in

International Conference on Security and Privacy in Communication Networks – Part1

International Conference on Security and Privacy in Communication Networks , Part1

This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014 The 27 regular and 17 short papers presented were carefully reviewed It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking

We do not store files and block access to them upon the first request from copyright holders.

All content posted on the site represents material that is freely available for viewing and downloading on the Internet. The collection of materials available on the Internet and their placement in the catalog is done automatically. In this case, the site administration does not exercise control over the added content.

The site administration also does not engage in activities related to the publication of unlicensed content, illegally stolen, and protected by copyright holders. The automated system only publishes links to material freely available from open sources.

The resource is always open to cooperation with copyright holders. If your exclusive rights to copyrighted objects are violated in any way using this resource (posting copyright-protected information), the administration is ready to assist you and remove/block the appropriate materials from the site.