Security and privacy in communication networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers /

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submis...

Full description

Corporate Authors: SecureComm (Conference) Sydney, N.S.W.)
Other Authors: SecureComm (Conference), Zia, Tanveer,, Zomaya, Albert Y.,, Varadharajan, Vijay,, Mao, Morley,, SpringerLink (Online service)
Format: eBook
Language: English
Published: Cham : Springer, 2013.
Physical Description: 1 online resource (xi, 420 pages) : illustrations.
Series: Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ; 127.
Subjects:
LEADER 09938cam a2201261Mi 4500
001 868638903
003 OCoLC
005 20240223121953.0
006 m o d
007 cr |||||||||||
008 140121t20132013gw a ob 101 0 eng d
019 |a 1196138215  |a 1197542747 
020 |a 9783319042831  |q (electronic bk.) 
020 |a 3319042831  |q (electronic bk.) 
020 |a 3319042823  |q (print) 
020 |a 9783319042824  |q (print) 
020 |z 9783319042824 
024 8 |a 10.1007/978-3-319-04283-1 
035 |a (OCoLC)868638903  |z (OCoLC)1196138215  |z (OCoLC)1197542747 
040 |a DKDLA  |b eng  |e rda  |e pn  |c DKDLA  |d OCLCO  |d SFB  |d GZM  |d GW5XE  |d ZMC  |d COO  |d OCLCO  |d OCLCF  |d YDXCP  |d OCL  |d OCLCO  |d EBLCP  |d OCLCQ  |d OCLCO  |d DIBIB  |d OCLCO  |d Z5A  |d ESU  |d OCLCQ  |d IOG  |d NJR  |d MERUC  |d CEF  |d OCLCQ  |d U3W  |d AU@  |d OCLCQ  |d WYU  |d YOU  |d TKN  |d OL$  |d OCLCQ  |d AJS  |d COM  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
049 |a COM6 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
111 2 |a SecureComm (Conference)  |n (9th :  |d 2013 :  |c Sydney, N.S.W.) 
245 1 0 |a Security and privacy in communication networks :  |b 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers /  |c Tanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao (eds.). 
246 3 0 |a 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers. 
264 1 |a Cham :  |b Springer,  |c 2013. 
264 4 |c ©2013. 
300 |a 1 online resource (xi, 420 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file  |b PDF  |2 rda. 
490 1 |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,  |x 1867-8211 ;  |v 127. 
500 |a 9783319042824. 
504 |a Includes bibliographical references and index. 
505 0 0 |g Session I:  |t Security & Privacy in Mobile, Sensor, and Ad Hoc Networks --  |t Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks /  |r Eirini Karapistoli, Anastasios A. Economides --  |t Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks /  |r Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li --  |t CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones /  |r Mengjun Xie, Liang Hao, Kenji Yoshigoe, Jiang Bian. 
505 8 0 |g Session II:  |t Malware, Botnets, and Distributed Denial of Service --  |t Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets /  |r Cui Xiang, Fang Binxing, Shi Jinqiao, Liu Chaoge --  |t Contrasting Permission Patterns between Clean and Malicious Android Applications /  |r Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Batten --  |t DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android /  |r Yousra Aafer, Wenliang Du, Heng Yin. 
505 8 0 |g Session III:  |t Security for Emerging Technologies: VoIP, Peer-to-peer, and Cloud Computing --  |t Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation /  |r Ryan Farley, Xinyuan Wang --  |t VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing /  |r Jun Jiang, Meining Nie, Purui Su, Dengguo Feng --  |t Integrated Security Architecture for Virtual Machines /  |r Vijay Varadharajan, Udaya Tupakula. 
505 8 0 |g Session IV:  |t Encryption and Key Management --  |t Generic Mediated Encryption /  |r Ibrahim Elashry, Yi Mu, Willy Susilo --  |t An Efficient Reconfigurable II-ONB Modular Multiplier /  |r Li Miao, He Liangsheng, Yang Tongjie, Gao Neng, Liu Zongbin, Zhang Qinglong --  |t Public-Key Encryption Resilient to Linear Related-Key Attacks /  |r Hui Cui, Yi Mu, Man Ho Au. 
505 8 0 |g Session V:  |t Security in Software and Machine Learning --  |t Clonewise -- Detecting Package-Level Clones Using Machine Learning /  |r Silvio Cesare, Yang Xiang, Jun Zhang --  |t Automatic Polymorphic Exploit Generation for Software Vulnerabilities /  |r Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng. 
505 8 0 |g Session VI:  |t Network and System Security Model --  |t A Novel Web Tunnel Detection Method Based on Protocol Behaviors /  |r Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang --  |t Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege /  |r Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens --  |t Scalable Security Model Generation and Analysis Using k-importance Measures /  |r Jin B. Hong, Dong Seong Kim. 
505 8 0 |g Session VII:  |t Security and Privacy in Pervasive and Ubiquitous Computing --  |t The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems /  |r Mehari Msgna, Konstantinos Markantonakis, Keith Mayes --  |t An e-payment Architecture Ensuring a High Level of Privacy Protection /  |r Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty [and others] --  |t Unveiling Privacy Setting Breaches in Online Social Networks /  |r Xin Ruan, Chuan Yue, Haining Wang. 
505 8 0 |t ATIS 2013: 4th International Workshop on Applications and Techniques in Information Security --  |t Securing a Web-Based Anti-counterfeit RFID System /  |r Belal Chowdhury, Morshed Chowdhury, Jemal Abawajy --  |t Security Concerns and Remedy in a Cloud Based E-learning System /  |r Md. Anwar Hossain Masud, Md. Rafiqul Islam, Jemal Abawajy --  |t Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs /  |r Quazi Mamun, Rafiqul Islam, Mohammed Kaosar --  |t (k -- n) Oblivious Transfer Using Fully Homomorphic Encryption System /  |r Mohammed Kaosar, Quazi Mamun, Rafiqul Islam, Xun Yi --  |t Detection of Android API Call Using Logging Mechanism within Android Framework /  |r Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai --  |t Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform /  |r Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan. 
520 8 |a This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor, and ad hoc networks; malware, botnets, and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer, and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing. 
546 |a English. 
650 0 |a Computer networks  |x Security measures  |v Congresses. 
650 0 |a Computer science. 
650 0 |a Data protection. 
650 0 |a Data encryption (Computer science) 
650 2 |a Electronic Data Processing. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Congrès. 
650 6 |a Informatique. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Chiffrement (Informatique) 
650 7 |a Computer networks  |x Security measures.  |2 fast. 
650 7 |a Computer science.  |2 fast. 
650 7 |a Data encryption (Computer science)  |2 fast. 
650 7 |a Data protection.  |2 fast. 
655 2 |a Congress. 
655 7 |a proceedings (reports)  |2 aat. 
655 7 |a Conference papers and proceedings.  |2 fast. 
655 7 |a Conference papers and proceedings.  |2 lcgft. 
655 7 |a Actes de congrès.  |2 rvmgf. 
700 1 |a Zia, Tanveer,  |e editor. 
700 1 |a Zomaya, Albert Y.,  |e editor. 
700 1 |a Varadharajan, Vijay,  |e editor. 
700 1 |a Mao, Morley,  |e editor. 
710 2 |a SpringerLink (Online service) 
776 0 8 |i Printed edition:  |z 9783319042824. 
830 0 |a Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;  |v 127.  |x 1867-8211. 
907 |a .b42276834  |b multi  |c -  |d 140527  |e 240401 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g gw   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comp, in 2022.12 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE Comp, 2017.10 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
933 |a Marcive found issue: "700 1   |a Mao, Morley,  |e editor." 
933 |a Marcive found issue: "700 1   |a Zia, Tanveer,  |e editor." 
933 |a Marcive found issue: "111 2   |a SecureComm (Conference)  |n (9th :  |d 2013 :  |c Sydney, N.S.W.)" 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2022.12 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.10 
995 |a Loaded with m2btab.ltiac in 2017.10 
995 |a Loaded with m2btab.ltiac in 2017.08 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a OCLC offline update by CMU 
995 |a Loaded with m2btab.auth in 2021.07 
995 |a Loaded with m2btab.auth in 2021.07 
995 |a Loaded with m2btab.auth in 2021.07 
995 |a Loaded with m2btab.auth in 2024.03 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i15036734x  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-319-04283-1  |3 SpringerLink  |z Click here for access