Message from EAI President regarding COVID-19
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
SECURECOMM 2005
PERVASIVETRUST 2005SECQOS 2005CNFR 2005SECOVAL 2005
Other Years
SECURECOMM 2005SECURECOMM 2006SECURECOMM 2007SECURECOMM 2008SECURECOMM 2009SECURECOMM 2010SECURECOMM 2011SECURECOMM 2012SECURECOMM 2013SECURECOMM 2014SECURECOMM 2014SECURECOMM 2015SECURECOMM 2016SECURECOMM & ATCS & SEPRIOT 2017SECURECOMM 2017SECURECOMM 2021
Ethics and Malpractice Statement

    SECURECOMM

    1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

    The focus of this conference is two-fold:Security and Privacy in wireless, mobile, ad hoc, sensor, personal-area and RFID networks and Security and Privacy in pervasive and ubiquitous computing. The conference aims to bring together academic, industrial and government researchers, practitioners, st…

    The focus of this conference is two-fold:Security and Privacy in wireless, mobile, ad hoc, sensor, personal-area and RFID networks and Security and Privacy in pervasive and ubiquitous computing. The conference aims to bring together academic, industrial and government researchers, practitioners, standards developers and policy makers.

    more »
    Editor(s): Imrich Chlamtac (CreateNet Research Institute) and Krishna Sivalingam (Univ. of Maryland, Baltimore County (UMBC))
    Publisher
    IEEE
    ISBN
    0-7695-2369-2
    Conference dates
    5th–9th Sep 2005
    Location
    Athens, Greece
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2023 IEEE

    Ordered by title or year
    Showing 31–40 of 50 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • 5
    • Next
    • Last
    • Short Paper: A Secure Interworking Scheme for UMTS-WLAN

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Yen-Chieh Ouyang, Chung-Hua Chu
    • Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and Assurance

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      T. Daniels, M. Mina, S.F. Russell
    • Short Paper: Dynamic Risk Mitigation for 'Self-defending' Network Security

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      N. Bambos
    • Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      D. Socek, Li Shujun, S.S. Magliveras, B. Furht
    • Short Paper: Fellowship in Mobile Ad hoc Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      V. Balakrishnan, V. Varadharajan
    • Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      Li Zhou, Jinfeng Ni, C.V. Ravishankar
    • Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      D. Llewellyn-Jones, M. Merabti, Qi Shi , B. Askwith
    • Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      K. Hoeper, Guang Gong
    • Short Paper: Location Privacy with IP Mobility

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      R. Koodli, V. Devarapalli, H. Flinck, C.E. Perkins
    • Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices

      Research Article in 1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

      W. Itani, A. Kayssi, A. Chehab
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • 5
    • Next
    • Last
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico