Skip to main content
  • Conference proceedings
  • © 2015

International Conference on Security and Privacy in Communication Networks

10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Conference proceedings info: SecureComm 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (47 papers)

  1. Privacy and Wireless Security

    1. Friendly Jamming for Secure Localization in Vehicular Transportation

      • Bhaswati Deka, Ryan M. Gerdes, Ming Li, Kevin Heaslip
      Pages 212-221
    2. Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks

      • Eirini Karapistoli, Panagiotis Sarigiannidis, Anastasios A. Economides
      Pages 222-238
  2. System and Software Security

    1. Front Matter

      Pages 257-257
    2. A Simple and Novel Technique for Counteracting Exploit Kits

      • Byungho Min, Vijay Varadharajan
      Pages 259-277
    3. Policy Enforcement Point Model

      • Yosra Ben Mustapha, Hervé Debar, Gregory Blanc
      Pages 278-286
    4. Control Flow Obfuscation Using Neural Network to Fight Concolic Testing

      • Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, Debin Gao, Chunfu Jia
      Pages 287-304
    5. EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients

      • Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Daren Zha
      Pages 305-322
    6. SCADS

      • Christopher Kugler, Tilo Müller
      Pages 323-340
  3. Crypto

    1. Front Matter

      Pages 341-341
    2. Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware

      • Qianying Zhang, Shijun Zhao, Yu Qin, Dengguo Feng
      Pages 343-361
    3. TST: A New Randomness Test Method Based on Coupon Collector’s Problem

      • Qinglong Zhang, Zongbin Liu, Quanwei Cai, Ji Xiang
      Pages 362-373
    4. Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy

      • Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li, Fenghua Li
      Pages 374-394
    5. Hardware Implementation of Cryptographic Hash Function Based on Spatiotemporal Chaos

      • Yuling Luo, Junxiu Liu, Lvchen Cao, Jinjie Bi, Senhui Qiu
      Pages 395-404
    6. An Information-Theoretic Approach for Secure Protocol Composition

      • Yi-Ting Chiang, Tsan-Sheng Hsu, Churn-Jung Liau, Yun-Ching Liu, Chih-Hao Shen, Da-Wei Wang et al.
      Pages 405-423
  4. Mobile Security

    1. Front Matter

      Pages 425-425
    2. Towards a Systematic Study of the Covert Channel Attacks in Smartphones

      • Swarup Chandra, Zhiqiang Lin, Ashish Kundu, Latifur Khan
      Pages 427-435
    3. DroidKin: Lightweight Detection of Android Apps Similarity

      • Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani
      Pages 436-453
    4. Defending Blind DDoS Attack on SDN Based on Moving Target Defense

      • Duohe Ma, Zhen Xu, Dongdai Lin
      Pages 463-480

Other Volumes

  1. International Conference on Security and Privacy in Communication Networks

About this book

This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.

Editors and Affiliations

  • CAS, Institute of Information Engineering CAS, Beijing, China

    Jing Tian

  • Institute of Information Engineering, CAS, Beijing, China

    Jiwu Jing

  • IBM Thomas J. Watson Research Center, New York, USA

    Mudhakar Srivatsa

Bibliographic Information

  • Book Title: International Conference on Security and Privacy in Communication Networks

  • Book Subtitle: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

  • Editors: Jing Tian, Jiwu Jing, Mudhakar Srivatsa

  • Series Title: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

  • DOI: https://doi.org/10.1007/978-3-319-23829-6

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015

  • Softcover ISBN: 978-3-319-23828-9Published: 22 November 2015

  • eBook ISBN: 978-3-319-23829-6Published: 21 November 2015

  • Series ISSN: 1867-8211

  • Series E-ISSN: 1867-822X

  • Edition Number: 1

  • Number of Pages: XIX, 635

  • Number of Illustrations: 193 illustrations in colour

  • Topics: Systems and Data Security

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access