Message from EAI President regarding COVID-19

Thousands of EUDL articles are free to download thanks to the support from EAI, Europe's largest not-for-profit research community dedicated to employing the latest developments in information technology to build a greener, healthier and smarter world. EAI membership is free! Consider donating to help EAI's vision grow by engaging world's brightest minds to build a better future regardless of their age, economic status or country of origin. Learn more at www.eai.eu or donate by clicking the accompanying link.

X
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
SECURECOMM 2007
SMPE 2007SECOVAL 2007GRID-STP 2007
Other Years
SECURECOMM 2005SECURECOMM 2006SECURECOMM 2007SECURECOMM 2008SECURECOMM 2009SECURECOMM 2010SECURECOMM 2011SECURECOMM 2012SECURECOMM 2013SECURECOMM 2014SECURECOMM 2014SECURECOMM 2015SECURECOMM 2016SECURECOMM & ATCS & SEPRIOT 2017SECURECOMM 2017
Ethics and Malpractice Statement

    SECURECOMM

    3rd International ICST Conference on Security and Privacy in Communication Networks

    Securecomm seeks high-quality research contributions in the form of well-developed full papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptogra…

    Securecomm seeks high-quality research contributions in the form of well-developed full papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. Securecomm brings together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers.

    more »
    Editor(s): Bruno Crispo (University of Trento), Refik Molva (Technische University Hamburg-Harburg) and Dieter Gollman (Eurecom)
    Publisher
    IEEE
    ISBN
    978-1-4244-0975-4
    Conference dates
    17th–21st Sep 2007
    Location
    Nice, France
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2021 IEEE

    Ordered by title or year
    Showing 1–31 of 31 results
    Page size: 102550
    • 1
    • A BitTorrent-Driven Distributed Denial-of-Service Attack

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Jerome Harrington, Corey Kuwanoe, Cliff C. Zou
    • A Feedback Reputation Mechanism to Secure the Optimized Link State Routing Protocol

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Joao P. Vilela, Joao Barros
    • A Layout-Similarity-Based Approach for Detecting Phishing Pages

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi
    • An Assessment of VoIP Covert Channel Threats

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Takehiro Takahashi, Wenke Lee
    • Anonymity and Security in Delay Tolerant Networks

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Aniket Kate, Gregory M. Zaverucha, Urs Hengartner
    • Breaking EMAP

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Mihály Bárász, Balázs Boros, Péter Ligeti, Krisztina Lója, Dániel A. Nagy
    • Deception Framework for Sensor Networks

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Ruiyi Zhang, Johnson Thomas, Venkata Manoj Mulpuru
    • Detecting Bogus BGP Route Information: Going Beyond Prefix Hijacking

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Jian Qiu, Lixin Gao, Supranamaya Ranjan, Antonio Nucci
    • Detecting Worms via Mining Dynamic Program Execution

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Xun Wang, Wei Yu, Adam Champion, Xinwen Fu, Dong Xuan
    • Efficient Mechanisms to Provide Convoy Member and Vehicle Sequence Authentication in VANETs

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Ahren Studer, Mark Lurk, Adrian Perrig
    • Enhancing Frequency-based Wormhole Attack Detection with Novel Jitter Waveforms

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Maria A. Gorlatova, Marc Kelly, Ramiro Liscano, Peter C Mason
    • Global interoperability of national security and emergency preparedness (NS/EP) telecommunications services

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Frank J. Suraci, Arye R. Ephrath, John R. Wullert II
    • Implications of Radio Fingerprinting on the Security of Sensor Networks

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Kasper Bonne Rasmussen, Srdjan Capkun
    • Intrusion Detection Technology based on CEGA-SVM

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Yuxin Wei, Muqing Wu
    • Misleading and Defeating Importance-Scanning Malware Propagation

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Guofei Gu, Zesheng Chen, Phillip Porras, Wenke Lee
    • Mitigating Denial-of-Service Attacks in MANET by Incentive-based Packet Filtering: A Game-theoretic Approach

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Xiaoxin Wu, David K. Y. Yau
    • Modeling and Detection of Complex Attacks

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Seyit Ahmet Camtepe, Bülent Yener
    • OpenFire: Using Deception to Reduce Network Attacks

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Kevin Borders, Laura Falk, Atul Prakash
    • PWC: A Proactive Worm Containment Solution for Enterprise Networks

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Yoon-Chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis
    • Parameterizing Access Control for Heterogeneous Peer-to-Peer Applications

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Ashish Gehani, Surendar Chandra
    • RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Claude Castelluccia, Angelo Spognardi
    • SET: Detecting node clones in Sensor Networks

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Heesook Choi, Sencun Zhu, Thomas F. La Porta
    • Secure Crash Reporting in Vehicular Ad hoc Networks

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Sumair Ur Rahman, Urs Hengartner
    • Secure Lightweight Tunnel for Monitoring Transport Containers

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Jens Ove Lauf, Harald Sauff
    • Securing Network Location Awareness with Authenticated DHCP

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Tuomas Aura, Michael Roe, Steven J. Murdoch
    • Securing Personal Network clusters

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Assed Jehangir, Sonia M. Heemstra de Groot
    • Securing pseudo identities in an anonymous peer-to-peer file-sharing network

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Tom Chothia
    • Simple Authentication for the Web

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Timothy W. van der Horst, Kent E. Seamons
    • Simple Cross-Site Attack Prevention

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Florian Kerschbaum
    • Sybil Attack Detection in a Hierarchical Sensor Network

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Jian Yin, Sanjay Kumar Madria
    • Using Recurring Costs for Reputation Management in Peer-To-Peer Streaming Systems

      Research Article in 3rd International ICST Conference on Security and Privacy in Communication Networks

      Michael Rossberg, Guenter Schaefer, Thorsten Strufe
    • 1
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico