Message from EAI President regarding COVID-19
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
SECURECOMM 2014
Other Years
Ethics and Malpractice Statement
Back to LNICST

    SECURECOMM

    International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

    SecureComm'14 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) w…

    SecureComm'14 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) will also be considered if a clear connection to private or secure communications/networking is demonstrated.

    more »
    Editor(s): Jing Tian (Institute of Information Engineering), Jiwu Jing (Institute of Information Engineering) and Mudhakar Srivatsa (IBM Thomas J. Watson Research Center)
    Publisher
    Springer
    ISBN
    978-3-319-23829-6
    ISSN
    1867-8211
    Series
    LNICST
    Conference dates
    24th–26th Sep 2014
    Location
    Beijing, China
    Appeared in EUDL
    2015-11-23
    Appears in
    SpringerLink

    Copyright © 2015–2023 ICST

    Ordered by title or year
    Showing 1–10 of 47 results
    Page size: 102550
    • 1
    • 2
    • 3
    • 4
    • 5
    • Next
    • Last
    • A Secure Architecture for Inter-cloud Virtual Machine Migration

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Tayyaba Zeb, Abdul Ghafoor, Awais Shibli, Muhammad Yousaf
    • Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Xiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu
    • An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Zhangjie Fu, Jiangang Shu, Xingming Sun
    • Policy Driven Node Selection in MapReduce

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Jingwei Li
    • STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Jingwei Li, Dan Lin, Anna Squicciarini, Chunfu Jia
    • Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Pieter Burghouwt, Marcel Spruit, Henk Sips
    • Keep the Fakes Out: Defending Against Sybil Attack in P2P Systems

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Kan Chen, Peidong Zhu, Yueshan Xiong
    • Securing Resource Discovery in Content Hosting Networks

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Sushama Karumanchi, Jingwei Li, Anna Squicciarini
    • Abusing Browser Address Bar for Fun and Profit

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen, Guofei Gu
    • Characterizing Google Hacking: A First Large-Scale Quantitative Study

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Jialong Zhang, Jayant Notani, Guofei Gu
    • 1
    • 2
    • 3
    • 4
    • 5
    • Next
    • Last
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico