About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
SECURECOMM 2014
Other Years
SECURECOMM 2005SECURECOMM 2006SECURECOMM 2007SECURECOMM 2008SECURECOMM 2009SECURECOMM 2010SECURECOMM 2011SECURECOMM 2012SECURECOMM 2013SECURECOMM 2014SECURECOMM 2014SECURECOMM 2015SECURECOMM 2016SECURECOMM & ATCS & SEPRIOT 2017SECURECOMM 2017SECURECOMM 2020SECURECOMM 2021SECURECOMM 2022SECURECOMM 2023
Ethics and Malpractice Statement
Back to LNICST

    SECURECOMM

    International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

    SecureComm'14 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) w…

    SecureComm'14 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) will also be considered if a clear connection to private or secure communications/networking is demonstrated.

    more »
    Editor(s): Jing Tian (Institute of Information Engineering), Jiwu Jing (Institute of Information Engineering) and Mudhakar Srivatsa (IBM Thomas J. Watson Research Center)
    Publisher
    Springer
    ISBN
    978-3-319-23829-6
    ISSN
    1867-8211
    Series
    LNICST
    Conference dates
    24th–26th Sep 2014
    Location
    Beijing, China
    Appeared in EUDL
    2015-11-23
    Appears in
    SpringerLink

    Copyright © 2015–2025 ICST

    Ordered by title or year
    Showing 31–40 of 47 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • 5
    • Next
    • Last
    • Policy Enforcement Point Model

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Yosra Ben Mustapha, Hervé Debar, Gregory Blanc
    • Friendly Jamming for Secure Localization in Vehicular Transportation

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Bhaswati Deka, Ryan Gerdes, Ming Li, Kevin Heaslip
    • Anonymous Publish-Subscribe Systems

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Binh Vo, Steven Bellovin
    • Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Eirini Karapistoli, Panagiotis Sarigiannidis, Anastasios Economides
    • Implementing an Affordable and Effective GSM IMSI Catcher with 3G Authentication

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Max Suraev
    • Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Sami Zhioua, Adnene Jabeur, Mahjoub Langar, Wael Ilahi
    • Abusing Browser Address Bar for Fun and Profit

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen, Guofei Gu
    • Characterizing Google Hacking: A First Large-Scale Quantitative Study

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Jialong Zhang, Jayant Notani, Guofei Gu
    • JumpBox – A Seamless Browser Proxy for Tor Pluggable Transports

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Jeroen Massar, Ian Mason, Linda Briesemeister, Vinod Yegneswaran
    • Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Pieter Burghouwt, Marcel Spruit, Henk Sips
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • 5
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL