About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
SECURECOMM 2014
Other Years
Ethics and Malpractice Statement
Back to LNICST

    SECURECOMM

    International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

    SecureComm'14 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) w…

    SecureComm'14 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) will also be considered if a clear connection to private or secure communications/networking is demonstrated.

    more »
    Editor(s): Jing Tian (Institute of Information Engineering), Jiwu Jing (Institute of Information Engineering) and Mudhakar Srivatsa (IBM Thomas J. Watson Research Center)
    Publisher
    Springer
    ISBN
    978-3-319-23829-6
    ISSN
    1867-8211
    Series
    LNICST
    Conference dates
    24th–26th Sep 2014
    Location
    Beijing, China
    Appeared in EUDL
    2015-11-23
    Appears in
    SpringerLink

    Copyright © 2015–2025 ICST

    Ordered by title or year
    Showing 1–10 of 47 results
    Page size: 102550
    • 1
    • 2
    • 3
    • 4
    • 5
    • Next
    • Last
    • On the Usability of Two-Factor Authentication

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Ding Wang, Ping Wang
    • Social Authentication Identity: An Alternate to Internet Real Name System

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Chengcheng Shao, Liang Chen, Shuo Fan, Xinwen Jiang
    • TPM-Based Authentication Mechanism for Apache Hadoop

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Issa Khalil, Zuochao Dou, Abdallah Khreishah
    • UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Yazhe Wang, Mingming Hu, Chen Li
    • GridMap: Enhanced Security in Cued-Recall Graphical Passwords

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Nicolas Balen, Haining Wang
    • An Authentication and Key Management Scheme for Heterogeneous Sensor Networks

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Sarmadullah Khan, Rafiullah Khan, Inam Bari, Naveed Jan
    • Hybrid Detection Using Permission Analysis for Android Malware

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Haofeng Jiao, Xiaohong Li, Lei Zhang, Guangquan Xu, Zhiyong Feng
    • Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Léa Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Wael Kanoun, Samuel Dubus
    • Detection of Food Safety Topics Based on SPLDAs

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Jinshuo Liu, Yabo Li, Yingyue Peng, Juan Deng, Xin Chen
    • Research on Credible Regulation Mechanism for the Trading of Digital Works

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Guozhen Shi, Ying Shen, Fenghua Li, Mang Su, Dong Liu
    • 1
    • 2
    • 3
    • 4
    • 5
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL