Security in emerging wireless communication and networking systems : First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009 : revised selected papers / edited by Qijun Gu, Wanyu Zang, Meng Yu
- 作者: SEWCN 2009 (2009 : Athens, Greece)
- 其他作者:
- 其他題名:
- Springer eBooks
- First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009 : revised selected papers
- 出版: Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg 2010
- 叢書名: Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ,42
- 主題: Wireless communication systems--Security measures--Congresses. , Data encryption (Computer science)--Congresses. , Systems and Data Security. , Data Encryption. , Computer communication networks , Computer science , Coding and Information Theory. , Data Structures, Cryptology and Information Theory. , Computer Systems Organization and Communication Networks.
- ISBN: 9783642115264 (electronic bk.) 、 9783642115257 (paper)
- URL:
電子書
-
讀者標籤:
- 系統號: 005161193 | 機讀編目格式
館藏資訊
The First ICST International Workshop on Security in Emerging Wireless Commu- cation and Networking Systems (SEWCN 2009) was held in Athens, Greece, Sept- ber 14, in conjunction with SecureComm 2009. SEWCN 2009 was sponsored by the Institute for Computer Sciences, Social-Informatics and Telecommunications En- neering (ICST). The Workshop Chairs were Qijun Gu from Texas State University- San Marcos, USA, and Wanyu Zang from Western Illinois University, USA. The workshop invited 20 researchers from academia and industry around the world in the areas of networking and security to form the Program Committee. The workshop received nine submissions and each submission received two or three double-blind reviews. The review process started on July 6 and ended on July 27. In all, 21 reviews were received. Based on the review scores and comments, seven papers with average score 0 or better were accepted for presentation and inclusion in the workshop proceedings. The workshop emphasized new ideas for secure architectures and protocols to - hance the emerging wireless systems. The accepted papers cover topics on applied cryptography, key management, vulnerability analysis, privacy, authentication, and intrusion detection for emerging wireless systems. The papers were presented in two sessions, chaired by Nikolaos Preve from the National Technical University of A- ens, Greece, and Theofilos Chrysikos from the University of Patras, Greece.