About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
SECURECOMM 2013
Other Years
Ethics and Malpractice Statement

    SECURECOMM

    Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

    In past 9 years, SecureComm has emerged as a leading international forum that covers all aspects of information and communications security with particular emphasis on security in communication and networking. SecureComm also serves as a venue for learning about the emerging trends in security and …

    In past 9 years, SecureComm has emerged as a leading international forum that covers all aspects of information and communications security with particular emphasis on security in communication and networking. SecureComm also serves as a venue for learning about the emerging trends in security and privacy research, giving participants the opportunity to network with experts in the field.

    The SecureComm is well recognised as one of the prestigious events for Information and Communication Technology (ICT) security community worldwide. In 2010, Australian Research Council (ARC) initiatives Excellence of Research in Australia (ERA) ranked SecureComm at the highest ranking level ‘A’.

    more »
    Editor(s): Tanveer Zia (Charles Sturt University), Albert Zomaya (University of Sydney), Vijay Varadharajan (Macquarie University, Australia) and Morley Mao (University of Michigan)
    Publisher
    Springer
    ISBN
    978-3-319-04283-1
    Series
    LNICST
    Conference dates
    25th–27th Sep 2013
    Location
    Sydney, Australia
    Appeared in EUDL
    2014-06-19

    Copyright © 2014–2025 ICST

    Ordered by title or year
    Showing 11–20 of 26 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • Next
    • Last
    • VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing

      Research Article in Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

      Jun Jiang, Meining Nie, Purui Su, Dengguo Feng
    • A Novel Web Tunnel Detection Method Based on Protocol Behaviors

      Research Article in Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

      Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang
    • An e-payment Architecture Ensuring a High Level of Privacy Protection

      Research Article in Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

      Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty, Christophe Rosenberger
    • Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege

      Research Article in Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

      Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens
    • Scalable Security Model Generation and Analysis Using -importance Measures

      Research Article in Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

      Jin Hong, Dong Kim
    • The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

      Research Article in Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

      Mehari Msgna, Konstantinos Markantonakis, Keith Mayes
    • Unveiling Privacy Setting Breaches in Online Social Networks

      Research Article in Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

      Xin Ruan, Chuan Yue, Haining Wang
    • ( − ) Oblivious Transfer Using Fully Homomorphic Encryption System

      Research Article in Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

      Mohammed Kaosar, Quazi Mamun, Rafiqul Islam, Xun Yi
    • Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs

      Research Article in Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

      Quazi Mamun, Rafiqul Islam, Mohammed Kaosar
    • Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform

      Research Article in Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

      Wafaa Abduallah, Abdul Rahma, Al-Sakib Pathan
    • First
    • Previous
    • 1
    • 2
    • 3
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL