Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/securecomm/securecomm2013.bht:"
@inproceedings{DBLP:conf/securecomm/AaferDY13, author = {Yousra Aafer and Wenliang Du and Heng Yin}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {86--103}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_6}, doi = {10.1007/978-3-319-04283-1\_6}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/AaferDY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AbduallahRP13, author = {Wafaa Mustafa Abduallah and Abdul Monem S. Rahma and Al{-}Sakib Khan Pathan}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {405--417}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_26}, doi = {10.1007/978-3-319-04283-1\_26}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/AbduallahRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AvondsSAP13, author = {Niels Avonds and Raoul Strackx and Pieter Agten and Frank Piessens}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {252--269}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_16}, doi = {10.1007/978-3-319-04283-1\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/AvondsSAP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/CesareXZ13, author = {Silvio Cesare and Yang Xiang and Jun Zhang}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Clonewise - Detecting Package-Level Clones Using Machine Learning}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {197--215}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_13}, doi = {10.1007/978-3-319-04283-1\_13}, timestamp = {Sun, 11 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/CesareXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ChowdhuryCA13, author = {Belal Chowdhury and Morshed U. Chowdhury and Jemal H. Abawajy}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Securing a Web-Based Anti-counterfeit {RFID} System}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {342--355}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_21}, doi = {10.1007/978-3-319-04283-1\_21}, timestamp = {Mon, 28 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ChowdhuryCA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/CuiFSL13, author = {Xiang Cui and Binxing Fang and Jinqiao Shi and Chaoge Liu}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {53--68}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_4}, doi = {10.1007/978-3-319-04283-1\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/CuiFSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/CuiMA13, author = {Hui Cui and Yi Mu and Man Ho Au}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Public-Key Encryption Resilient to Linear Related-Key Attacks}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {182--196}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_12}, doi = {10.1007/978-3-319-04283-1\_12}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/CuiMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ElashryMS13, author = {Ibrahim F. Elashry and Yi Mu and Willy Susilo}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Generic Mediated Encryption}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {154--168}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_10}, doi = {10.1007/978-3-319-04283-1\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ElashryMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/FarleyW13, author = {Ryan Farley and Xinyuan Wang}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {104--121}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_7}, doi = {10.1007/978-3-319-04283-1\_7}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/FarleyW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/HongK13, author = {Jin B. Hong and Dong Seong Kim}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Scalable Security Model Generation and Analysis Using k-importance Measures}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {270--287}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_17}, doi = {10.1007/978-3-319-04283-1\_17}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/HongK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/JiangNSF13, author = {Jun Jiang and Meining Nie and Purui Su and Dengguo Feng}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {122--139}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_8}, doi = {10.1007/978-3-319-04283-1\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/JiangNSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KaosarMIY13, author = {Mohammed Kaosar and Quazi Mamun and Md. Rafiqul Islam and Xun Yi}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {380--392}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_24}, doi = {10.1007/978-3-319-04283-1\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KaosarMIY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KarapistoliE13, author = {Eirini D. Karapistoli and Anastasios A. Economides}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Anomaly Detection in Beacon-Enabled {IEEE} 802.15.4 Wireless Sensor Networks}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {1--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_1}, doi = {10.1007/978-3-319-04283-1\_1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/KarapistoliE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LiHYGLZ13, author = {Miao Li and Liangsheng He and Tongjie Yang and Neng Gao and Zongbin Liu and Qinglong Zhang}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {An Efficient Reconfigurable {II-ONB} Modular Multiplier}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {169--181}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_11}, doi = {10.1007/978-3-319-04283-1\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LiHYGLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MamunIK13, author = {Quazi Mamun and Md. Rafiqul Islam and Mohammed Kaosar}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {367--379}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_23}, doi = {10.1007/978-3-319-04283-1\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/MamunIK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MasudIA13, author = {Md. Anwar Hossain Masud and Md. Rafiqul Islam and Jemal H. Abawajy}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Security Concerns and Remedy in a Cloud Based E-learning System}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {356--366}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_22}, doi = {10.1007/978-3-319-04283-1\_22}, timestamp = {Mon, 28 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/MasudIA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MoonsamyRLLB13, author = {Veelasha Moonsamy and Jia Rong and Shaowu Liu and Gang Li and Lynn Margaret Batten}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Contrasting Permission Patterns between Clean and Malicious Android Applications}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {69--85}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_5}, doi = {10.1007/978-3-319-04283-1\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/MoonsamyRLLB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MsgnaMM13, author = {Mehari Msgna and Konstantinos Markantonakis and Keith Mayes}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {288--304}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_18}, doi = {10.1007/978-3-319-04283-1\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/MsgnaMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/NishimotoKMHS13, author = {Yuuki Nishimoto and Naoya Kajiwara and Shinichi Matsumoto and Yoshiaki Hori and Kouichi Sakurai}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Detection of Android {API} Call Using Logging Mechanism within Android Framework}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {393--404}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_25}, doi = {10.1007/978-3-319-04283-1\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/NishimotoKMHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/PlateauxLCVMR13, author = {Aude Plateaux and Patrick Lacharme and Vincent Coquet and Sylvain Vernois and Kumar Murty and Christophe Rosenberger}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {An e-payment Architecture Ensuring a High Level of Privacy Protection}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {305--322}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_19}, doi = {10.1007/978-3-319-04283-1\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/PlateauxLCVMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/RuanYW13, author = {Xin Ruan and Chuan Yue and Haining Wang}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Unveiling Privacy Setting Breaches in Online Social Networks}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {323--341}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_20}, doi = {10.1007/978-3-319-04283-1\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/RuanYW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/VaradharajanT13, author = {Vijay Varadharajan and Udaya Kiran Tupakula}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Integrated Security Architecture for Virtual Machines}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {140--153}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_9}, doi = {10.1007/978-3-319-04283-1\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/VaradharajanT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WangHCMY13, author = {Fei Wang and Liusheng Huang and Zhili Chen and Haibo Miao and Wei Yang}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {A Novel Web Tunnel Detection Method Based on Protocol Behaviors}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {234--251}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_15}, doi = {10.1007/978-3-319-04283-1\_15}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/WangHCMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WangSLYYF13, author = {Minghua Wang and Purui Su and Qi Li and Lingyun Ying and Yi Yang and Dengguo Feng}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Automatic Polymorphic Exploit Generation for Software Vulnerabilities}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {216--233}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_14}, doi = {10.1007/978-3-319-04283-1\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/WangSLYYF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/XieHYB13, author = {Mengjun Xie and Liang Hao and Kenji Yoshigoe and Jiang Bian}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {CamTalk: {A} Bidirectional Light Communications Framework for Secure Communications on Smartphones}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {35--52}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_3}, doi = {10.1007/978-3-319-04283-1\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/XieHYB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhouLZXL13, author = {Ting Zhou and Yaping Lin and Wei Zhang and Sheng Xiao and Jinguo Li}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {19--34}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_2}, doi = {10.1007/978-3-319-04283-1\_2}, timestamp = {Tue, 19 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ZhouLZXL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2013, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1}, doi = {10.1007/978-3-319-04283-1}, isbn = {978-3-319-04282-4}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.