This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020.
Boyd, S., Parikh, N., Chu, E., Peleato, B., Eckstein, J.: Distributed optimization and statistical learning via the alternating direction method of multipliers. Found. Trends Mach. Learn. 3(1), 1–122 (2011) 5.
Unfortunately, mobile social networks may occasionally leak sensitive infor‐mation [1] and thus privacy concerns has become a fundamental issue [2]. For example, the location information of mobile social network users can be used to ...
... made by the monitored program and log the following information: (a) the PC value from where the system call was invoked, (b) values of arguments, and (c) the call stack information which contains a set of absolute return addresses.
Pulsar unites two research areas from computer security in the scope of network protocols: First, we reverse engineer the protocol by automatic inference and second, based on the learned specification fuzzy testing is applied to the ...
This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016.
This book constitutes the thoroughly refereed proceedings of the 6th International ICST Conference, SecureComm 2010, held in Singapore in September 2010. The 28 revised full papers were carefully reviewed and selected from 112 submissions.
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021.
... stream cipher based on nonlinear dynamic system. In: 2018 26th European Signal Processing Conference (EUSIPCO), pp ... RC4 Stream Cipher and its Variants. CRC Press, New York (2011) 29. Salmon, J.K., Moraes, M.A., Dror, R.O., Shaw, D.E. ...
... Beyond diversity of programming languages, there are other reasons that present significant challenges to attribution process in practice. Since source code is not always available, attribution is expected to be performed on a mixed set ...
... strangers aware of possible inclusion in a photo when the photo is being taken, allowing them to determine whether to blur their face in the photo or not, and protects strangers' privacy under both indoor and outdoor scenarios, without ...
8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers ... Proceedings of ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT) Student Workshop ...