International Conference on Security and Privacy in Communication Systems

International Conference on Security and Privacy in Communication Networks

10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

  • Jing Tian
  • Jiwu Jing
  • Mudhakar Srivatsa
Conference proceedings

Table of contents

  1. Front Matter
    Pages I-XIX
  2. Cloud Computing Security

    1. Front Matter
      Pages 1-1
    2. Tayyaba Zeb, Abdul Ghafoor, Awais Shibli, Muhammad Yousaf
      Pages 24-35
    3. Jingwei Li, Dan Lin, Anna Squicciarini, Chunfu Jia
      Pages 36-44
    4. Anna C. Squicciarini, Dan Lin, Smitha Sundareswaran, Jingwei Li
      Pages 55-72
  3. Authentication and Identity

    1. Front Matter
      Pages 73-73
    2. Nicolas Van Balen, Haining Wang
      Pages 75-94
    3. Issa Khalil, Zuochao Dou, Abdallah Khreishah
      Pages 105-122
    4. Sarmadullah Khan, Rafiullah Khan, Inam Bari, Naveed Jan
      Pages 123-131
    5. Chengcheng Shao, Liang Chen, Shuo Fan, Xinwen Jiang
      Pages 132-140
    6. Ding Wang, Ping Wang
      Pages 141-150
  4. Network Security

    1. Front Matter
      Pages 151-151
    2. Sushama Karumanchi, Jingwei Li, Anna Squicciarini
      Pages 153-173
    3. Kan Chen, Peidong Zhu, Yueshan Xiong
      Pages 183-191
  5. Privacy and Wireless Security

    1. Front Matter
      Pages 193-193
    2. Binh Vo, Steven Bellovin
      Pages 195-211

About these proceedings


This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.


Android Attacks Authentication Cloud computing Cryptography Cyber security Encryption Identity management Intrusion detection Mobile devices Mobile security Network security Privacy Security Security of data Smartphones Software security

Editors and affiliations

  • Jing Tian
    • 1
  • Jiwu Jing
    • 2
  • Mudhakar Srivatsa
    • 3
  1. 1.CASInstitute of Information Engineering CASBeijingChina
  2. 2.Institute of Information Engineering, CASBeijingChina
  3. 3.IBM Thomas J. Watson Research CenterNew YorkUSA

Bibliographic information

  • DOI
  • Copyright Information Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-23828-9
  • Online ISBN 978-3-319-23829-6
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X
  • About this book