|
COMMUNICATION
SECURITY SYMPOSIUM
|
|
Symposium
Chair: Victor K. Wei, CUHK, Hong Kong
Vice-chair: Yile Guo, Nokia, USA
Tuesday, 2:00 pm - 5:00 pm
Session SC-1 Room C3
"Denial-of-Service Attacks"
SC1-1
Analysis of Denial-of-Service Attacks on Denial-of-Service Defensive
Measures
Bao-Tung Wang, Henning Schulzrinne, Columbia University, USA
SC1-2
Design of Detection System against the Denial of Service Attack
in 3G1x System
Junghun Park, Fang Liu, C.-C. Jay Kuo, University of Southern California,
USA
SC1-3
On the Effectiveness of Martian Address Filtering and Its Extensions
Hyogon Kim, Inhye Kang, University of Seoul, Korea
SC1-4
An Efficient Filter for Denial-of-Service Bandwidth Attacks
Samuel Abdelsayed, David Glimsholt, Christopher Leckie, The University
of Melbourne, Australia, Simon Ryan, Telstra Research Laboratories,
Australia, Samer Shami, The University of Melbourne, Australia
SC1-5
Detecting Reflector Attacks by Sharing Beliefs
Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao, The University
of Melbourne, Australia
SC1-6
Defeating Distributed Denial-of-Service Attack with Deterministic
Bit Marking
Yoohwan Kim, Case Western Reserve University, USA, Ju-Yeon Jo, California
State University, Sacramento, USA, Frank L. Merat, Case Western Reserve
University, USA
SC1-7
Reducing the Scope of Denial of Service Attacks in QoS Routing
Munirul Islam, Johnson Thomas, Oklahoma State University, USA, Vijay
Varadharajan, Macquerie University, Australia
SC1-8
Accommodating Fragmentation in Deterministic Packet Marking for
IP Traceback
Andrey Belenky, Nirwan Ansari, NJIT, USA
Wednesday, 9:00 am - 12:00 pm
Session SC-2 Room C3
"Authentication"
SC2-1
RBWA: An Efficient Random-Bit Window-based Authentication Protocol
Fan Zhao, Yongjoo Shin, S. Felix Wu, University of California, Davis,
USA, Henric Johnson, Arne Nilsson, Blekinge Institute of Technology,
Sweden
SC2-2
A Lightweight Authentication Protocol for Access Control in IEEE
802.11
Haoli Wang, Aravind Velayutham, Yong Guan, Iowa State University,
USA
SC2-3
Mutual Authentication Method for Ubiquitous Service Environments
Minoru Matsumoto, Yasushi Takagi, Nippon Telegraph and Telephone Corporation,
Japan
SC2-4
A Certified E-Mail Protocol Suitable for Mobile Environments
Jung Min Park, Purdue University, USA, Indrajit Ray, Edwin K. P. Chong,
Howard Jay Siegel, Colorado State University, USA
SC2-5
Wireless Authentication in Chi-Spaces
Federico Crazzolara, Colorado State University, USA
SC2-6
Pre-Loaded Key Based Multicast and Broadcast Authentication in
Mobile Ad-Hoc Networks
Mahalingam Ramkumar, Mississippi State University, USA, Nasir Memon,
Polytechnic University, USA
SC2-7
Authentication and Payment Protocol Preserving Location Privacy in
Mobile IP
SuGil Choi, Kwangjo Kim, Information and Communications University,
Korea
SC2-8
A Secure Public Wireless LAN Access Technique that Supports Walk-up
Users
Hui Luo, Paul Henry, AT&T Labs, USA
Wednesday, 2:00 pm - 5:00 pm
Session SC-3 Room C3
"Wireless Security and Intrusion Detection"
SC3-1
Demonstrating Vulnerabilities in Bluetooth Security
Creighton T. Hager, Scott F. Midkiff, Virginia Polytechnic Institute
and State University, USA
SC3-2
Security Algorithms in Wireless LAN: Proprietary or non-Proprietary
Ali Bakirdan, Jihad Qaddour, Imran Khan Jalozie, Illinois State University,
USA
SC3-3
An Energy-efficient Approach to Securing Tree-zone-based Sensor
Networks
Fei Hu, Jason Tillett, Jim Ziobro, Rochester Institute of Technology,
USA, Neeraj K. Sharma, Intel Corporation, USA
SC3-4
A Witness-based Approach for Data Fusion Assurance in Wireless
Sensor Networks
Wenliang Du, Jing Deng, Syracuse University, USA, Yunghsiang S. Han,
National Chi Nan University, Korea, Pramod K. Varshney, Syracuse University,
USA
SC3-5
High-Speed ECC based Kerberos Authentication Protocol for Wireless
Applications
Ozkan M. Erdem, Oregon State University, USA
SC3-6
Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless
LANs
P. Prasithsangaree, P. Krishnamurthy, University of Pittsburgh, USA
SC3-7
Detection of Invalid Routing Announcements in RIP Protocol
Dan Pei, UCLA. USA, Dan Massey, USC/Information Sciences Institute,
USA, Lixia Zhang, UCLA. USA
SC3-8
Profiling Cyber Attacks using Alert Regression Profiles
Phoung Yarng, Pradeep K. Ray, University of New South Wales, Australia,
Danny Maher, Netstar Networks, Australia
Thursday, 9:00 am - 12:00 pm
Session SC-4 Room C3
"Group Key Management & Encryption"
SC4-1
Increasing the Robustness of Initial Key Agreement using Failure
Detectors
H. Seba, A. Bouabdallah, Université de Technologie de Compiègne,
France, N. Badache, USTHB, Algeria
SC4-2
Securing Dynamic Group Membership Information over Multicast: Attacks
and Immunization
Yan Sun, K. J. Ray Liu, University of Maryland, USA
SC4-3
Topology-aware Key Management Schemes for Wireless Multicast
Yan Sun, University of Maryland, USA, Wade Trappe, Rutgers University,
USA, K. J. Ray Liu, University of Maryland, USA
SC4-4
Mykil: A Highly Scalable Key Distribution Protocol for Large Group
Multicast
Jyh-How Huang, Shivakant Mishra, University of Colorado, USA
SC4-5
ISAKMP Handshake for SSL/TLS
Ibrahim Hajjeh, Ahmed Serhrouchni, Ecole Nationale Supérieure
des Télécommunications, France, Frédérique
Tastet, Thales Communications, France
SC4-6
An Improved Personal CA for Personal Area Networks
Robert H. Deng, Institute for Infocomm Research, Singapore, Feng Bao,
Institute for Infocomm Research, Singapore
SC4-7
Simple and Efficient Threshold Cryptosystem from the Gap Diffie-Hellman
Group
Joonsang Baek, Monash University, Australia, Yuliang Zheng, UNC Charlotte,
USA
Thursday, 2:00 pm - 5:00 pm
Session SC-5 Room C3
"Security Protocols & Architecture"
SC5-1
CITADEL: A Content Protection Architecture for Decentralized Peer-to-Peer
File Sharing Systems
Paul Judge, Mostafa Ammar, Georgia Institute of Technology, USA
SC5-2
The Freiburg Privacy DiamondA Conceptual Model for Mobility
in Anonymity Mechanisms
Alf Zugenmaier, Microsoft Research, UK
SC5-3
High-Level Specification of Security Systems
Javier López, Juan J. Ortega, José M. Troya, University
of Malaga, Spain, José Vivas, Hewlett Packard Labs, UK
SC5-4
Bootstrapping Security Associations for Routing in Mobile Ad-Hoc
Networks
Rakesh Babu Bobba, Laurent Eschenauer, Virgil Gligor, William Arbaugh,
University of Maryland, USA
SC5-5
An Adaptive Security Model for Mobile Agents in Wireless Networks
Sathish P. Alampalayam, Anup Kumar, University of Louisville, USA
SC05-6
Security Scenarios within IP-based Mobile Multimedia Metropolitan
Area Network
Liang Zhang, Gaute Lambertsen, Takahiko Yamada, Ritsumeikan University,
Japan
SC5-7
Security Mechanisms for Wireless Home Network
Jianwei Zhuge, Peking University, China, Richard Yao, Microsoft Research
Asia, China
SC5-8
IP Mobility Support for IPsec-based Virtual Private Networks: An
Architectural Solution
Matteo Berioli, Francesco Trotta, German Aerospace Center, Germany
|
|