About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
SECURECOMM 2014
Other Years
Ethics and Malpractice Statement
Back to LNICST

    SECURECOMM

    International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

    SecureComm'14 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) w…

    SecureComm'14 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) will also be considered if a clear connection to private or secure communications/networking is demonstrated.

    more »
    Editor(s): Jing Tian (Institute of Information Engineering), Jiwu Jing (Institute of Information Engineering) and Mudhakar Srivatsa (IBM Thomas J. Watson Research Center)
    Publisher
    Springer
    ISBN
    978-3-319-23829-6
    ISSN
    1867-8211
    Series
    LNICST
    Conference dates
    24th–26th Sep 2014
    Location
    Beijing, China
    Appeared in EUDL
    2015-11-23
    Appears in
    SpringerLink

    Copyright © 2015–2025 ICST

    Ordered by title or year
    Showing 21–30 of 47 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • 5
    • Next
    • Last
    • Function Escalation Attack

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Chen Cao, Yuqing Zhang, Qixu Liu, Kai Wang
    • Hardware Implementation of Cryptographic Hash Function Based on Spatiotemporal Chaos

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Yuling Luo, Junxiu Liu, Lvchen Cao, Jinjie Bi, Senhui Qiu
    • TST: A New Randomness Test Method Based on Coupon Collector’s Problem

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Qinglong Zhang, Zongbin Liu, Quanwei Cai, Ji Xiang
    • An Information-Theoretic Approach for Secure Protocol Composition

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Yi-Ting Chiang, Tsan-Sheng Hsu, Churn-Jung Liau, Yun-Ching Liu, Chih-Hao Shen, Da-Wei Wang, Justin Zhan
    • Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Qianying Zhang, Shijun Zhao, Yu Qin, Dengguo Feng
    • Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li, Fenghua Li
    • A Simple and Novel Technique for Counteracting Exploit Kits

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Byungho Min, Vijay Varadharajan
    • EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Daren Zha
    • Control Flow Obfuscation Using Neural Network to Fight Concolic Testing

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, Debin Gao, Chunfu Jia
    • SCADS

      Research Article in International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

      Christopher Kugler, Tilo Müller
    • First
    • Previous
    • 1
    • 2
    • 3
    • 4
    • 5
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL