Security and Privacy in Communication Networks

7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers

  • Muttukrishnan Rajarajan
  • Fred Piper
  • Haining Wang
  • George Kesidis
Conference proceedings SecureComm 2011
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 96)

Table of contents

  1. Front Matter
  2. Network Intrusion Detection

    1. Harald Lampesberger, Philipp Winter, Markus Zeilinger, Eckehard Hermann
      Pages 19-38
    2. Gaspar Modelo-Howard, Jevin Sweval, Saurabh Bagchi
      Pages 39-58
  3. Anonymity and Privacy (I)

    1. Saman Zarandioon, Danfeng (Daphne) Yao, Vinod Ganapathy
      Pages 59-76
    2. Benedikt Westermann, Pern Hui Chia, Dogan Kesdogan
      Pages 77-95
  4. Wireless Security (I)

    1. Stephen Glass, Vallipuram Muthukkumarasamy, Marius Portmann, Matthew Robert
      Pages 116-133
    2. Seyed Ali Ahmadzadeh, Gordon Agnew
      Pages 134-153
    3. Chowdhury Sayeed Hyder, Brendan Grebur, Li Xiao
      Pages 154-171
  5. System Security

    1. Jin Han, Qiang Yan, Robert H. Deng, Debin Gao
      Pages 172-189
    2. Deguang Kong, Donghai Tian, Peng Liu, Dinghao Wu
      Pages 190-208
  6. Anonymity and Privacy (II)

    1. Lie Qu, Guilin Wang, Yi Mu
      Pages 227-242
    2. Cristina Romero-Tris, Jordi Castellà-Roca, Alexandre Viejo
      Pages 261-280
  7. DNS and Routing Security

    1. Shimrit Tzur-David, Kiril Lashchiver, Danny Dolev, Tal Anker
      Pages 303-318
    2. Amir Herzberg, Haya Shulman
      Pages 319-336
  8. Key Management

    1. Viet Pham, Tuomas Aura
      Pages 337-355

About these proceedings

Introduction

This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.

Keywords

attacks authentication and authorization cloud computing enterprise systems protocols

Editors and affiliations

  • Muttukrishnan Rajarajan
    • 1
  • Fred Piper
    • 2
  • Haining Wang
    • 3
  • George Kesidis
    • 4
  1. 1.City University LondonLondonUK
  2. 2.Royal Holloway University of LondonEgham HillUK
  3. 3.College of William and MaryWilliamsburgUSA
  4. 4.Pennsylvania State UniversityUniversity ParkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-31909-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-31908-2
  • Online ISBN 978-3-642-31909-9
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X