did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642052835

Security and Privacy in Communication Networks: 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers

by ; ;
  • ISBN13:

    9783642052835

  • ISBN10:

    3642052835

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2009-11-15
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $139.00 Save up to $120.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece.The 19 revised full papers and 7 revised short papers were carefully reviewed and selected from 76 submissions.The papers cover various topics such as wireless network security, network intrusion detection, security and privacy for the general internet, malware and misbehavior, sensor networks, key management, credentials and authentications, as well as secure multicast and emerging technologies.

Table of Contents

Wireless Network Security I
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messagesp. 1
FIJI: Fighting Implicit Jamming in 802.11 WLANsp. 21
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networksp. 41
Network Intrusion Detection
Baiting Inside Attackers Using Decoy Documentsp. 51
MULAN: Multi-Level Adaptive Network Filterp. 71
Automated Classification of Network Traffic Anomaliesp. 91
Security and Privacy for the General Internet
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Netsp. 101
On the Security of Bottleneck Bandwidth Estimation Techniquesp. 121
An Eavesdropping Game with SINR as an Objective Functionp. 142
Malware and Misbehavior
Ensemble: Community-Based Anomaly Detection for Popular Applicationsp. 163
Using Failure Information Analysis to Detect Enterprise Zombiesp. 185
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Gamesp. 207
Wireless Network Security II, Sensor Networks
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networksp. 228
Aggregated Authentication (AMAC) Using Universal Hash Functionsp. 248
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSNp. 265
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networksp. 285
Key Management, Credentials, Authentications
User-Centric Identity Using ePassportsp. 296
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systemsp. 311
Breaking and Building of Group Inside Signaturep. 330
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resourcesp. 340
Wireless Network Security III
Self-organized Anonymous Authentication in Mobile Ad Hoc Networksp. 350
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasuresp. 373
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MACp. 394
Secure Multicast, Emerging Technologies
A Novel Architecture for Secure and Scalable Multicast over IP Networkp. 417
Reliable Resource Searching in P2P Networksp. 437
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systemsp. 448
Author Indexp. 459
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program