About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
SECURECOMM 2007
SMPE 2007SECOVAL 2007GRID-STP 2007
Other Years
SECURECOMM 2005SECURECOMM 2006SECURECOMM 2007SECURECOMM 2008SECURECOMM 2009SECURECOMM 2010SECURECOMM 2011SECURECOMM 2012SECURECOMM 2013SECURECOMM 2014SECURECOMM 2014SECURECOMM 2015SECURECOMM 2016SECURECOMM & ATCS & SEPRIOT 2017SECURECOMM 2017SECURECOMM 2020SECURECOMM 2021SECURECOMM 2022SECURECOMM 2023
Ethics and Malpractice Statement

    SECURECOMM

    3rd International ICST Conference on Security and Privacy in Communication Networks

    Securecomm seeks high-quality research contributions in the form of well-developed full papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptogra…

    Securecomm seeks high-quality research contributions in the form of well-developed full papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. Securecomm brings together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers.

    more »
    Editor(s): Bruno Crispo (University of Trento), Refik Molva (Technische University Hamburg-Harburg) and Dieter Gollman (Eurecom)
    Publisher
    IEEE
    ISBN
    978-1-4244-0975-4
    Conference dates
    17th–21st Sep 2007
    Location
    Nice, France
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 IEEE

    Ordered by title or year
    Showing 21–30 of 31 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    • Parameterizing Access Control for Heterogeneous Peer-to-Peer Applications

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Ashish Gehani, Surendar Chandra
    • Simple Authentication for the Web

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Timothy W. van der Horst, Kent E. Seamons
    • Breaking EMAP

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Mihály Bárász, Balázs Boros, Péter Ligeti, Krisztina Lója, Dániel A. Nagy
    • Simple Cross-Site Attack Prevention

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Florian Kerschbaum
    • Intrusion Detection Technology based on CEGA-SVM

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Yuxin Wei, Muqing Wu
    • Enhancing Frequency-based Wormhole Attack Detection with Novel Jitter Waveforms

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Maria A. Gorlatova, Marc Kelly, Ramiro Liscano, Peter C Mason
    • Detecting Bogus BGP Route Information: Going Beyond Prefix Hijacking

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Jian Qiu, Lixin Gao, Supranamaya Ranjan, Antonio Nucci
    • PWC: A Proactive Worm Containment Solution for Enterprise Networks

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Yoon-Chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis
    • OpenFire: Using Deception to Reduce Network Attacks

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Kevin Borders, Laura Falk, Atul Prakash
    • Anonymity and Security in Delay Tolerant Networks

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Aniket Kate, Gregory M. Zaverucha, Urs Hengartner
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL