4. ASIACCS 2009:
Sydney,
Australia
Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan (Eds.):
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009.
ACM 2009, ISBN 978-1-60558-394-5 BibTeX
Keynote
Network security-I
- Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani:
Automatic discovery of botnet communities on large-scale communication networks.
1-10
Electronic Edition (ACM DL) BibTeX
- Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson:
Automating analysis of large-scale botnet probing events.
11-22
Electronic Edition (ACM DL) BibTeX
- Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim:
Towards complete node enumeration in a peer-to-peer botnet.
23-34
Electronic Edition (ACM DL) BibTeX
Software security
Network security-II
- Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui Yang, Xuxian Jiang:
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers.
61-69
Electronic Edition (ACM DL) BibTeX
- Rui Zhang, Goichiro Hanaoka, Hideki Imai:
A generic construction of useful client puzzles.
70-79
Electronic Edition (ACM DL) BibTeX
- Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis:
An integrated approach to detection of fast and slow scanning worms.
80-91
Electronic Edition (ACM DL) BibTeX
- Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated wireless roaming via tunnels: making mobile guests feel at home.
92-103
Electronic Edition (ACM DL) BibTeX
Systems security
Crypto protocols
Theory of security
Anonymity and privacy
Access control
- Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil C. Lupu, Arosha Bandara:
Expressive policy analysis with enhanced system dynamicity.
239-250
Electronic Edition (ACM DL) BibTeX
- Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain, Yehia Elrakaiby:
Semantic context aware security policy deployment.
251-261
Electronic Edition (ACM DL) BibTeX
- Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, Farhana Ashraf:
PBES: a policy based encryption system with application to data sharing in the power grid.
262-275
Electronic Edition (ACM DL) BibTeX
- Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao:
Attribute based proxy re-encryption with delegating capabilities.
276-286
Electronic Edition (ACM DL) BibTeX
Security policies and verification
Public key and hash functions
Short papers-I
- Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin:
Logging key assurance indicators in business processes.
364-367
Electronic Edition (ACM DL) BibTeX
- Zhiguo Wan, Kui Ren, Bo Zhu, Bart Preneel, Ming Gu:
Anonymous user communication for privacy protection in wireless metropolitan mesh networks.
368-371
Electronic Edition (ACM DL) BibTeX
- Ribao Wei, Dingfeng Ye:
Delegate predicate encryption and its application to anonymous authentication.
372-375
Electronic Edition (ACM DL) BibTeX
- Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee:
Improved searchable public key encryption with designated tester.
376-379
Electronic Edition (ACM DL) BibTeX
Short papers-II
Copyright © Sat May 16 23:00:54 2009
by Michael Ley (ley@uni-trier.de)