Message from EAI President regarding COVID-19
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
SECURECOMM 2010
Other Years
SECURECOMM 2005SECURECOMM 2006SECURECOMM 2007SECURECOMM 2008SECURECOMM 2009SECURECOMM 2010SECURECOMM 2011SECURECOMM 2012SECURECOMM 2013SECURECOMM 2014SECURECOMM 2014SECURECOMM 2015SECURECOMM 2016SECURECOMM & ATCS & SEPRIOT 2017SECURECOMM 2017SECURECOMM 2021
Ethics and Malpractice Statement

    SECURECOMM

    Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

    SecureComm’10 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) w…

    SecureComm’10 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) will also be considered if a clear connection to private or secure communications/networking is demonstrated. The aim of SecureComm is to bring together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers, in order to engage in a discussion about common goals and explore important research directions in the field. SecureComm also serves as a venue for learning about state-of-the-art in security and privacy research, giving attendees the opportunity to network with experts in the field.

    more »
    Editor(s): Sushil Jajodia (George Mason University) and Jianying Zhou (Institute for Infocomm Research)
    Publisher
    Springer
    ISBN
    978-3-642-16161-2
    Series
    LNICST
    Conference dates
    7th–9th Sep 2010
    Location
    Singapore, China
    Appeared in EUDL
    2012-05-28

    Copyright © 2012–2023 ICST

    Ordered by title or year
    Showing 21–28 of 28 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • Efficient Isolation of Trusted Subsystems in Embedded Systems

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Raoul Strackx, Frank Piessens, Bart Preneel
    • Enhancing Host Security Using External Environment Sensors

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland Yap, Jie Yu
    • Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Omar Al-Bataineh, Ron Meyden
    • FADE: Secure Overlay Cloud Storage with File Assured Deletion

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Yang Tang, Patrick Lee, John Lui, Radia Perlman
    • Hidden Markov Models for Automated Protocol Learning

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Sean Whalen, Matt Bishop, James Crutchfield
    • Privacy Administration in Distributed Service Infrastructure

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Nabil Ajam, Nora Cuppens-Boulahia, Frederic Cuppens
    • Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou
    • On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley
    • First
    • Previous
    • 1
    • 2
    • 3
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico