Message from EAI President regarding COVID-19

Thousands of EUDL articles are free to download thanks to the support from EAI, Europe's largest not-for-profit research community dedicated to employing the latest developments in information technology to build a greener, healthier and smarter world. EAI membership is free! Consider donating to help EAI's vision grow by engaging world's brightest minds to build a better future regardless of their age, economic status or country of origin. Learn more at www.eai.eu or donate by clicking the accompanying link.

X
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
SECURECOMM 2010
Other Years
SECURECOMM 2005SECURECOMM 2006SECURECOMM 2007SECURECOMM 2008SECURECOMM 2009SECURECOMM 2010SECURECOMM 2011SECURECOMM 2012SECURECOMM 2013SECURECOMM 2014SECURECOMM 2014SECURECOMM 2015SECURECOMM 2016SECURECOMM & ATCS & SEPRIOT 2017SECURECOMM 2017
Ethics and Malpractice Statement

    SECURECOMM

    Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

    SecureComm’10 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) w…

    SecureComm’10 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) will also be considered if a clear connection to private or secure communications/networking is demonstrated. The aim of SecureComm is to bring together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers, in order to engage in a discussion about common goals and explore important research directions in the field. SecureComm also serves as a venue for learning about state-of-the-art in security and privacy research, giving attendees the opportunity to network with experts in the field.

    more »
    Editor(s): Sushil Jajodia (George Mason University) and Jianying Zhou (Institute for Infocomm Research)
    Publisher
    Springer
    ISBN
    978-3-642-16161-2
    Conference dates
    7th–9th Sep 2010
    Location
    Singapore, China
    Appeared in EUDL
    2012-05-28

    Copyright © 2012–2021 ICST

    Ordered by title or year
    Showing 11–20 of 28 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • Next
    • Last
    • Efficient Isolation of Trusted Subsystems in Embedded Systems

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Raoul Strackx, Frank Piessens, Bart Preneel
    • Enhancing Host Security Using External Environment Sensors

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland Yap, Jie Yu
    • Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Omar Al-Bataineh, Ron Meyden
    • FADE: Secure Overlay Cloud Storage with File Assured Deletion

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Yang Tang, Patrick Lee, John Lui, Radia Perlman
    • Hidden Markov Models for Automated Protocol Learning

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Sean Whalen, Matt Bishop, James Crutchfield
    • Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang
    • Inexpensive Email Addresses

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Aram Yegenian, Tassos Dimitriou
    • On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley
    • Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Jihyuk Choi, Jerry Chiang, Dongho Kim, Yih-Chun Hu
    • Privacy Administration in Distributed Service Infrastructure

      Research Article in Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

      Nabil Ajam, Nora Cuppens-Boulahia, Frederic Cuppens
    • First
    • Previous
    • 1
    • 2
    • 3
    • Next
    • Last
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico