Advertisement

Security and Privacy in Communication Networks

6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

  • Sushil Jajodia
  • Jianying Zhou
Conference proceedings SecureComm 2010

Table of contents

  1. Front Matter
  2. Malware and Email Security

    1. Deguang Kong, Yoon-Chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi
      Pages 1-19
    2. Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi Sandhu
      Pages 20-34
    3. Aram Yegenian, Tassos Dimitriou
      Pages 35-52
  3. Anonymity and Privacy

    1. Nabil Ajam, Nora Cuppens-Boulahia, Frederic Cuppens
      Pages 53-70
    2. Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley
      Pages 71-88
  4. Wireless Security

  5. Systems Security – I

    1. Michael Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang et al.
      Pages 162-180
    2. Jinguang Han, Yi Mu, Willy Susilo, Jun Yan
      Pages 181-198
    3. Smitha Sundareswaran, Anna C. Squicciarini
      Pages 199-216
  6. Network Security – I

    1. Toby Ehrenkranz, Jun Li, Patrick McDaniel
      Pages 217-234
    2. Jihyuk Choi, Jerry T. Chiang, Dongho Kim, Yih-Chun Hu
      Pages 235-252
    3. Sang Shin Jung, Marco Valero, Anu Bourgeois, Raheem Beyah
      Pages 253-271
    4. Mihaela Ion, Giovanni Russello, Bruno Crispo
      Pages 272-289
  7. Security Protocols – I

    1. Luciana Marconi, Mauro Conti, Roberto Di Pietro
      Pages 290-306
    2. Guangdong Bai, Liang Gu, Tao Feng, Yao Guo, Xiangqun Chen
      Pages 326-343
  8. System Security – II

    1. Raoul Strackx, Frank Piessens, Bart Preneel
      Pages 344-361
    2. Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu
      Pages 362-379
    3. Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman
      Pages 380-397
  9. Security Protocols – II

    1. Sean Whalen, Matt Bishop, James P. Crutchfield
      Pages 415-428
  10. Network Security – II

    1. Andrew Kalafut, Minaxi Gupta, Pairoj Rattadilok, Pragneshkumar Patel
      Pages 448-465
    2. Sooel Son, Vitaly Shmatikov
      Pages 466-483
    3. Ralf Küsters, Henning Schnoor, Tomasz Truderung
      Pages 484-497
  11. Back Matter

About these proceedings

Keywords

Broadcast Host Internet Online Overlay Protection Quorum anonoymity denial of service email security embedded systems network security privacy spam wireless security

Editors and affiliations

  • Sushil Jajodia
    • 1
  • Jianying Zhou
    • 2
  1. 1.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA
  2. 2.Institute for Infocomm ResearchSouth TowerSingapore

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-16161-2
  • Copyright Information Springer Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-16160-5
  • Online ISBN 978-3-642-16161-2
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering