Security and Privacy in Communication Networks

12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings

  • Robert Deng
  • Jian Weng
  • Kui Ren
  • Vinod Yegneswaran
Conference proceedings SecureComm 2016

Table of contents

  1. Front Matter
    Pages I-XV
  2. Mobile Security I

    1. Front Matter
      Pages 1-1
    2. Zhengyang Qu, Guanyu Guo, Zhengyue Shao, Vaibhav Rastogi, Yan Chen, Hao Chen et al.
      Pages 3-23
    3. Dong Shen, Zhangkai Zhang, Xuhua Ding, Zhoujun Li, Robert Deng
      Pages 24-43
    4. Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li, Purui Su
      Pages 44-62
    5. Shaoyong Du, Yue Gao, Jingyu Hua, Sheng Zhong
      Pages 63-81
  3. Network Security

    1. Front Matter
      Pages 83-83
    2. Jianbing Ni, Kuan Zhang, Xiaodong Lin, Yong Yu, Xuemin (Sherman) Shen
      Pages 85-103
    3. Nicolae Paladi, Christian Gehrmann
      Pages 104-124
    4. Sang-Yoon Chang, Shaoying Cai, Hwajeong Seo, Yih-Chun Hu
      Pages 125-143
    5. Wei Shi, Mengfei Peng, Jean-Pierre Corriveau, William Lee Croft
      Pages 144-162
  4. Applied Cryptography

    1. Front Matter
      Pages 163-163
    2. Hui Cui, Robert H. Deng, Xuhua Ding, Yingjiu Li
      Pages 165-181
    3. Assad Umar, Iakovos Gurulian, Keith Mayes, Konstantinos Markantonakis
      Pages 182-198
    4. Tao Zhang, Xiuhua Wang, Sherman S. M. Chow
      Pages 199-218
    5. Russell W. F. Lai, Sherman S. M. Chow
      Pages 219-238
  5. ATCS Workshop - Session 1

    1. Front Matter
      Pages 239-239
    2. Pinaki Sarkar, Morshed Uddin Chowdhury
      Pages 241-256
    3. Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy
      Pages 257-270
    4. Mark Carman, Kim-Kwang Raymond Choo
      Pages 271-286

About these proceedings

Introduction

This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016.

The 32 revised full papers and 18 poster papers were carefully reviewed and selected from 137 submissions. The papers are organized thematically starting with mobile and network security, followed by applied cryptography, web security and privacy, system security, hardware security. The volume also includes papers from the ATCS workshop and the poster session.

Keywords

access control policies applied computing artificial intelligence authentification classification cloud computing computer crime computer networks data security encryption Internet intrusion detection machine learning malware mobile computing mobile devices privacy security sensors telecommunication networks

Editors and affiliations

  • Robert Deng
    • 1
  • Jian Weng
    • 2
  • Kui Ren
    • 3
  • Vinod Yegneswaran
    • 4
  1. 1.Singapore Management UniversitySingaporeSingapore
  2. 2.Jinan UniversityGuangzhouChina
  3. 3.University at BuffaloBuffaloUSA
  4. 4.SRI InternationalMenlo ParkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-59608-2
  • Copyright Information ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-59607-5
  • Online ISBN 978-3-319-59608-2
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X
  • About this book
Industry Sectors
Pharma
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace