Limit search to available items
Book Cover
E-book
Author SecureComm (Conference) (9th : 2013 : Sydney, N.S.W.)

Title Security and privacy in communication networks : 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers / Tanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao (eds.)
Published Cham : Springer, 2013
©2013

Copies

Description 1 online resource (xi, 420 pages) : illustrations
Series Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 1867-8211 ; 127
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ; 127, 1867-8211
Contents Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks -- Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks / Eirini Karapistoli, Anastasios A. Economides -- Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks / Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li -- CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones / Mengjun Xie, Liang Hao, Kenji Yoshigoe, Jiang Bian
Session II: Malware, Botnets, and Distributed Denial of Service -- Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets / Cui Xiang, Fang Binxing, Shi Jinqiao, Liu Chaoge -- Contrasting Permission Patterns between Clean and Malicious Android Applications / Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Batten -- DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android / Yousra Aafer, Wenliang Du, Heng Yin
Session III: Security for Emerging Technologies: VoIP, Peer-to-peer, and Cloud Computing -- Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation / Ryan Farley, Xinyuan Wang -- VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing / Jun Jiang, Meining Nie, Purui Su, Dengguo Feng -- Integrated Security Architecture for Virtual Machines / Vijay Varadharajan, Udaya Tupakula
Session IV: Encryption and Key Management -- Generic Mediated Encryption / Ibrahim Elashry, Yi Mu, Willy Susilo -- An Efficient Reconfigurable II-ONB Modular Multiplier / Li Miao, He Liangsheng, Yang Tongjie, Gao Neng, Liu Zongbin, Zhang Qinglong -- Public-Key Encryption Resilient to Linear Related-Key Attacks / Hui Cui, Yi Mu, Man Ho Au
Session V: Security in Software and Machine Learning -- Clonewise -- Detecting Package-Level Clones Using Machine Learning / Silvio Cesare, Yang Xiang, Jun Zhang -- Automatic Polymorphic Exploit Generation for Software Vulnerabilities / Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng
Session VI: Network and System Security Model -- A Novel Web Tunnel Detection Method Based on Protocol Behaviors / Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang -- Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege / Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens -- Scalable Security Model Generation and Analysis Using k-importance Measures / Jin B. Hong, Dong Seong Kim
Session VII: Security and Privacy in Pervasive and Ubiquitous Computing -- The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems / Mehari Msgna, Konstantinos Markantonakis, Keith Mayes -- An e-payment Architecture Ensuring a High Level of Privacy Protection / Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty [and others] -- Unveiling Privacy Setting Breaches in Online Social Networks / Xin Ruan, Chuan Yue, Haining Wang
ATIS 2013: 4th International Workshop on Applications and Techniques in Information Security -- Securing a Web-Based Anti-counterfeit RFID System / Belal Chowdhury, Morshed Chowdhury, Jemal Abawajy -- Security Concerns and Remedy in a Cloud Based E-learning System / Md. Anwar Hossain Masud, Md. Rafiqul Islam, Jemal Abawajy -- Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs / Quazi Mamun, Rafiqul Islam, Mohammed Kaosar -- (k -- n) Oblivious Transfer Using Fully Homomorphic Encryption System / Mohammed Kaosar, Quazi Mamun, Rafiqul Islam, Xun Yi -- Detection of Android API Call Using Logging Mechanism within Android Framework / Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai -- Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform / Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan
Summary This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor, and ad hoc networks; malware, botnets, and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer, and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing
Notes 9783319042824
Bibliography Includes bibliographical references and index
Notes English
Subject Computer networks -- Security measures -- Congresses
Computer science.
Data protection.
Data encryption (Computer science)
Electronic Data Processing
Computer networks -- Security measures
Computer science
Data encryption (Computer science)
Data protection
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Zia, Tanveer, editor
Zomaya, Albert Y., editor
Varadharajan, Vijay, editor.
Mao, Morley, editor
ISBN 9783319042831
3319042831
3319042823
9783319042824
Other Titles 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers