The Community for Technology Leaders
IEEE Workshop on Secure Network Protocols (2005)
Boston, MA, USA
Nov. 6, 2005 to Nov. 6, 2005
ISBN: 0-7803-9427-5
TABLE OF CONTENTS
Papers

Committees (PDF)

pp. v

L3A: a protocol for layer three accounting (Abstract)

A. Goodloe , Pennsylvania Univ., Philadelphia, PA, USA
G. Shah , Pennsylvania Univ., Philadelphia, PA, USA
M. Jacobs , Pennsylvania Univ., Philadelphia, PA, USA
pp. 1-6

Mitigating DoS attack through selective bin verification (Abstract)

M. Sherr , Sch. of Eng.&Appl. Sci., Pennsylvania Univ., Philadelphia, PA, USA
pp. 7-12

On design tradeoffs between security and performance in wireless group communicating systems (Abstract)

null Jin-Hee Cho , Dept. of Comput. Sci., Virginia Tech, VA, USA
null Ing-Ray Chen , Dept. of Comput. Sci., Virginia Tech, VA, USA
pp. 13-18

Detecting and filtering instant messaging spam - a global and personalized approach (Abstract)

null Weili Lin , Dept. of Comput. Sci.&Eng., Ohio State Univ., Columbus, OH, USA
D. Lee , Dept. of Comput. Sci.&Eng., Ohio State Univ., Columbus, OH, USA
null Na Li , Dept. of Comput. Sci.&Eng., Ohio State Univ., Columbus, OH, USA
null Zhijun Liu , Dept. of Comput. Sci.&Eng., Ohio State Univ., Columbus, OH, USA
pp. 19-24

Analysis of IPSec overheads for VPN servers (Abstract)

M. Gupta , Dept. of Comput. Sci., Indiana Univ., Bloomington, IN, USA
null Youngsang Shin , Dept. of Comput. Sci., Indiana Univ., Bloomington, IN, USA
null Craig Shue , Dept. of Comput. Sci., Indiana Univ., Bloomington, IN, USA
null Jong Youl Choi , Dept. of Comput. Sci., Indiana Univ., Bloomington, IN, USA
pp. 25-30

Practical security for disconnected nodes (Abstract)

S. Keshav , Sch. of Comput. Sci., Waterloo Univ., Ont., Canada
A. Seth , Sch. of Comput. Sci., Waterloo Univ., Ont., Canada
pp. 31-36

Achieving K-anonymity in mobile ad hoc networks (Abstract)

null Xiaoxin Wu , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
E. Bertino , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
pp. 37-42

Identity theft protection in structured overlays (Abstract)

L. Ganesh , Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA
B.Y. Zhao , Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA
pp. 49-54

An effective intrusion detection approach for OLSR MANET protocol (Abstract)

L. Lamont , Commun. Res. Centre, Ottawa, Ont., Canada
M. Wang , Commun. Res. Centre, Ottawa, Ont., Canada
pp. 55-60

Policy segmentation for intelligent firewall testing (Abstract)

null Adel El-Atawy , Sch. of Comput. Sci., Telecommun.,&Inf. Syst., DePaul Univ., Chicago, IL, USA
K. Ibrahim , Sch. of Comput. Sci., Telecommun.,&Inf. Syst., DePaul Univ., Chicago, IL, USA
H. Hamed , Sch. of Comput. Sci., Telecommun.,&Inf. Syst., DePaul Univ., Chicago, IL, USA
null Ehab Al-Shaer , Sch. of Comput. Sci., Telecommun.,&Inf. Syst., DePaul Univ., Chicago, IL, USA
pp. 67-72

A distributed reputation approach to cooperative Internet routing protection (Abstract)

E.W. Felten , Princeton Univ., NJ, USA
null Harlan Yu , Princeton Univ., NJ, USA
J. Rexford , Princeton Univ., NJ, USA
pp. 73-78

Author index (PDF)

pp. 79
105 ms
(Ver )