First Workshop on Secure Network Protocols (NPSec)
November 6, 2005
Boston, Massachusetts, USA

(In conjunction with ICNP 2005 : The 13th IEEE International Conference on Network Protocols)
   Home   |   Call for Papers   |   Committees   |   Program   
Submission   |   AuthorKit   |   Registration   |   Boston  


Tentative Program

8:30 Welcome and Introductions
8:45 Keynote, Hari Balakrishnan (Massachusetts Institute of Technology)
10:00 Coffee Break
10:30 L3A: A Protocol for Layer Three Accounting. Alwyn Goodloe, Matthew Jacobs, Gaurav Shah (University of Pennsylvania), Carl Gunter (University of Illinois, Urbana-Champaign)
10:50 Mitigating DoS Attack Through Selective Bin Verification. Micah Sherr, Michael Greenwald, Carl Gunter, Sanjeev Khanna, Santosh Venkatesh (University of Illinois, Urbana-Champaign)
11:10 On Design Tradeoffs between Security and Performance in Wireless Group Communicating Systems. Jin-Hee Cho and Ing-Ray Chen (Virginia Tech)
11:30 Detecting and Filtering Instant Messaging Spam -- A Global and also Personalized Approach. Zhijun Liu, Weili Lin, Na Li, David Lee (The Ohio State University)
11:50 Analysis of IPSec Overheads for VPN Servers. Craig Shue, Youngsang Shin, Minaxi Gupta, Jong Youl Choi (Indiana University, Bloomington)

12:10 Lunch Break
1:30 Practical Security for Disconnected Nodes. Aaditeshwar Seth and Srinivasan Keshav (University of Waterloo)

1:50 Achieving K-Anonymity in Mobile Ad Hoc Networks. Xiaoxin Wu and Elisa Bertino (Purdue University)
2:10 Phyllo: A Peer-to-Peer Overlay Security Framework. William Heinbockel (MITRE) and Minseok Kwon (Rochester Institute of Technology)
2:30 Identity Theft Protection in Structured Overlays. Lakshmi Ganesh and Ben Y. Zhao (UC Santa Barbara)
2:50 Coffee Break

3:30 An Effective Intrusion Detection Approach for OLSR MANET Protocol. M. Wang, L. Lamont (Communications Research Centre), P. Mason, M. Gorlatova (DRDC)
3:50 The Attackers' Influence on the Tactical Assessments Produced by Standard Alert Correlation Systems. Stephen Neville (University of Victoria)
4:10 Policy Segmentation for Intelligent Firewall Testing. Adel El-Atawy, Khaled Ibrahim, Hazem Hamed, Ehab Al-Shaer (DePaul University)
4:30 A Distributed Reputation Approach to Cooperative Internet Routing Protection. Harlan Yu, Jennifer Rexford, Edward Felten (Princeton University)
4:50-5:00 Closing Remarks and Discussion





Last update: Saturday July 16, 2005

Comments to: npsec AT cs.purdue.edu