Montes de Oca:
Self-protecting multi-cloud applications. 643-647 - Francesco Benedetto, Gaetano Giunta, Angelo Liguori, Arno Wacker:
A novel method for securing critical infrastructures by detecting hidden flows of data. 648-654 - Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran:
Verifiable and privacy-preserving fine-grained data-collection for smart metering. 655-658 - David Palma, Pier Luca Montessoro, Giulia Giordano, Franco Blanchini:
A dynamic algorithm for palmprint recognition. 659-662 - QianQian Li, Ding Ding, Mauro Conti:
Brain-Computer Interface applications: Security and privacy challenges. 663-666 - Angelo Liguori, Francesco Benedetto, Gaetano Giunta, Nils Kopal, Arno Wacker:
Analysis and monitoring of hidden TCP traffic based on an open-source covert timing channel. 667-674 - Gery Ducatel:
Identity as a service: A cloud based common capability. 675-679 - Luciano Barreto, Antonio Celesti, Massimo Villari, Maria Fazio, Antonio Puliafito:
Identity management in IoT Clouds: A FIWARE case of study. 680-684 - Huihui Yang, Vladimir A. Oleshchuk:
Traceable hierarchical attribute-based authentication for the cloud. 685-689 - José Luis Espinosa-Aranda, Noelia Vállez, Carlos Sanchez-Bueno, Daniel Aguado-Araujo, Gloria Bueno García, Oscar Déniz:
Pulga, a tiny open-source MQTT broker for flexible and secure IoT deployments. 690-694 - Chia-Nan Kao, Yung-Cheng Chang, Nen-Fu Huang, I. Salim S, I-Ju Liao, Rong-Tai Liu, Hsien-Wei Hung:
A predictive zero-day network defense using long-term port-scan recording. 695-696 - Jing Wang, Hongjun Wu:
URFDS: Systematic discovery of Unvalidated Redirects and Forwards in web applications. 697-698 - Emmanouil Vasilomanolakis, Michael Stahn, Carlos Garcia Cordero, Max Mühlhäuser:
Probe-response attacks on collaborative intrusion detection systems: Effectiveness and countermeasures. 699-700 - Alfonso Muñoz, Ignacio Martín, Antonio Guzmán, José Alberto Hernández:
Android malware detection from Google Play meta-data: Selection of important features. 701-702 - Stefan Rass, Peter Schartner:
Licensed processing of encrypted information. 703-704 - Sebastian Funke, Jörg Daubert, Alexander Wiesmaier, Panayotis Kikiras, Max Mühlhäuser:
End-2-End privacy architecture for IoT. 705-706 - Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk:
Generation and assessment of correlation rules to detect complex attack scenarios. 707-708 - Kai Wang, Yuqing Zhang, Qixu Liu, Dan Fan:
A fuzzing test for dynamic vulnerability detection on Android Binder mechanism. 709-710 - Pascal Urien:
New direction for open NFC trusted mobile applications: The MOBISIM project. 711-712 - Yisi Xu, Derek Chi-Wai Pao:
Space-time tradeoff in the Aho-Corasick string matching algorithm. 713-714 - Laura Mutu, Rania Saleh, Ashraf Matrawy:
Improved SDN responsiveness to UDP flood attacks. 715-716 - Vahid Forutan, Robert F. H. Fischer:
Security-enhanced network coding through public-key cryptography. 717-718 - Marwen Zorgui, Zouheir Rezki, Basel Alomair, Eduard A. Jorswieck, Mohamed-Slim Alouini:
Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regime. 719-720 - Dijana Vukovic, Danilo Gligoroski, Zoran Djuric:
CryptoCloak protocol and the prototype application. 721-722 - Antonio Barili, Dario Lanterna:
On the effects of large-scale DNS Poisoning. 723-724 - Félix J. García Clemente:
A privacy-preserving recommender system for mobile commerce. 725-726 - Zhaoguo Wang, Chenglong Li, Yi Guan, Yibo Xue:
DroidChain: A novel malware detection method for Android based on behavior chain. 727-728 - Emmanouil Vasilomanolakis, Shreyas Srinivasa, Max Mühlhäuser:
Did you really hack a nuclear power plant? An industrial control mobile honeypot. 729-730 - Leon Bock, Shankar Karuppayah, Tim Grube, Max Mühlhäuser, Mathias Fischer:
Hide and seek: Detecting sensors in P2P botnets. 731-732 - Kevin Benton, L. Jean Camp, Timothy Kelley, Martin Swany:
Filtering IP source spoofing using feasible path reverse path forwarding with SDN. 733-734 - Jan-Ole Malchow, Volker Roth:
CryptID - distributed identity management infrastructure. 735-736 - Fahimeh Rezaei, Michael Hempel, Pradhumna Lai Shrestha, Sushanta Mohan Rakshit, Hamid Sharif:
A novel Covert Timing Channel detection approach for online network traffic. 737-738 - Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Nikolay Milanov, Christian Koch, David Hausheer, Max Mühlhäuser:
ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems. 739-740 - Alessandro Armando, Silvio Ranise, Riccardo Traverso, Konrad S. Wrona:
Compiling NATO authorization policies for enforcement in the cloud and SDNs. 741-742 - SeokHwan Choi, Da-Hyeon Kim, Yoon-Ho Choi:
Timely login status control using mobile app. 743-744 - Lei Yang, Fengjun Li:
Enhancing traffic analysis resistance for Tor hidden services with multipath routing. 745-746 - Simone Mutti, Enrico Bacis, Stefano Paraboschi:
An SELinux-based intent manager for Android. 747-748 - Enrico Bacis, Simone Mutti, Steven Capelli, Stefano Paraboschi:
DockerPolicyModules: Mandatory Access Control for Docker containers. 749-750 - Sebastian Seeber, Lars Stiemert, Gabi Dreo Rodosek:
Towards an SDN-enabled IDS environment. 751-752 - Frederic Gabry, Pin-Hsun Lin, Eduard A. Jorswieck:
Energy efficiency performance of cooperative schemes in cognitive radio networks with secrecy. 753-754 - Basheer Al-Duwairi, Ahmad T. Al-Hammouri, Monther Aldwairi, Vern Paxson:
GFlux: A google-based system for Fast Flux detection. 755-756 - Y. Yang, Natalija Vlajic, Uyen Trang Nguyen:
Web bots that mimic human browsing behavior on previously unvisited web-sites: Feasibility study and security implications. 757-758 - Maurizio Naldi, Giuseppe D'Acquisto:
Option pricing in a privacy-aware market. 759-760 - Ying He, Leandros A. Maglaras, Helge Janicke, Kevin I. Jones:
An Industrial Control Systems incident response decision framework. 761-762 - Waqas A. Latif, Chiu C. Tan:
SmartArgos: Improving mobile surveillance systems with software defined networks. 763-764 - Gokcan Cantali, Orhan Ermis, Gürkan Gür, Fatih Alagöz, M. Ufuk Çaglayan:
Lightweight context-aware security system for wireless Internet access. 765-766 - Sara Foresti, Vincenzo Piuri, Gerson Antunes Soares:
On the use of fuzzy logic in dependable cloud management. 767-768 - Mustafa Aydin, Nazife Baykal:
Feature extraction and classification phishing websites based on URL. 769-770 - Meryeme Ayache, Mohammed Erradi, Bernd Freisleben:
curlX: A middleware to enforce access control policies within a cloud environment. 771-772 - Xingliang Yuan, Xinyu Wang, Yilei Chu, Cong Wang, Chen Qian:
Towards a scalable, private, and searchable key-value store. 773-774
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.