Skip to main content

Security and Privacy in Communication Networks

9th International ICST Conference, SecureComm 2013, Revised Selected Papers

  • Conference proceedings
  • © 2013

Overview

Included in the following conference series:

Conference proceedings info: SecureComm 2013.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (26 papers)

  1. Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks

  2. Session II: Malware, Botnets, and Distributed Denial of Service

  3. Session III: Security for Emerging Technologies: VoIP, Peer-to-peer, and Cloud Computing

  4. Session IV: Encryption and Key Management

  5. Session V: Security in Software and Machine Learning

  6. Session VI: Network and System Security Model

  7. Session VII: Security and Privacy in Pervasive and Ubiquitous Computing

Other volumes

  1. Security and Privacy in Communication Networks

Keywords

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.

Editors and Affiliations

  • School of Computing and Mathematics, Charles Sturt University, Wagga Wagga, Australia

    Tanveer Zia

  • School of Information Technologies, University of Sydney, Darlington, Australia

    Albert Zomaya

  • Department of Computing, Macquarie University, Australia, Australia

    Vijay Varadharajan

  • Department of EECS, University of Michigan, Ann Arbor, USA

    Morley Mao

Bibliographic Information

Publish with us