Message from EAI President regarding COVID-19
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
SECURECOMM 2008
AIPACA 2008SOSOC 2008
Other Years
SECURECOMM 2005SECURECOMM 2006SECURECOMM 2007SECURECOMM 2008SECURECOMM 2009SECURECOMM 2010SECURECOMM 2011SECURECOMM 2012SECURECOMM 2013SECURECOMM 2014SECURECOMM 2014SECURECOMM 2015SECURECOMM 2016SECURECOMM & ATCS & SEPRIOT 2017SECURECOMM 2017SECURECOMM 2021
Ethics and Malpractice Statement

    SECURECOMM

    4th International ICST Conference on Security and Privacy in Communication Networks

    Securecomm seeks high-quality research contributions in the form of well-developed full papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptogra…

    Securecomm seeks high-quality research contributions in the form of well-developed full papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. Securecomm brings together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers. Securecomm also serves as a venue for learning about state-of-the-art in security and privacy research. Presentations reporting on cutting-edge research results are supplemented by panels on controversial issues and invited talks on timely and important topics.

    SecureComm brings together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers. SecureComm also serves as a venue for learning about state-of-the-art in security and privacy research. Presentations reporting on cutting-edge research results are supplemented by panels on controversial issues and invited talks on timely and important topics.

    more »
    Editor(s): Albert Levi (Sabancı University, Turkey), Peng Liu (Penn State University, USA) and Refik Molva (Eurecom, France)
    Publisher
    ACM
    ISBN
    978-1-60558-241-2
    Conference dates
    22nd–25th Sep 2008
    Location
    Istanbul, Turkey
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2023 ACM

    Ordered by title or year
    Showing 21–30 of 36 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    • Overbot - A botnet protocol based on Kademlia

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Guenther Starnberger, Christopher Kruegel, Engin Kirda
    • PEAC: a Probabilistic, Efficient, and resilient Authentication protocol for broadcast Communications

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Andrea Cirulli, Roberto Di Pietro
    • Parameterized Access Control: From Design To Prototype

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Ashish Gehani, Surendar Chandra
    • Relaxed Authenticity for Data Aggregation in Wireless Sensor Networks

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Erik-Oliver Blass, Joachim Wilke, Martina Zitterbart
    • RepTrap: a novel attack on feedback-based reputation systems

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Yafei Yang , Qinyuan Feng, Yan Lindsay Sun, Yafei Dai
    • SMM Rootkits: A New Breed of OS Independent Malware

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Shawn Embleton, Sherri Sparks, Cliff Zou
    • Scalable and Efficient Provable Data Possession

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik
    • Securely Computing an Approximate Median in Wireless Sensor Networks

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia
    • Source Location Privacy against Laptop-Class Attacks in Sensor Networks

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Yi Ouyang, Zhengyi Le, James Ford, Donggang Liu, Fillia Makedon
    • Subjective logic based trust model for mobile ad hoc networks

      Research Article in 4th International ICST Conference on Security and Privacy in Communication Networks

      Venkat Balakrishnan, Vijay Varadharajan, Uday Tupakula
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico