The Community for Technology Leaders
IEEE Workshop on Secure Network Protocols (2010)
Kyoto Japan
Oct. 5, 2010 to Oct. 5, 2010
ISBN: 978-1-4244-8916-9
TABLE OF CONTENTS

SUDOKU: Secure and usable deployment of keys on wireless sensors (PDF)

Matthias Wilhelm , disco | Distributed Computer Systems Lab, TU Kaiserslautern, Germany
Ivan Martinovic , disco | Distributed Computer Systems Lab, TU Kaiserslautern, Germany
Ersin Uzun , Computer Science Department, University of California, Irvine, United States
Jens B. Schmitt , disco | Distributed Computer Systems Lab, TU Kaiserslautern, Germany
pp. 1-6

Dynamic key management for secure continuous handoff in wireless LAN (PDF)

Manop Kalong , Faculty of Information and Communication Technology Mahidol University Rama 6 Road, Bangkok 10400, Thailand
Sudsanguan Ngamsuriyaroj , Faculty of Information and Communication Technology Mahidol University Rama 6 Road, Bangkok 10400, Thailand
Vasaka Visoottiviseth , Faculty of Information and Communication Technology Mahidol University Rama 6 Road, Bangkok 10400, Thailand
pp. 7-12

APRAP: Another privacy preserving RFID authentication protocol (PDF)

Atsuko Miyaji , School of Information Science, Japan Advanced Institute of Science and Technology, 1-1 Asahidai, Nomi, Ishikawa, Japan
Mohammad Shahriar Rahman , School of Information Science, Japan Advanced Institute of Science and Technology, 1-1 Asahidai, Nomi, Ishikawa, Japan
pp. 13-18

Analyzing failures and attacks in Map & Encap protocols (PDF)

He Yan , Colorado State University
Vamsi Kambhampati , Colorado State University
Dan Massey , Colorado State University
Dan Pei , AT&T Research
pp. 19-24

Protecting against DNS cache poisoning attacks (PDF)

Jonathan Trostle , Johns Hopkins University, APL, 11100 Johns Hopkins Rd., Laurel, MD 20273
Bill Van Besien , Johns Hopkins University, APL, 11100 Johns Hopkins Rd., Laurel, MD 20273
Ashish Pujari , Johns Hopkins University, Information Security Institute, 3400 Charles St., Baltimore, MD 20273
pp. 25-30

VSITE: A scalable and secure architecture for seamless L2 enterprise extension in the cloud (PDF)

Li Erran Li , Bell Labs, Alcatel-Lucent, 600 Mountain Ave, Murray Hill, NJ 07974
Thomas Woo , Bell Labs, Alcatel-Lucent, 600 Mountain Ave, Murray Hill, NJ 07974
pp. 31-36

Anonymous communication for encouraging the reporting of wrongdoing in social groups (PDF)

Kohei Sugiyama , KDDI R&D Laboratories, Inc., 2-1-15 Ohara, Fujimino-shi, Saitama, 356-8502 Japan
Masaki Fukushima , KDDI R&D Laboratories, Inc., 2-1-15 Ohara, Fujimino-shi, Saitama, 356-8502 Japan
Teruyuki Hasegawa , KDDI R&D Laboratories, Inc., 2-1-15 Ohara, Fujimino-shi, Saitama, 356-8502 Japan
pp. 37-42

Detection and control system for Peer-to-Peer file exchange application (PDF)

Kazuya Okochi , Systems Development Laboratory, Hitachi Ltd
Nobutaka Kawaguchi , Systems Development Laboratory, Hitachi Ltd
Tomohiro Shigemoto , Systems Development Laboratory, Hitachi Ltd
Tetsuro Kito , Systems Development Laboratory, Hitachi Ltd
Hirofumi Nakakoji , Systems Development Laboratory, Hitachi Ltd
Masato Terada , Systems Development Laboratory, Hitachi Ltd
pp. 43-48

Towards verifiable parallel content retrieval (PDF)

Walter Wong , Faculty of Electrical and Computer Engineering, University of Campinas, Campinas, Brazil
Mauricio F. Magalhaes , Faculty of Electrical and Computer Engineering, University of Campinas, Campinas, Brazil
Jussi Kangasharju , Helsinki Institute of Information Technology, University of Helsinki, Helsinki, Finland
pp. 49-54

Policy extension for data access control (PDF)

S. Arunkumar , School of Engineering and Mathematical Sciences, City University London, Northampton Square, London EC1V 0HB
A Raghavendra , Deloitte, UK
D Weerasinghe , School of Engineering and Mathematical Sciences, City University London, Northampton Square, London EC1V 0HB
D Patel , Indian Institute of Technology Gandhinagar, India
M Rajarajan , School of Engineering and Mathematical Sciences, City University London, Northampton Square, London EC1V 0HB
pp. 55-60

Fingerprinting custom botnet protocol stacks (PDF)

Steve DiBenedetto , Department of Computer Science, Colorado State University
Kaustubh Gadkari , Department of Computer Science, Colorado State University
Nicholas Diel , Engineerity, LLC
Andrea Steiner , Department of Computer Science, Colorado State University
Dan Massey , Department of Computer Science, Colorado State University
Christos Papadopoulos , Department of Computer Science, Colorado State University
pp. 61-66

Tracking multiple C&C botnets by analyzing DNS traffic (PDF)

Jehyun Lee , Division of Computer and Communication Engineering, Korea University
Jonghun Kwon , Division of Computer and Communication Engineering, Korea University
Hyo-Jeong Shin , Korea Telecom
Heejo Lee , Division of Computer and Communication Engineering, Korea University
pp. 67-72

Implementation and evaluation of bot detection scheme based on data transmission intervals (PDF)

Seiichiro Mizoguchi , Information Science and Electrical Engineering, Kyushu University 712, West Building 2nd, 744 Motooka, Nishi-ku, Fukuoka Fukuoka, 819-0395, Japan
Yuji Kugisaki , Hitachi, Ltd., Marunouchi 1-6-6, Chiyoda-ku, Tokyo, 100-8280 Japan
Yoshiaki Kasahara , Research Institute for Information Technology, Kyushu University 6-10-1, Hakozaki, Higashi-ku Fukuoka, 812-8581, Japan
Yoshiaki Hori , Information Science and Electrical Engineering, Kyushu University 712, West Building 2nd, 744 Motooka, Nishi-ku, Fukuoka Fukuoka, 819-0395, Japan
Kouichi Sakurai , Information Science and Electrical Engineering, Kyushu University 712, West Building 2nd, 744 Motooka, Nishi-ku, Fukuoka Fukuoka, 819-0395, Japan
pp. 73-78

A behavior based malware detection scheme for avoiding false positive (PDF)

Yoshiro Fukushima , Graduate School of Information Science and Electrical Engineering, Kyushu University, 744 Motoka, Nishi-ku, Fukuoka 819-0395, Japan
Akihiro Sakai , Graduate School of Information Science and Electrical Engineering, Kyushu University, 744 Motoka, Nishi-ku, Fukuoka 819-0395, Japan
Yoshiaki Hori , Graduate School of Information Science and Electrical Engineering, Kyushu University, 744 Motoka, Nishi-ku, Fukuoka 819-0395, Japan
Kouichi Sakurai , Graduate School of Information Science and Electrical Engineering, Kyushu University, 744 Motoka, Nishi-ku, Fukuoka 819-0395, Japan
pp. 79-84
87 ms
(Ver 3.3 (11022016))