The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 02 - March/April (vol. 9)
ISSN: 1545-5971
Front Covers

[Front cover] (PDF)

pp. c1
Papers

Automatic Reconfiguration for Large-Scale Reliable Storage Systems (Abstract)

Rodrigo Rodrigues , Max Planck Institute for Software Systems, Saarbrücken
Barbara Liskov , Massachusetts Institute of Technology, Cambridge
Kathryn Chen , Massachusetts Institute of Technology, Cambridge
Moses Liskov , College of William and Mary, Williamsburg
David Schultz , Massachusetts Institute of Technology, Cambridge
pp. 145-158

Compiler-Directed Soft Error Mitigation for Embedded Systems (Abstract)

Antonio Martínez-Álvarez , University of Alicante, San Vicente del Raspeig
Sergio A. Cuenca-Asensi , University of Alicante, San Vicente del Raspeig
Felipe Restrepo-Calle , University of Alicante, San Vicente del Raspeig
Francisco R. Palomo Pinto , University of Sevilla, Sevilla
Hipólito Guzmán-Miranda , University of Sevilla, Sevilla
Miguel A. Aguirre , University of Sevilla, Sevilla
pp. 159-172

Data-Provenance Verification For Secure Hosts (Abstract)

Kui Xu , Virginia Tech, Blacksburg
Huijun Xiong , Virginia Tech, Blacksburg
Chehai Wu , AppFolio.com
Deian Stefan , Stanford University, Stanford
Danfeng Yao , Virginia Tech, Blacksburg
pp. 173-183

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs (Abstract)

Guoxing Zhan , Wayne State University, Detroit
Weisong Shi , Wayne State University, Detroit
Julia Deng , Intelligent Automation Inc., Rockville
pp. 184-197

Detecting Spam Zombies by Monitoring Outgoing Messages (Abstract)

Zhenhai Duan , Florida State University, Tallahassee
Peng Chen , Juniper Networks, Sunnyvale and Florida State University, Tallahassee
Fernando Sanchez , Florida State University, Tallahassee
Yingfei Dong , University of Hawaii, Honolulu
Mary Stephenson , Florida State University, Tallahassee
James Michael Barker , University of North Carolina at Chapel Hill, Chapel Hill
pp. 198-210

On the Security and Efficiency of Content Distribution via Network Coding (Abstract)

Qiming Li , Institute for Infocomm Research Institute, Singapore
John C.S. Lui , The Chinese University of Hong Kong, Hong Kong
Dah-Ming Chiu , The Chinese University of Hong Kong, Hong Kong
pp. 211-221

Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism (Abstract)

Sonia Chiasson , Carleton University, Ottawa
Elizabeth Stobert , Carleton University, Ottawa
Alain Forget , Carleton University, Ottawa
Robert Biddle , Carleton University, Ottawa
Paul C. van Oorschot , Carleton University, Ottawa
pp. 222-235

Quantitative Analysis of Consensus Algorithms (Abstract)

Fatemeh Borran , École Polytechnique Fédérale de Lausanne, Lausanne
Martin Hutle , Fraunhofer AISEC, Munich
Nuno Santos , École Polytechnique Fédérale de Lausanne, Lausanne
André Schiper , École Polytechnique Fédérale de Lausanne, Lausanne
pp. 236-249

Risk-Aware Mitigation for MANET Routing Attacks (Abstract)

Ziming Zhao , Arizona State University, Tempe
Hongxin Hu , Arizona State University, Tempe
Gail-Joon Ahn , Arizona State University, Tempe
Ruoyu Wu , Arizona State University, Tempe
pp. 250-260

SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems (Abstract)

Anupam Das , University of Illinois at Urbana Champaign, Champaign
Mohammad Mahfuzul Islam , Bangladesh University of Engnieering and Technology, Bangladesh
pp. 261-274

Stabilization Enabling Technology (Abstract)

Shlomi Dolev , Ben Gurion University, Beer-Sheva
Yinnon Haviv , Ben Gurion University, Beer-Sheva
pp. 275-288

Survivability Experiment and Attack Characterization for RFID (Abstract)

Yanjun Zuo , University of North Dakota, Grand Forks
pp. 289-302
Short Papers
79 ms
(Ver 3.3 (11022016))