Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

2014 Communications Security Conference (CSC 2014)

Buy conference proceeding
$126.00
(plus tax if applicable)
  • Location: Beijing, China
  • Conference date: 22-24 May 2014
  • ISBN: 978-1-84919-844-8
  • Conference number: CP653
  • The following topics are dealt with: access control; trust management; cryptanalysis; digital signatures; distributed intrusion detection-prevention systems; denial-of-service attacks; identity management; authentication; information hiding; network forensics; quantum security communication; risk assessment; wireless network security; Web service security; cloud service security; pervasive systems; embedded systems; secret sharing; spam detection; spam prevention; malicious codes; secure communication protocol and Internet of Things security.

1 - 20 of 35 items found

  • The evaluation of complex networks' robustness based on entropy measure
  • Improved arbitrated quantum signature scheme using bell states
  • Implementation of automated testing system for android applications based on dynamic taint propagation
  • Certificateless and pairing-free key agreement scheme for satellite network
  • An approach to resist blind source separation attacks of speech signals
  • Android PBC: a pairing based cryptography toolkit for Android platform
  • A versatile cryptographic toolkit for flexible access control
  • Optimistic fair exchange of distributed signatures
  • ETCIC: An error-tolerant content integrity checking scheme in multi-cloud storing
  • Enhanced circular quantum secret sharing for remote agents
  • Research on software behavior modeling based on extended finite state automata
  • An improved Kademlia protocol with double-layer design for P2P voice communications
  • User revocation for data sharing based on broadcast CP-ABE in cloud computing
  • A secure fast handoff scheme with attribute-based access control for secure enterprise wlan
  • A Note on Certificate-based Encryption
  • Fuzz testing data generation for network protocol using classification tree
  • Software defect prediction model based on LLE and SVM
  • Detecting Community Structure in Trust Relationship Networks
  • Research on the security model of mobile application
  • A white-box CLEFIA implementation for mobile devices
1 2 | Next >
Items per page 20 | 50 | 100
This is a required field
Please enter a valid email address