About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
SECURECOMM 2008
AIPACA 2008SOSOC 2008
Other Years
SECURECOMM 2005SECURECOMM 2006SECURECOMM 2007SECURECOMM 2008SECURECOMM 2009SECURECOMM 2010SECURECOMM 2011SECURECOMM 2012SECURECOMM 2013SECURECOMM 2014SECURECOMM 2014SECURECOMM 2015SECURECOMM 2016SECURECOMM & ATCS & SEPRIOT 2017SECURECOMM 2017SECURECOMM 2021
Ethics and Malpractice Statement

    SECURECOMM

    4th International ICST Conference on Security and Privacy in Communication Networks

    Securecomm seeks high-quality research contributions in the form of well-developed full papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptogra…

    Securecomm seeks high-quality research contributions in the form of well-developed full papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. Securecomm brings together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers. Securecomm also serves as a venue for learning about state-of-the-art in security and privacy research. Presentations reporting on cutting-edge research results are supplemented by panels on controversial issues and invited talks on timely and important topics.

    SecureComm brings together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers. SecureComm also serves as a venue for learning about state-of-the-art in security and privacy research. Presentations reporting on cutting-edge research results are supplemented by panels on controversial issues and invited talks on timely and important topics.

    more »
    Editor(s): Albert Levi (Sabancı University, Turkey), Peng Liu (Penn State University, USA) and Refik Molva (Eurecom, France)
    Publisher
    ACM
    ISBN
    978-1-60558-241-2
    Conference dates
    22nd–25th Sep 2008
    Location
    Istanbul, Turkey
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 ACM

    Ordered by title or year
    Showing 1–10 of 36 results
    Page size: 102550
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    • A Cross-layer Dropping Attack in Video Streaming over Ad Hoc Networks

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Min Shao, Sencun Zhu, Guohong Cao, Tom La Porta, Prasant Mohapatra
    • A Heterogeneity-Aware Framework for Group Key Management in Wireless Mesh Networks

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Xia Wang, Johnny Wong, Wensheng Zhang
    • A Lightweight Biometric Signature Scheme for User Authentication over Networks

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Tansu Alpcan, Sinan Kesici, Daniel Bicher, M. Kivanc Mihcak, Christian Bauckhage, S. Ahmet Camtepe
    • ARCMA: Attack-Resilient Collaborative Message Authentication in Wireless Sensor Networks

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Min-gyu Cho, Kang G. Shin
    • An Identity-Based Key Infrastructure Suitable for Messaging and Its Application to E-mail

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Ayse Karatop, Erkay Savas
    • Attacking the Kad Network

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim
    • Attribute-Based On-Demand Multicast Group Setup with Membership Anonymity

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Shucheng Yu, Kui Ren, Wenjing Lou
    • Containment of Network Worms via Per-Process Rate-Limiting

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Yuanyuan Zeng, xin hu, Haixiong Wang, Kang G. Shin, Abhijit Bose
    • Correlation-based load balancing for network intrusion detection and prevention systems

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Anh Le, Raouf Boutaba, Ehab Al-Shaer
    • Detection of word shift steganography in PDF document

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Li Lingjun, Huang Liusheng, Yang Wei, Zhao Xinxin, Yu Zhenshan, Chen Zhili
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL