International Conference on Security and Privacy in Communication Systems

Security and Privacy in Communication Networks

11th EAI International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Proceedings

  • Bhavani Thuraisingham
  • XiaoFeng Wang
  • Vinod Yegneswaran

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Mobile, System and Software Security

    1. Front Matter
      Pages 1-1
    2. Yuan Zhang, Min Yang, Guofei Gu, Hao Chen
      Pages 3-22
    3. Yongfeng Li, Tong Shen, Xin Sun, Xuerui Pan, Bing Mao
      Pages 23-40
    4. Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu
      Pages 58-77
    5. Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander
      Pages 97-115
    6. Jidong Xiao, Hai Huang, Haining Wang
      Pages 116-134
    7. Jidong Xiao, Hai Huang, Haining Wang
      Pages 135-154
  3. Cloud Security

    1. Front Matter
      Pages 155-155
    2. Hao Sun, Xiaofeng Wang, Jinshu Su, Peixin Chen
      Pages 157-174
    3. Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu et al.
      Pages 175-192
    4. Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding, Qingni Shen
      Pages 193-211
    5. Xiaojun Xiao, Yaping Lin, Wei Zhang, Xin Yao, Qi Gu
      Pages 212-229
  4. Privacy and Side Channels

    1. Front Matter
      Pages 231-231
    2. Indrajeet Singh, Masoud Akhoondi, Mustafa Y. Arslan, Harsha V. Madhyastha, Srikanth V. Krishnamurthy
      Pages 233-255
    3. Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen
      Pages 256-276
    4. Priyabrat Dash, Chris Perkins, Ryan M. Gerdes
      Pages 294-310

About these proceedings


This volume constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Security and Privacy in Communication Networks, SecureComm 2015, held in Dallas, TX, USA, in October 2015.

The 29 regular and 10 poster papers presented were carefully reviewed and selected from 107 submissions. It also presents 9 papers accepted of the workshop on Applications and Techniques in Cyber Security, ATCS 2015.

The papers are grouped in the following topics: mobile, system, and software security; cloud security; privacy and side channels; Web and network security; crypto, protocol, and model.


Android anomaly detection attacks authentication cloud computing cryptography cyber security encryption identity management intrusion detection mobile devices mobile security network security privacy security security of data side channels smartphones software security

Editors and affiliations

  • Bhavani Thuraisingham
    • 1
  • XiaoFeng Wang
    • 2
  • Vinod Yegneswaran
    • 3
  1. 1.The University of Texas at DallasRichardsonUSA
  2. 2.Indiana University at BloomingtonBloomingtonUSA
  3. 3.SRI InternationalMenlo ParkUSA

Bibliographic information

  • DOI
  • Copyright Information Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-28864-2
  • Online ISBN 978-3-319-28865-9
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X
  • About this book