Skip to main content
  • Conference proceedings
  • © 2010

Security and Privacy in Communication Networks

6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings

  • Up to date results
  • Fast conference proceedings
  • State-of-the-art report

Conference proceedings info: SecureComm 2010.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

  2. Malware and Email Security

    1. SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection

      • Deguang Kong, Yoon-Chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi
      Pages 1-19
    2. Analyzing and Exploiting Network Behaviors of Malware

      • Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi Sandhu
      Pages 20-34
    3. Inexpensive Email Addresses An Email Spam-Combating System

      • Aram Yegenian, Tassos Dimitriou
      Pages 35-52
  3. Anonymity and Privacy

    1. Privacy Administration in Distributed Service Infrastructure

      • Nabil Ajam, Nora Cuppens-Boulahia, Frederic Cuppens
      Pages 53-70
    2. On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS

      • Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley
      Pages 71-88
  4. Systems Security – I

    1. Transparent Protection of Commodity OS Kernels Using Hardware Virtualization

      • Michael Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang et al.
      Pages 162-180
    2. A Generic Construction of Dynamic Single Sign-on with Strong Security

      • Jinguang Han, Yi Mu, Willy Susilo, Jun Yan
      Pages 181-198
    3. DeCore: Detecting Content Repurposing Attacks on Clients’ Systems

      • Smitha Sundareswaran, Anna C. Squicciarini
      Pages 199-216
  5. Network Security – I

    1. Realizing a Source Authentic Internet

      • Toby Ehrenkranz, Jun Li, Patrick McDaniel
      Pages 217-234
    2. Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks

      • Jihyuk Choi, Jerry T. Chiang, Dongho Kim, Yih-Chun Hu
      Pages 235-252
    3. Attacking Beacon-Enabled 802.15.4 Networks

      • Sang Shin Jung, Marco Valero, Anu Bourgeois, Raheem Beyah
      Pages 253-271
    4. Supporting Publication and Subscription Confidentiality in Pub/Sub Networks

      • Mihaela Ion, Giovanni Russello, Bruno Crispo
      Pages 272-289
  6. Security Protocols – I

    1. CED2: Communication Efficient Disjointness Decision

      • Luciana Marconi, Mauro Conti, Roberto Di Pietro
      Pages 290-306
    2. Context-Aware Usage Control for Android

      • Guangdong Bai, Liang Gu, Tao Feng, Yao Guo, Xiangqun Chen
      Pages 326-343

Other Volumes

  1. Security and Privacy in Communication Networks

Editors and Affiliations

  • Center for Secure Information Systems, George Mason University, Fairfax, USA

    Sushil Jajodia

  • Institute for Infocomm Research, South Tower, Singapore

    Jianying Zhou

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access