The Community for Technology Leaders
Green Image
Issue No. 05 - September/October (vol. 8)
ISSN: 1545-5971

A Fault-Tolerant Token-Based Atomic Broadcast Algorithm (Abstract)

André Schiper , EPFL, Lausanne
Richard Ekwall , EPFL, Lausanne
pp. 625-639

Deploying Cryptography in Internet-Scale Systems: A Case Study on DNSSEC (Abstract)

Hao Yang , IBM T. J. Watson Research Center, Hawthorne
Eric Osterweil , University of California Los Angeles, Los Angeles
Songwu Lu , University of California Los Angeles, Los Angeles
Lixia Zhang , University of California Los Angeles, Los Angeles
Dan Massey , Colorado State University, Ft Collins
pp. 656-669

Detecting Kernel-Level Rootkits Using Data Structure Invariants (Abstract)

Arati Baliga , Rutgers University, Piscataway
Liviu Iftode , Rutgers University, Piscataway
Vinod Ganapathy , Rutgers University, Piscataway
pp. 670-684

Distributed Detection of Clone Attacks in Wireless Sensor Networks (Abstract)

Roberto Di Pietro , Universita di Roma Tre, Rome
Luigi Vincenzo Mancini , Sapienza - University of Rome, Rome
Mauro Conti , Sapienza - University of Rome, Rome
Alessandro Mei , Sapienza - University of Rome, Rome
pp. 685-698

Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers (Abstract)

Victor C.M. Leung , University British Columbia, Vancouver
Ali Al Shidhani , University of British Columbia, Vancouver
pp. 699-713

Hardware/Software Codesign Architecture for Online Testing in Chip Multiprocessors (Abstract)

Omer Khan , Massachusetts Institute of Technology, Cambridge
Sandip Kundu , University of Massachusetts Amherst, Amherst
pp. 714-727

Improving Security and Performance in the Tor Network through Tunable Path Selection (Abstract)

Nikita Borisov , University of Illinois at Urbana-Chamapign, Urbana
Robin Snader , University of Illinois at Urbana-Champaign, Urbana
pp. 728-741

PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance (Abstract)

Josep Balasch , IBBT-Katholieke Universitiet Leuven, Heverlee-Leuven
Carmela Troncoso , IBBT-Katholieke Universitiet Leuven, Heverlee-Leuven
Eleni Kosta , K.U.Leuven, Leuven
George Danezis , Microsoft Research Cambridge, Cambridge
Bart Preneel , IBBT-Katholieke Universitiet Leuven, Heverlee-Leuven
pp. 742-755

Temperature-Aware NBTI Modeling and the Impact of Standby Leakage Reduction Techniques on Circuit Performance Degradation (Abstract)

Ku He , Tsinghua University, Beijing
Yuan Xie , Pennsylvania State University, University Park
Hong Luo , Tsinghua University, Beijing
Rong Luo , Tsinghua University, Beijing
Yu Wang , Tsinghua University, Beijing
Huazhong Yang , Tsinghua University, Beijing
pp. 756-769
Short Papers

Analyzing a Family of Key Protection Schemes against Modification Attacks (Abstract)

Tieyan Li , Institute for Infocomm Research, Singapore
Guilin Wang , University of Birmingham, Birmingham
pp. 770-776

Secrecy Capacity for Satellite Networks under Rain Fading (Abstract)

Dionysia K. Petraki , National Technical University of Athens, Athens
Markos P. Anastasopoulos , National Technical University of Athens, Athens
Symeon Papavassiliou , National Technical University of Athens, Athens
pp. 777-782
100 ms
(Ver 3.1 (10032016))