The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 02 - March/April (vol. 9)
ISSN: 1545-5971
Front Covers

[Front cover] (PDF)

pp. c1
Papers

Automatic Reconfiguration for Large-Scale Reliable Storage Systems (Abstract)

Moses Liskov , College of William and Mary, Williamsburg
David Schultz , Massachusetts Institute of Technology, Cambridge
Barbara Liskov , Massachusetts Institute of Technology, Cambridge
Rodrigo Rodrigues , Max Planck Institute for Software Systems, Saarbrücken
Kathryn Chen , Massachusetts Institute of Technology, Cambridge
pp. 145-158

Compiler-Directed Soft Error Mitigation for Embedded Systems (Abstract)

Hipólito Guzmán-Miranda , University of Sevilla, Sevilla
Felipe Restrepo-Calle , University of Alicante, San Vicente del Raspeig
Miguel A. Aguirre , University of Sevilla, Sevilla
Francisco R. Palomo Pinto , University of Sevilla, Sevilla
Antonio Martínez-Álvarez , University of Alicante, San Vicente del Raspeig
Sergio A. Cuenca-Asensi , University of Alicante, San Vicente del Raspeig
pp. 159-172

Data-Provenance Verification For Secure Hosts (Abstract)

Chehai Wu , AppFolio.com
Huijun Xiong , Virginia Tech, Blacksburg
Danfeng Yao , Virginia Tech, Blacksburg
Deian Stefan , Stanford University, Stanford
Kui Xu , Virginia Tech, Blacksburg
pp. 173-183

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs (Abstract)

Weisong Shi , Wayne State University, Detroit
Julia Deng , Intelligent Automation Inc., Rockville
Guoxing Zhan , Wayne State University, Detroit
pp. 184-197

Detecting Spam Zombies by Monitoring Outgoing Messages (Abstract)

Zhenhai Duan , Florida State University, Tallahassee
James Michael Barker , University of North Carolina at Chapel Hill, Chapel Hill
Peng Chen , Juniper Networks, Sunnyvale and Florida State University, Tallahassee
Mary Stephenson , Florida State University, Tallahassee
Yingfei Dong , University of Hawaii, Honolulu
Fernando Sanchez , Florida State University, Tallahassee
pp. 198-210

On the Security and Efficiency of Content Distribution via Network Coding (Abstract)

Dah-Ming Chiu , The Chinese University of Hong Kong, Hong Kong
John C.S. Lui , The Chinese University of Hong Kong, Hong Kong
Qiming Li , Institute for Infocomm Research Institute, Singapore
pp. 211-221

Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism (Abstract)

Sonia Chiasson , Carleton University, Ottawa
Alain Forget , Carleton University, Ottawa
Robert Biddle , Carleton University, Ottawa
Paul C. van Oorschot , Carleton University, Ottawa
Elizabeth Stobert , Carleton University, Ottawa
pp. 222-235

Quantitative Analysis of Consensus Algorithms (Abstract)

Nuno Santos , École Polytechnique Fédérale de Lausanne, Lausanne
André Schiper , École Polytechnique Fédérale de Lausanne, Lausanne
Martin Hutle , Fraunhofer AISEC, Munich
Fatemeh Borran , École Polytechnique Fédérale de Lausanne, Lausanne
pp. 236-249

Risk-Aware Mitigation for MANET Routing Attacks (Abstract)

Gail-Joon Ahn , Arizona State University, Tempe
Ruoyu Wu , Arizona State University, Tempe
Hongxin Hu , Arizona State University, Tempe
Ziming Zhao , Arizona State University, Tempe
pp. 250-260

SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems (Abstract)

Mohammad Mahfuzul Islam , Bangladesh University of Engnieering and Technology, Bangladesh
Anupam Das , University of Illinois at Urbana Champaign, Champaign
pp. 261-274

Stabilization Enabling Technology (Abstract)

Yinnon Haviv , Ben Gurion University, Beer-Sheva
Shlomi Dolev , Ben Gurion University, Beer-Sheva
pp. 275-288

Survivability Experiment and Attack Characterization for RFID (Abstract)

Yanjun Zuo , University of North Dakota, Grand Forks
pp. 289-302
Short Papers
88 ms
(Ver 3.1 (10032016))