Search from the table of contents of 2.5 million books
Advanced Search (Beta)
Home > Security and Privacy in Communication Networks: 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

Security and Privacy in Communication Networks: 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings


Book Informaton

Security and Privacy in Communication Networks: 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

Author

Deguang Kong, Yoon-Chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi (auth.), Sushil Jajodia, Jianying Zhou (eds.)

Series

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 50

Year of Publication

2010

Publisher

Springer-Verlag Berlin Heidelberg

Language

en

ISBN

9783642161605, 9783642161612

ARI Id

1672611044682


Find on

World Cat

OpenLibrary

Internet Archive


This page has been accessed 4 times.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Citation Options
Download Citation

Showing 1 to 20 of 29 entries
Chapters/HeadingsAuthor(s)PagesInfo
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detecti
Analyzing and Exploiting Network Behaviors of Malwa
Inexpensive Email Addresses An Email Spam-Combating Syste
Privacy Administration in Distributed Service Infrastructu
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous L
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settin
A Study on False Channel Condition Reporting Attacks in Wireless Networ
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Servic
Saving Energy on WiFi with Required IPs
Transparent Protection of Commodity OS Kernels Using Hardware Virtualizati
A Generic Construction of Dynamic Single Sign-on with Strong Securi
DeCore: Detecting Content Repurposing Attacks on Clients’ Syste
Realizing a Source Authentic Intern
Partial Deafness: A Novel Denial-of-Service Attack in 80211 Networ
Attacking Beacon-Enabled 802154 Networ
Supporting Publication and Subscription Confidentiality in Pub/Sub Networ
CED 2: Communication Efficient Disjointness Decisi
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schem
Context-Aware Usage Control for Andro
Efficient Isolation of Trusted Subsystems in Embedded Syste
Chapters/HeadingsAuthor(s)PagesInfo
Showing 1 to 20 of 29 entries