June 22, 2012

  • Bresciani, R., & Butterfield, A. (2012). A UTP approach to probabilistic protocol verification. Security and Communications Networks [preprint]. [Abstract / Request]
  • Fisher, D. (2012, June 20). Syrian dissidents hit by another wave of targeted attacks. threatpost. [Read]
  • Goodwin, J. (2012, June 18). FAA concerned that external digital sources could connect with Gulfstream G280’s flight control systems. Government Security News. [Read]
  • Gyongyosi, L., & Imre, S. (2012). Information geometric security analysis of differential phase-shift quantum key distribution protocol. Security and Communications Networks [preprint]. [Abstract / Request]
  • Herley, C. (2012, June). Why do Nigerian scammers say they’re from Nigeria? [Microsoft Research]. [Read]
  • Kharouni, L. (2012, June). Automatic online banking fraud – Automatic transfer system: The latest cybercrime toolkit feature [Trend Micro]. [Read]
  • Kravets, D. (2012, June 19). House committee approves sweeping, warrantless electronic spy powers. Wired. [Read]
  • Menn, J. (2012, June 18). Hacked companies fight back with controversial steps. Reuters. [Read]
  • Messmer, E. (2012, June 18). Stuxnet cyberattack by US a ‘destabilizing and dangerous’ course of action, says security expert Bruce Schneier. Network World. [Read]
  • Nakashima, E., Miller, G., & Tate, J. (2012, June 19). U.S., Israel developed Flame virus to slow Iranian nuclear efforts, experts say. Washington Post. [Read]
  • PayPal. (2012, June 20). Bug bounty program [cash payments for IDing PayPal vulnerabilities]. [Read]
  • Provos, N. (2012, June 19). [Overview of 5 years of data from Google’s anti-phishing efforts.] [Read]
  • Rusakov, V. (2012, June 19). XPAJ: Reversing a Windows x64 bootkit. Securelist. [Read]
  • 6th IFIP WG 11.2 International Workshop (2012, June 20-22) – papers presented [Request / Abstracts]:
  • 10th Applied Cryptography and Network Security International Conference (2012, June 26-29)  – papers presented [Request / Abstracts]:
  • Wu, G., Chen, X., & Obaidat, M. S. (2012). A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set. Security and Communications Networks [preprint]. [Abstract / Request]
  • Xiao, Z., Kathiresshan, N., & Xiao, Y. (2012). A survey of accountability in computer networks and distributed systems. Security and Communications Networks [preprint]. [Abstract / Request]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: