The Community for Technology Leaders
IEEE Workshop on Secure Network Protocols (2008)
Orlando, FL USA
Oct. 19, 2008 to Oct. 19, 2008
ISBN: 978-1-4244-2651-5
TABLE OF CONTENTS

Authentication by name or by registration (PDF)

Mohamed G. Gouda , Department of Computer Sciences, The University of Texas at Austin, USA
pp. 1-2

Limiting replay vulnerabilities in DNSSEC (PDF)

He Yan , Colorado State University, USA
Eric Osterweil , UCLA, USA
Jon Hajdu , Colorado State University, USA
Jonas Acres , Colorado State University, USA
Dan Massey , Colorado State University, USA
pp. 3-8

The case for network witnesses (PDF)

Wu-chang Feng , Portland State University, USA
Travis Schluessler , Portland State University, USA
pp. 9-14

Improving anonymity using social links (PDF)

Krishna P. N. Puttaswamy , Computer Science Department, U. C. Santa Barbara, USA
Alessandra Sala , Computer Science Department, U. C. Santa Barbara, USA
Ben Y. Zhao , Computer Science Department, U. C. Santa Barbara, USA
pp. 15-20

Enabling authentic transmissions in WSNs — turning jamming against the attacker (PDF)

Adam Bachorek , disco | Distributed Computer Systems Lab, University of Kaiserslautern, Germany
Ivan Martinovic , disco | Distributed Computer Systems Lab, University of Kaiserslautern, Germany
Jens B. Schmitt , disco | Distributed Computer Systems Lab, University of Kaiserslautern, Germany
pp. 21-26

Server based PMK generation with identity protection for wireless networks (PDF)

Qi Duan , Department of Computer Science and Engineering, University at Buffalo, USA
Mohit Virendra , Department of Computer Science and Engineering, University at Buffalo, USA
pp. 27-32

Toward secure network coding in wireless networks: Threats and challenges (PDF)

Jing Dong , Department of Computer Science, Purdue University, USA
Reza Curtmola , Department of Computer Science, Purdue University, USA
Ruben Sethi , Department of Computer Science, Purdue University, USA
Cristina Nita-Rotaru , Department of Computer Science, Purdue University, USA
pp. 33-38

Attribute-based content distribution with hidden policy (PDF)

Shucheng Yu , Department of ECE, Worcester Polytechnic Institute, MA 01609, USA
Kui Ren , Department of ECE, Illinois Institute of Technology, 60616, USA
Wenjing Lou , Department of ECE, Worcester Polytechnic Institute, MA 01609, USA
pp. 39-44

Building accountability into the future Internet (PDF)

Jelena Mirkovic , Information Sciences Institute, University of Southern California, 4676 Admiralty Way Ste 1001, Marina Del Rey, 90292, USA
Peter Reiher , Computer Science Department, University of California Los Angeles, 3564 Boelter Hall, 90025, USA
pp. 45-51

IEEE copyright form (Abstract)

pp. vi-vii

IEEE copyright form (PDF)

pp. xi-xii

IEEE copyright form (PDF)

pp. xiv-xv
96 ms
(Ver 3.3 (11022016))