Skip to main content
  • Conference proceedings
  • © 2015

International Conference on Security and Privacy in Communication Networks

10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Conference proceedings info: SecureComm 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (47 papers)

  1. Front Matter

    Pages I-XIX
  2. Cloud Computing Security

    1. Front Matter

      Pages 1-1
    2. A Secure Architecture for Inter-cloud Virtual Machine Migration

      • Tayyaba Zeb, Abdul Ghafoor, Awais Shibli, Muhammad Yousaf
      Pages 24-35
    3. STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds

      • Jingwei Li, Dan Lin, Anna Squicciarini, Chunfu Jia
      Pages 36-44
    4. Policy Driven Node Selection in MapReduce

      • Anna C. Squicciarini, Dan Lin, Smitha Sundareswaran, Jingwei Li
      Pages 55-72
  3. Authentication and Identity

    1. Front Matter

      Pages 73-73
    2. GridMap: Enhanced Security in Cued-Recall Graphical Passwords

      • Nicolas Van Balen, Haining Wang
      Pages 75-94
    3. TPM-Based Authentication Mechanism for Apache Hadoop

      • Issa Khalil, Zuochao Dou, Abdallah Khreishah
      Pages 105-122
    4. An Authentication and Key Management Scheme for Heterogeneous Sensor Networks

      • Sarmadullah Khan, Rafiullah Khan, Inam Bari, Naveed Jan
      Pages 123-131
    5. Social Authentication Identity: An Alternate to Internet Real Name System

      • Chengcheng Shao, Liang Chen, Shuo Fan, Xinwen Jiang
      Pages 132-140
    6. On the Usability of Two-Factor Authentication

      • Ding Wang, Ping Wang
      Pages 141-150
  4. Network Security

    1. Front Matter

      Pages 151-151
    2. Securing Resource Discovery in Content Hosting Networks

      • Sushama Karumanchi, Jingwei Li, Anna Squicciarini
      Pages 153-173
    3. Keep the Fakes Out: Defending Against Sybil Attack in P2P Systems

      • Kan Chen, Peidong Zhu, Yueshan Xiong
      Pages 183-191
  5. Privacy and Wireless Security

    1. Front Matter

      Pages 193-193
    2. Anonymous Publish-Subscribe Systems

      • Binh Vo, Steven Bellovin
      Pages 195-211

Other Volumes

  1. International Conference on Security and Privacy in Communication Networks

About this book

This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.

Editors and Affiliations

  • CAS, Institute of Information Engineering CAS, Beijing, China

    Jing Tian

  • Institute of Information Engineering, CAS, Beijing, China

    Jiwu Jing

  • IBM Thomas J. Watson Research Center, New York, USA

    Mudhakar Srivatsa

Bibliographic Information

  • Book Title: International Conference on Security and Privacy in Communication Networks

  • Book Subtitle: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

  • Editors: Jing Tian, Jiwu Jing, Mudhakar Srivatsa

  • Series Title: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

  • DOI: https://doi.org/10.1007/978-3-319-23829-6

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015

  • Softcover ISBN: 978-3-319-23828-9Published: 22 November 2015

  • eBook ISBN: 978-3-319-23829-6Published: 21 November 2015

  • Series ISSN: 1867-8211

  • Series E-ISSN: 1867-822X

  • Edition Number: 1

  • Number of Pages: XIX, 635

  • Number of Illustrations: 193 illustrations in colour

  • Topics: Systems and Data Security

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access