Message from EAI President regarding COVID-19
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
SECURECOMM 2015
Other Years
SECURECOMM 2005SECURECOMM 2006SECURECOMM 2007SECURECOMM 2008SECURECOMM 2009SECURECOMM 2010SECURECOMM 2011SECURECOMM 2012SECURECOMM 2013SECURECOMM 2014SECURECOMM 2014SECURECOMM 2015SECURECOMM 2016SECURECOMM & ATCS & SEPRIOT 2017SECURECOMM 2017SECURECOMM 2021
Ethics and Malpractice Statement
Back to LNICST

    SECURECOMM

    Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers

    SecureComm seeks high-quality research contributions in the form of well-developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) …

    SecureComm seeks high-quality research contributions in the form of well-developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated.

    more »
    Editor(s): Bhavani Thuraisingham (The University of Texas at Dallas), XiaoFeng Wang (Indiana University at Bloomington) and Vinod Yegneswaran (SRI International)
    Publisher
    Springer
    ISBN
    978-3-319-28865-9
    ISSN
    1867-8211
    Series
    LNICST
    Conference dates
    26th–29th Oct 2015
    Location
    Dallas, United States
    Appeared in EUDL
    2016-02-09
    Appears in
    SpringerLink

    Copyright © 2016–2023 ICST

    Ordered by title or year
    Showing 41–48 of 48 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • 5
    • A Novel Clustering Algorithm for Database Anomaly Detection

      Research Article in Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers

      Jinkun Geng, Daren Ye, Ping Luo, Pin Lv
    • Image Spam Classification Using Neural Network

      Research Article in Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers

      Mozammel Chowdhury, Junbin Gao, Morshed Chowdhury
    • RScam: Cloud-Based Anti-Malware via Reversible Sketch

      Research Article in Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers

      Hao Sun, Xiaofeng Wang, Jinshu Su, Peixin Chen
    • Securing Application with Software Partitioning: A Case Study Using SGX

      Research Article in Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers

      Ahmad Atamli-Reineh, Andrew Martin
    • Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems

      Research Article in Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers

      Ben Townsend, Jemal Abawajy
    • SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services

      Research Article in Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers

      Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding, Qingni Shen
    • TADOOP: Mining Network Traffic Anomalies with Hadoop

      Research Article in Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers

      Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu, Chao Zhou, Yang Yu, Dan Wu
    • Authenticating Top- Results of Secure Multi-keyword Search in Cloud Computing

      Research Article in Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers

      Xiaojun Xiao, Yaping Lin, Wei Zhang, Xin Yao, Qi Gu
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • 5
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico