default search action
11th TrustCom 2012: Liverpool, United Kingdom
- Geyong Min, Yulei Wu, Lei (Chris) Liu, Xiaolong Jin, Stephen A. Jarvis, Ahmed Yassin Al-Dubai:
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2172-3
TrustCom-2012: The 11th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications
Attack and Defense
- Rosanne English, Ron Poet:
The Effectiveness of Intersection Attack Countermeasures for Graphical Passwords. 1-8 - Haichang Gao, Wei Wang, Ye Fan:
Divide and Conquer: An Efficient Attack on Yahoo! CAPTCHA. 9-16 - Johannes Barnickel, Jian Wang, Ulrike Meyer:
Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode. 17-24 - Zhijun Wu, Lan Ma, Minghua Wang, Meng Yue, Lu Wang:
Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlation. 25-32 - Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. 33-40 - David Fraga, Zorana Bankovic, José Manuel Moya:
A Taxonomy of Trust and Reputation System Attacks. 41-50 - Ferdous A. Barbhuiya, S. Roopa, Ritesh Ratti, Santosh Biswas, Sukumar Nandi:
An Active Detection Mechanism for Detecting ICMP Based Attacks. 51-58
Authentication, Authorization, and Accounting
- Hisham Al-Assam, Sabah Jassim:
Robust Biometric Based Key Agreement and Remote Mutual Authentication. 59-65 - Wencheng Yang, Jiankun Hu, Song Wang:
A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication. 66-70 - Mohamed A. Sharaf:
RFID Mutual Authentication and Secret Update Protocol for Low-Cost Tags. 71-77 - Wassim Drira, Éric Renault, Djamal Zeghlache:
A Hybrid Authentication and Key Establishment Scheme for WBAN. 78-83 - Eduardo dos Santos, Jean Everson Martina, Ricardo Felipe Custódio:
Towards a Formal Verification of a Multi-factor Authentication Protocol Using Automated Theorem Provers. 84-91 - Mehdi Haddad, Mohand-Said Hacid, Robert Laurini:
Data Integration in Presence of Authorization Policies. 92-99
Trust and Cloud Computing
- Qiwei Lu, Yan Xiong, Xudong Gong, Wenchao Huang:
Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing. 100-108 - Sheikh Mahbub Habib, Sebastian Ries, Sascha Hauke, Max Mühlhäuser:
Fusion of Opinions under Uncertainty and Conflict - Application to Trust Assessment for Cloud Marketplaces. 109-118 - Dexian Chang, XiaoBo Chu, Yu Qin, Dengguo Feng:
TSD: A Flexible Root of Trust for the Cloud. 119-126 - Imad M. Abbadi:
Clouds Trust Anchors. 127-136 - Yu Shyang Tan, Ryan K. L. Ko, Peter Jagadpramana, Chun Hui Suen, Markus Kirchberg, Teck Hooi Lim, Bu-Sung Lee, Anurag Singla, Ken Mermoud, Doron Keller, Ha Duc:
Tracking of Data Leaving the Cloud. 137-144 - Vijay Varadharajan, Udaya Kiran Tupakula:
TREASURE: Trust Enhanced Security for Cloud Environments. 145-152 - Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith:
Confidentiality as a Service - Usable Security for the Cloud. 153-162 - Christopher Harrison, Devin Cook, Robert McGraw, John A. Hamilton Jr.:
Constructing a Cloud-Based IDS by Merging VMI with FMA. 163-169 - Safwan Mahmud Khan, Kevin W. Hamlen:
AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing. 170-176
Detection Scheme (1)
- Nicholas Charles Patterson, Michael Hobbs, Jemal H. Abawajy:
Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments. 177-184 - Cunqing Ma, Jingqiang Lin, Yuewu Wang:
Efficient Missing Tag Detection in a Large RFID System. 185-192 - Dijiang Huang, Sean A. Williams, Swaroop Shere:
Cheater Detection in Vehicular Networks. 193-200 - Quang-Anh Tran, Frank Jiang, Jiankun Hu:
A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays. 201-208 - Naruemon Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, Chalermpol Charnsripinyo:
A Practical Network-Based Intrusion Detection and Prevention System. 209-214 - Fei Wang, Xiaofeng Wang, Jinshu Su, Bin Xiao:
VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification. 215-222
Detection Scheme (2)
- Yuxin Meng, Wenjuan Li:
Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment. 223-230 - Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro:
An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETs. 231-238 - Hongjun Dai, Huabo Liu, Zhiping Jia, Tianzhou Chen:
A Multivariate Classification Algorithm for Malicious Node Detection in Large-Scale WSNs. 239-245 - Xin Liu, Anwitaman Datta, Hui Fang, Jie Zhang:
Detecting Imprudence of 'Reliable' Sellers in Online Auction Sites. 246-253 - Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
A Novel Scoring Model to Detect Potential Malicious Web Pages. 254-263 - Lei (Chris) Liu, Xiaolong Jin, Geyong Min, Li Xu:
Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic Analysis. 264-270
Parallel and Distributed Systems
- Jiangshan Yu, Guilin Wang, Yi Mu:
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks. 271-278 - Mohammad Ashiqur Rahman, Libin Bai, Mohamed Shehab, Ehab Al-Shaer:
Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid. 279-286 - Guanghai Cui, Mingchu Li, Zhen Wang, Linlin Tian, Jianhua Ma:
Analysis and Evaluation Framework Based on Spatial Evolutionary Game Theory for Incentive Mechanism in Peer-to-Peer Network. 287-294 - Yi-Ruei Chen, Wen-Guey Tzeng:
Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation. 295-302 - Yuanbo Guo, Jianfeng Ma, Chao Wang, Liangmin Wang:
Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs. 303-309 - Su Chen, Yi Chen, Hai Jiang, Laurence Tianruo Yang, Kuan-Ching Li:
A Secure Distributed File System Based on Revised Blakley's Secret Sharing Scheme. 310-317
E-commerce and E-government
- Haibin Zhang, Yan Wang, Xiuzhen Zhang:
Efficient Contextual Transaction Trust Computation in E-commerce Environments. 318-325 - Huiying Duan, Feifei Liu:
Building Robust Reputation Systems in the E-commerce Environment. 326-333 - Qin Li, Jie Zhang, Keith M. Martin:
Feedback as "Shadow of the Present": An Alternative to Reputation Systems for E-marketplaces. 334-341 - Richard O. Sinnott, Christopher Bayliss, Gerson Galang, Damien Mannix, Martin Tomko:
Security Attribute Aggregation Models for E-research Collaborations. 342-349 - Zeinab Noorian, Jie Zhang, Michael W. Fleming, Stephen Marsh:
Determining the Optimal Reporting Strategy in Competitive E-marketplaces. 350-357
Privacy (1)
- Amina Hossain, Al-Amin Hossain, Sung-Jae Jang, Young-Sung Shin, Jae-Woo Chang:
K-Anonymous Cloaking Algorithm Based on Weighted Adjacency Graph for Preserving Location Privacy. 358-365 - Rajiv Bagai, Nan Jiang:
Measuring Anonymity by Profiling Probability Distributions. 366-374 - Michael Brenner, Henning Perl, Matthew Smith:
How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation. 375-382 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Privacy Preserving Application Acquisition Protocol. 383-392 - Yu-Chih Wei, Yi-Ming Chen:
An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs. 393-400 - David Pergament, Armen Aghasaryan, Jean-Gabriel Ganascia:
Reputation Diffusion Simulation for Avoiding Privacy Violation. 401-408 - Liqun Chen:
Ring Group Signatures. 409-418 - Mark Stegelmann, Dogan Kesdogan:
GridPriv: A Smart Metering Architecture Offering k-Anonymity. 419-426
Privacy (2)
- M. Francisca Hinarejos, Josep Lluís Ferrer-Gomila, Gerard Draper-Gil, Llorenç Huguet i Rotger:
Anonymity and Transferability for an Electronic Bank Check Scheme. 427-435 - Lingchen Zhang, Luning Xia, Zongbin Liu, Jiwu Jing, Yuan Ma:
Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA. 436-442 - Mamoona Naveed Asghar, Mohammad Ghanbari, Martin J. Reed:
Sufficient Encryption with Codewords and Bin-strings of H.264/SVC. 443-450 - Mark Vinkovits, Erion Elmasllari, Claudio Pastrone:
Anonymous Networking Meets Real-World Business Requirements. 451-457 - Timothy Nix, Riccardo Bettati:
Subversion Impedance in Covert Communication Networks. 458-465 - Jing Qin, Jiankun Hu, Huawei Zhao:
Simulatable Oblivious Transfer Protocols Based on Blind Signature. 466-473 - David Herges, Naim Asaj, Bastian Könings, Florian Schaub, Michael Weber:
Ginger: An Access Control Framework for Telematics Applications. 474-481 - Marcelo Henrique Souza Bomfim, R. A. Gontijo, Alexandre Queiroz Bracarense, Eduardo Jose Lima II:
Overhauling of a ASEA Robot IR6 with Open Architecture. 482-489
Network Security (1)
- Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Classification of Correlated Internet Traffic Flows. 490-496 - Wei Chang, Jie Wu, Chiu C. Tan:
Cooperative Trajectory-Based Map Construction. 497-504 - André Egners, Ulrike Meyer, Björn Marschollek:
Messing with Android's Permission Model. 505-514 - Silvio Cesare, Yang Xiang:
Wire - A Formal Intermediate Language for Binary Analysis. 515-524 - René Hummen, Jan Henrik Ziegeldorf, Tobias Heer, Hanno Wirtz, Klaus Wehrle:
SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services. 525-532 - Wei Zhou, Sheng Wen, Yini Wang, Yang Xiang, Wanlei Zhou:
An Analytical Model on the Propagation of Modern Email Worms. 533-540
Network Security (2)
- Dirk Hoffstadt, Alexander Marold, Erwin P. Rathgeb:
Analysis of SIP-Based Threats Using a VoIP Honeynet System. 541-548 - Laura Pla Beltran, Madjid Merabti, Qi Shi:
Multiplayer Game Technology to Manage Critical Infrastructure Protection. 549-556 - Jens Köhler, Sebastian Labitzke, Michael Simon, Martin Nussbaumer, Hannes Hartenstein:
FACIUS: An Easy-to-Deploy SAML-based Approach to Federate Non Web-Based Services. 557-564 - Akshaya Mohan, Rajendra S. Katti:
Provable Data Possession Using Sigma-protocols. 565-572 - Nihel Ben Youssef Ben Souayeh, Adel Bouhoula:
Towards Safe and Optimal Network Designs Based on Network Security Requirements. 573-579 - Minzhe Guo, Prabir Bhattacharya:
Mechanism Design Based Secure Data Object Replication. 580-587 - Wenyin Yang, Li Ma:
HyperDomain: Enabling Inspection of Malicious VMM's Misbehavior. 588-595 - Fan Zhou, Ruomei Wang, Yu Liu, Yun Liang:
Image Resizing Based on Geometry Preservation with Seam Carving. 596-601
Social Networks
- Faraz Ahmed, Muhammad Abulaish:
An MCL-Based Approach for Spam Profile Detection in Online Social Networks. 602-608 - Yong Wang, Ting-Ting Zhang, Hong-Zong Li, Long-Ping He, Jing Peng:
Efficient Privacy Preserving Matchmaking for Mobile Social Networking against Malicious Users. 609-615 - Sana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia:
IRIS: A Novel Method of Direct Trust Computation for Generating Trusted Social Networks. 616-623 - Guanfeng Liu, Yan Wang, Duncan S. Wong:
Multiple QoT Constrained Social Trust Path Selection in Complex Social Networks. 624-631 - Alessio Bonti, Ming Li, Longxiang Gao, Wen Shi:
Effects of Social Characters in Viral Propagation Seeding Strategies in Online Social Networks. 632-639 - Zhengli Xiong, Wenjun Jiang, Guojun Wang:
Evaluating User Community Influence in Online Social Networks. 640-647 - Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat:
Optimal State Management of Data Sharing in Online Social Network (OSN) Services. 648-655
Trust Model and Applications (1)
- Qiwei Lu, Yan Xiong, Wenchao Huang, Xudong Gong, Fuyou Miao:
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET. 656-665 - Zheng Yan, Raimo Kantola, Yue Shen:
Unwanted Traffic Control via Hybrid Trust Management. 666-673 - Cunqing Ma, Jingqiang Lin, Yuewu Wang, Ming Shang:
Offline RFID Grouping Proofs with Trusted Timestamps. 674-681 - Graeme Horsman, Christopher Laing, Paul Vickers:
A Case Based Reasoning Framework for Improving the Trustworthiness of Digital Forensic Investigations. 682-689 - Rolf Kiefhaber, Gerrit Anders, Florian Siefert, Theo Ungerer, Wolfgang Reif:
Confidence as a Means to Assess the Accuracy of Trust Values. 690-697
Trust Model and Applications (2)
- Hui Fang, Jie Zhang, Murat Sensoy, Nadia Magnenat-Thalmann:
A Generalized Stereotypical Trust Model. 698-705 - Huawei Zhao, Jiankun Hu, Jing Qin, Vijay Varadharajan, Haishan Wan:
Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks. 706-713 - Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems. 714-721 - Joydeep Chandra, Ingo Scholtes, Niloy Ganguly, Frank Schweitzer:
A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks. 722-729 - XiaoBo Chu, Qin Yu:
A New Efficient Property-Based Attestation Protocol Based on Elliptic Curves. 730-736 - John Edstrom, Eli Tilevich:
Reusable and Extensible Fault Tolerance for RESTful Applications. 737-744
Mobile and Wireless Communications
- Wibhada Naruephiphat, Yusheng Ji, Chalermpol Charnsripinyo:
An Area-Based Approach for Node Replica Detection in Wireless Sensor Networks. 745-750 - Miao Xie, Jiankun Hu, Biming Tian:
Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks. 751-759 - Arshad Jhumka, Matthew Bradbury, Matthew Leeke:
Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. 760-768 - Musfiq Rahman, Srinivas Sampalli:
A Hybrid Key Management Protocol for Wireless Sensor Networks. 769-776 - Yihong Zang, Johnson P. Thomas, Gheorghita Ghinea, Mathews Thomas, Salaheddin Darwish:
Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs. 777-784 - Aliaa M. Alabdali, Lilia Georgieva, Greg Michaelson:
Modelling of Secure Data Transmission over a Multichannel Wireless Network in Alloy. 785-792 - Qijun Gu, Wanyu Zang, Meng Yu, Peng Liu:
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks. 793-800
TrustID-2012: The Second IEEE International Symposium on Trust and Identity in Mobile Internet, Computing, and Communications
- Jesse Leskinen:
Evaluation Criteria for Future Identity Management. 801-806 - Jun Ishii, Hiroyuki Maeomichi, Ikuo Yoda:
Privacy-Preserving Statistical Analysis Method for Real-World Data. 807-812 - Charles Perez, Babiga Birregah, Marc Lemercier:
The Multi-layer Imbrication for Data Leakage Prevention from Mobile Devices. 813-819 - Yu Chen, Zheng Yan:
Gemini: A Handbag for Pervasive Social Communications. 820-825 - Qingqi Pei, Lei Li, Hongning Li, Beibei Yuan:
Adaptive Trust Management Mechanism for Cognitive Radio Networks. 826-831 - Yanan Sun, Xiaohong Guan, Ting Liu, Yu Qu:
An Identity Authentication Mechanism Based on Timing Covert Channel. 832-836
TSCloud-2012: The Second IEEE International Symposium on Trust and Security in Cloud Computing
- Hani Qusa, Roberto Baldoni, Roberto Beraldi:
A Privacy Preserving Scalable Architecture for Collaborative Event Correlation. 837-843 - Zhiqian Xu, Keith M. Martin:
Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage. 844-849 - Tobias Hahn, Thomas Kunz, Markus Schneider, Sven Vowe:
Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Email Addresses. 850-856 - Adrian J. Duncan, Sadie Creese, Michael Goldsmith:
Insider Attacks in Cloud Computing. 857-862 - Kun Lu, Hua Jiang, Mingchu Li, Sheng Zhao, Jianhua Ma:
Resources Collaborative Scheduling Model Based on Trust Mechanism in Cloud. 863-868 - Mudassar Aslam, Christian Gehrmann, Mats Björkman:
Security and Trust Preserving VM Migrations in Public Clouds. 869-876
MWNS-2012: The Third International Symposium on Mobile and Wireless Network Security
- Caner Kilinc, Todd Booth, Karl Andersson:
WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS. 877-883 - Yongzhao Zhan, Chunxia Li, Xinsheng Wang, Yuan Zhou, Lu Liu, Hussain Al-Aqrabi:
A Secure Node Localization Method Based on the Congruity of Time in Wireless Sensor Networks. 884-889 - Xiaojun Li, Liangmin Wang:
A Rapid Certification Protocol from Bilinear Pairings for Vehicular Ad Hoc Networks. 890-895 - Welderufael Berhane Tesfay, Todd Booth, Karl Andersson:
Reputation Based Security Model for Android Applications. 896-901 - Pramod Kumar Singh, Govind Sharma:
An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET. 902-906 - Krishna Doddapaneni, Enver Ever, Orhan Gemikonakli, Leonardo Mostarda, Alfredo Navarra:
Effects of IDSs on the WSNs Lifetime: Evidence of the Need of New Approaches. 907-912 - Ismail Mansour, Gérard Chalhoub, Bassem Bakhache:
Evaluation of a Fast Symmetric Cryptographic Algorithm Based on the Chaos Theory for Wireless Sensor Networks. 913-919 - Thomas Stimpson, Lu Liu, Yongzhao Zhan:
An Investigation into the Evolution of Security Usage in Home Wireless Networks. 920-925 - Salaheddin Darwish, Simon J. E. Taylor, Gheorghita Ghinea:
Security Server-Based Architecture for Mobile Ad Hoc Networks. 926-930 - David J. Day, Denys A. Flores, Harjinder Singh Lallie:
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection. 931-936
UbiSafe-2012: The Fourth IEEE International Symposium on UbiSafe Computing
- Sudip Chakraborty, Krishnendu Roy:
An SLA-based Framework for Estimating Trustworthiness of a Cloud. 937-942 - Chi Lin, Guowei Wu, Lin Yao, Zuosong Liu:
A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive Environments. 943-948 - Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia:
Enhancing User Identity Privacy in LTE. 949-957 - Ronald Petrlic:
Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment. 958-963
ACS-2012: The Second IEEE International Symposium on Anonymity and Communication Systems
- Xin Chen, Qiao-lin Hu, Hao Lu, Ge-Ming Xia, Jun Long:
ILACF: An Incentive-Based Low-Latency Anonymous Communication Framework. 964-969 - Rennie Archibald, Dipak Ghosal:
A Covert Timing Channel Based on Fountain Codes. 970-977 - Muhammad Bashir Abdullahi, Guojun Wang:
A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor Networks. 978-985 - Zhi-yuan Li, Liangmin Wang, Siguang Chen:
Network Coding-Based Mutual Anonymity Communication Protocol for Mobile P2P Networks. 986-991 - Stefan Hofbauer, Kristian Beckers, Gerald Quirchmayr, Christoph Sorge:
A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example. 992-997
SPIoT-2012: The Second IEEE International Symposium on Security and Privacy in Internet of Things
- Dennis Gessner, Alexis Olivereau, Alexander Salinas Segura, Alexandru Serbanati:
Trustworthy Infrastructure Services for a Secure and Privacy-Respecting Internet of Things. 998-1003 - Haksoo Choi, Supriyo Chakraborty, Mani B. Srivastava:
Design and Evaluation of SensorSafe: A Framework for Achieving Behavioral Privacy in Sharing Personal Sensory Information. 1004-1011 - Chunhua Su, Guilin Wang, Kouichi Sakurai:
Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework. 1012-1017 - Chaoliang Li, Guojun Wang:
A Light-Weight Commodity Integrity Detection Algorithm Based on Chinese Remainder Theorem. 1018-1023 - Yair Diaz-Tellez, Eliane L. Bodanese, Srijith K. Nair, Theo Dimitrakos:
An Architecture for the Enforcement of Privacy and Security Requirements in Internet-Centric Services. 1024-1031
SQC-2012: The Second IEEE International Symposium on Security and Quantum Communications
- Rafael Trapani Possignolo, Cíntia B. Margi:
A Quantum-classical Hybrid Architecture for Security Algorithms Acceleration. 1032-1037 - Jinjing Shi, Ronghua Shi, Ying Guo, Moon Ho Lee:
A Quantum TITO Diversity Transmission Scheme with Quantum Teleportation of Non-maximally Entangled Bell State. 1038-1041 - Alexander V. Uskov:
Information Security of IPsec-based Mobile VPN: Authentication and Encryption Algorithms Performance. 1042-1048 - Mark Heydenrych, Elizabeth Marie Ehlers:
Inflammation Security: A Decentralised Immune Model for Resource Distribution in Networks. 1049-1056
SOWN-2012: The Second International Workshop on Security and Optimization for Wireless Networks
- Huaqun Wang, Yuqing Zhang, Bo Qin:
Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers. 1057-1062 - Tom Kirkham, Django Armstrong, Karim Djemame, Marcelo Corrales, Mariam Kiran, Iheanyi Nwankwo, Ming Jiang, Nikolaus Forgó:
Assuring Data Privacy in Cloud Transformations. 1063-1069 - Dingning Yang, Yuqing Zhang, Qixu Liu:
BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs. 1070-1076 - Ramzi Bellazreg, Noureddine Boudriga, Mohamed Hamdi:
A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks. 1077-1082 - Ying Kong, Yuqing Zhang, Zhejun Fang, Qixu Liu:
Static Detection of Logic Vulnerabilities in Java Web Applications. 1083-1088 - Sheu M. A. Mavee, Elizabeth Marie Ehlers:
A Multi-agent Immunologically-inspired Model for Critical Information Infrastructure Protection - An Immunologically-inspired Conceptual Model for Security on the Power Grid. 1089-1096
eGSSN-2012: 2012 International Workshop on Trust, Security, and Privacy in e-Government, e-Systems, and Social Networking
- Parisa Memarmoshrefi, Omar Alfandi, Ansgar Kellner, Dieter Hogrefe:
Autonomous Group-Based Authentication Mechanism in Mobile Ad Hoc Networks. 1097-1102 - Damandeep Kaur, Jyotsna Sengupta:
A Trust Model Based on P2P Trust Models for Secure Global Grids. 1103-1108 - Zhefeng Xiao, Bo Liu, Huaping Hu, Tian Zhang:
Design and Implementation of Facebook Crawler Based on Interaction Simulation. 1109-1112 - Adnan Ahmad, Brian Whitworth, Lech J. Janczewski:
More Choices, More Control: Extending Access Control by Meta-rights Reallocation. 1113-1118 - Bushra AlBelooshi, Khaled Salah, T. Marin, Ahmed Bentiba:
Assessing Overhead Cost Associated with Encrypting Swap File. 1119-1123 - Sadie Creese, Michael Goldsmith, Jason R. C. Nurse, Elizabeth Phillips:
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. 1124-1131
ISSR-2012: The Fourth IEEE International Workshop on Security in e-Science and e-Research
- Mohammad Ghafari, Hamid Shoja, Mohammad Yosef Amirani:
Detection and Prevention of Data Manipulation from Client Side in Web Applications. 1132-1136 - Syed Naqvi, Arnaud Michot, Michael Van de Borne:
Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud Security. 1137-1142 - Tien-Cheu Kao, Ching-Hao Mao, Chien-Yu Chang, Kai-Chi Chang:
Cloud SSDLC: Cloud Security Governance Deployment Framework in Secure System Development Life Cycle. 1143-1148
ANSEC-2012: The First International Workshop on Anonymity and Security Aspects of Embedded Systems
- Ismail San, Nuray At:
On Increasing the Computational Efficiency of Long Integer Multiplication on FPGA. 1149-1154 - Martin Pirker, Daniel Slamanig:
A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms. 1155-1160 - Johannes Winter:
Experimenting with ARM TrustZone - Or: How I Met Friendly Piece of Trusted Hardware. 1161-1166
TSIS-2012: The 2012 International Symposium on Advances in Trusted and Secure Information Systems
Attack, Defense, and Key Management
- Fahd Al-Haidari, Mohammed H. Sqalli, Khaled Salah:
Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses. 1167-1174 - T. Divya Sai Keerthi, Pallapa Venkataram:
Locating the Attacker of Wormhole Attack by Using the Honeypot. 1175-1180 - Humaira Ehsan, Farrukh Aslam Khan:
Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs. 1181-1187 - Matthew Areno, Jim Plusquellic:
Securing Trusted Execution Environments with PUF Generated Secret Keys. 1188-1193 - Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Miroslaw Kutylowski:
Restricted Identification without Group Keys. 1194-1199 - Vipin Kumar, Chirag Chetan, Aparajita Ojha:
On a Visual Secret Sharing Scheme with High Quality Decryption. 1200-1203
Trust and Cloud Computing
- Fu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen:
Toward Authenticated and Complete Query Results from Cloud Storages. 1204-1209 - Gordon Russell, Richard Macfarlane:
Security Issues of a Publicly Accessible Cloud Computing Infrastructure. 1210-1216 - Rafael Timóteo de Sousa Júnior, Edna Dias Canedo, Robson de Oliveira Albuquerque, Flavio Elias Gomes de Deus:
File Exchange in Cloud. 1217-1222 - Zahid Iqbal, Josef Noll:
Towards Semantic-Enhanced Attribute-Based Access Control for Cloud Services. 1223-1230 - Manuel Munier, Vincent Lalanne, Magali Ricarde:
Self-Protecting Documents for Cloud Storage Security. 1231-1238
Detection Scheme
- Muhammad Mujtaba, Priyadarsi Nanda, Xiangjian He:
Border Gateway Protocol Anomaly Detection Using Failure Quality Control Method. 1239-1244 - Longxiang Gao, Ming Li, Tianqing Zhu, Alessio Bonti, Wanlei Zhou, Shui Yu:
AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs. 1245-1250 - Te-En Wei, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee, Horng-Tzer Wang, Dong-Jie Wu:
Android Malware Detection via a Latent Network Behavior Analysis. 1251-1258 - Lin Chen, Bo Liu, Huaping Hu, Qianbing Zheng:
A Layered Malware Detection Model Using VMM. 1259-1264
Privacy
- Nico Schlitter, Jörg Lässig:
Distributed Privacy Preserving Classification Based on Local Cluster Identifiers. 1265-1272 - Qing Zhu, Ning Li:
Privacy Protecting by Multiattribute Clustering in Data-Intensive Service. 1273-1278 - Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar, Omar Alfandi, Dieter Hogrefe:
Fuzzy Logic Election of Node for Routing in WSNs. 1279-1284 - Feng Zhang, Aron Kondoro, Sead Muftic:
Location-Based Authentication and Authorization Using Smart Phones. 1285-1292 - Mahdi Aiash, Glenford E. Mapp, Raphael C.-W. Phan, Aboubaker Lasebae, Jonathan Loo:
A Formally Verified Device Authentication Protocol Using Casper/FDR. 1293-1298 - Minghui Zheng, Jing Chen:
Provably Secure Two-Party Explicit Authenticated Key Agreement Protocol. 1299-1303
Network Security (1)
- Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Ramlan Mahmod, Hanunah Othman:
Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System. 1304-1309 - Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan:
Performance Evaluation of Shared Hosting Security Methods. 1310-1315 - Natasa Zivic:
Security Aspects of Soft Verified Messages Protected by Message Authentication Codes. 1316-1322 - Murat Sensoy, Jeff Z. Pan, Achille Fokoue, Mudhakar Srivatsa, Felipe Meneguzzi:
Using Subjective Logic to Handle Uncertainty and Conflicts. 1323-1326 - Srinivas Avireddy, Varalakshmi Perumal, Narayan Gowraj, Ram Srivatsa Kannan, Prashanth Thinakaran, Sundaravadanam Ganapthi, Jashwant Raj Gunasekaran, Sruthi Prabhu:
Random4: An Application Specific Randomized Encryption Algorithm to Prevent SQL Injection. 1327-1333 - Yan Shen, Qi-fei Zhang, Ling-di Ping, Yan-Fei Wang, Wen-juan Li:
A Multi-tunnel VPN Concurrent System for New Generation Network Based on User Space. 1334-1341 - Xuan Huang, Geoffrey Lund, Andrew Sapeluk:
Development of a Typing Behaviour Recognition Mechanism on Android. 1342-1347
Network Security (2)
- Younchan Jung, Marnel Peradilla:
Domain Name to IP Address Resolution System with Multiple Name Servers Adaptable to MANETs. 1348-1357 - Wentao Wang, Yuewu Wang, Jiwu Jing, Zhongwen Zhang:
A Scalable Anonymity Scheme Based on DHT Distributed Inquiry. 1358-1363 - Hani Ragab Hassen, Olga Jones, Nikos Galanis:
Secure Reputation Framework for BitTorrent. 1364-1369 - Ismail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Ching-Hao Mao, Te-En Wei, Shyi-Ming Chen:
RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis. 1370-1375 - Guoyan Zhang, Lei Liu, Yang Liu:
An Attribute-Based Encryption Scheme Secure against Malicious KGC. 1376-1380
Social Networks
- Athanasios Zigomitros, Achilleas Papageorgiou, Constantinos Patsakis:
Social Network Content Management through Watermarking. 1381-1386 - Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda:
U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks. 1387-1392 - M. Ajmal Azad, Ricardo Morla:
Mitigating SPIT with Social Strength. 1393-1398 - Linlin Tian, Mingchu Li, Weifeng Sun, Xiaowei Zhao, Baohui Wang, Jianhua Ma:
Evolution of Cooperation Based on Reputation on Dynamical Networks. 1399-1404 - Sanat Kumar Bista, Surya Nepal, Cécile Paris:
Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help? 1405-1410
Trust Model and Applications
- Jamalul-lail Ab Manan, Zubair Ahmad Khattak, Suziah Sulaiman:
Practicable Unified Security, Trust and Privacy (STP) Framework for Federated Access Management (FAM). 1411-1416 - Yifang Ku, Hsiao-Hui Li, Fan Wu:
Evaluation of Trustworthiness of Reviews in the Online Travel Community. 1417-1422 - Yu Zhang:
Research on Trust Issue of Current Chinese C2C E-commerce: Problems and Solutions. 1423-1428 - Olive Qing Zhang, Ryan K. L. Ko, Markus Kirchberg, Chun Hui Suen, Peter Jagadpramana, Bu-Sung Lee:
How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms. 1429-1437
IUCC-2012: The 11th IEEE International Conference on Ubiquitous Computing and Communications
Trust Model and Applications
- Yang Qin, Dijiang Huang, Xinwen Zhang:
VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks. 1438-1445 - Tianyi Xing, Hongbin Liang, Dijiang Huang, Lin X. Cai:
Geographic-Based Service Request Scheduling Model for Mobile Cloud Computing. 1446-1453 - Stefan Forsström, Patrik Österberg, Theo Kanter:
Evaluating Ubiquitous Sensor Information Sharing on the Internet-of-Things. 1454-1460 - Yu-Lin Wang, Chia-Te Liao, Alvin Wen-Yu Su:
A Block-Based Still Image Coder for Parallel Computing. 1461-1468
Optical and Broadband Networks
- Jehad Al-Sadi:
The Load Balancing Problem in Extended OTIS-n-Cube Interconnection Networks. 1469-1474 - Zhixiong Chen, Weikai Xu, Jin Huang, Lin Wang:
Performances of CS-DCSK UWB Communication System in the Presence of Narrow Band Interferers. 1475-1480 - Khodor Hamandi, Farah Saab, Ayman I. Kayssi:
Enhanced Multi-rate Multicast for Optimal User Satisfaction and Efficient Bandwidth Utilization. 1481-1485 - Hailang Cao, Ping Wang, Lei Chen, Fuqiang Liu, Xinhong Wang, Yin Zhu, Huifang Pang:
User Satisfaction Based ZFBF Scheduling Algorithm in Multi-user MIMO System. 1486-1490 - Hao Yin, Heungsun Chang, Fangming Liu, Tongyu Zhan, Ying Zhang, Bo Li:
Discovering a Large Scale Internet Topology: Complementary and Contrast View. 1491-1498
Pervasive Computing
- Christophe Soares, Rui S. Moreira, Ricardo Morla, José Torres, Pedro Miguel Sobral:
Interference Free Integration of Pervasive Applications. 1499-1506 - Martin Peters, Christopher Brink, Sabine Sachweh:
Including Metadata into an Ontology Based Pervasive Computing Architecture. 1507-1512 - Minoru Nakayama, Masashi Fujimoto:
Chronological Accommodation of Oculo-motors in Response to Varying Sizes of Visual Stimuli. 1513-1519 - Stefan Forsström, Theo Kanter, Patrik Österberg:
Ubiquitous Secure Interactions with Intelligent Artifacts on the Internet-of-Things. 1520-1524 - Bo Guan, Yifeng He:
Optimal Resource Allocation for Multi-layered Video Streaming over Multi-channel Cognitive Radio Networks. 1525-1528 - Ying Dai, Jie Wu:
Distributed Rerouting for Multiple Sessions in Cognitive Radio Networks. 1529-1536
Sensor Networks
- Yue Li, Dehua Chen, Thomas Newe:
Formal Verification of a Key Agreement Protocol for Wireless Sensor Networks. 1537-1542 - Sang Gi Hong, Young Bag Moon, Naesoo Kim, Whan Woo Kim:
Window Energy Detection for Unmanned Surveillance with PIR Sensor. 1543-1547 - Zhenfei Wang, Kun Yang, David K. Hunter:
A Dynamic Bandwidth Allocation Algorithm for a Multi-sink Wireless Sensor Network Converged with a Passive Optical Network. 1548-1554 - Sain Saginbekov, Arshad Jhumka:
Fast and Efficient Information Dissemination in Event-Based Wireless Sensor Networks. 1555-1561 - Hee-Sook Mo, Hyochan Bang, Cheol Sig Pyo:
Data-centric Dissemination to Mobile Sink Group in Wireless Sensor Networks. 1562-1569
Ad Hoc Networks
- Zhiyong Zhang, Zhiping Jia, Hui Xia:
Link Stability Evaluation and Stability Based Multicast Routing Protocol in Mobile Ad Hoc Networks. 1570-1577 - Mahmoud Hashem Eiza, Qiang Ni:
A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways. 1578-1585 - Hui Cheng, Shengxiang Yang:
Hyper-mutation Based Genetic Algorithms for Dynamic Multicast Routing Problem in Mobile Ad Hoc Networks. 1586-1592 - Muhammad Bilal, M. O. Hussain, Pauline M. L. Chan:
A Reception Based Node Selection Protocol for Multi-hop Routing in Vehicular Ad-hoc Networks. 1593-1600 - Diogo Lima, Hugo Miranda:
Flow-Aware Broadcasting Algorithm. 1601-1608
Wireless and Mobile Networks
- Haris Pervaiz, Qiang Ni:
User Preferences-Adaptive Dynamic Network Selection Approach in Cooperating Wireless Networks: A Game Theoretic Perspective. 1609-1616 - Sina Fateri, Qiang Ni, Gareth A. Taylor, Sivanantharasa Panchadcharam, Ioana Pisica:
Design and Analysis of Multicast-Based Publisher/Subscriber Models over Wireless Platforms for Smart Grid Communications. 1617-1623 - Sandip Chakraborty, Sukumar Nandi:
A HiperLAN/2 Based MAC Protocol for Efficient Vehicle-to-Infrastructure Communication Using Directional Wireless Mesh Backbone. 1624-1631 - Martin S. Dam, Steffen Christensen, Lars Møller Mikkelsen, Rasmus L. Olesen:
Location Assisted Vertical Handover Algorithm for QoS Optimization in End-to-end Connections. 1632-1640 - Menghui Yang, Yongzhong Zou, Li Fang:
Collision and Detection Performance with Three Overlap Signal Collisions in Space-Based AIS Reception. 1641-1648 - Jin Huang, Zhexin Xu, Weikai Xu, Lin Wang:
Error Performance Analysis of Opportunistic Relaying System Based on DCSK. 1649-1653 - Zaid Ahmed Said Zabanoot, Geyong Min:
Modelling of Prioritised Vertical Handoff Scheme in Integrated UMTS/WLANs. 1654-1660
Mobility Management
- Yulei Wu, Jingguo Ge, Junling You, Yuepeng E.:
Design and Evaluation of an Operational Mobility Model over IPv6 (OMIPv6) Based on ID/Locator Split Architecture. 1661-1665 - Jiyoung Kang:
AR Teleport: Digital Reconstruction of Historical and Cultural-Heritage Sites Using Mobile Augmented Reality. 1666-1675 - Ahlem Harchay, Lilia Cheniti-Belcadhi, Rafik Braham:
A Model Driven Infrastructure for Context-Awareness Mobile Assessment Personalization. 1676-1683 - Suddhasil De, Sukumar Nandi, Diganta Goswami:
Modeling an Enhanced Tuple Space Based Mobile Middleware in UNITY. 1684-1691 - Francisco Javier Moreno Arboleda, Sebastián Múnera, Luis Munoz:
A Trajectory Model to Deal with Transmission Failures. 1692-1697 - Thomas Olutoyin Oshin, Stefan Poslad, Athen Ma:
Improving the Energy-Efficiency of GPS Based Location Sensing Smartphone Applications. 1698-1705 - Mehiar Dabbagh, Naoum Sayegh, Ayman I. Kayssi:
Efficient Internet Mapping in the Presence of Network Load Balancers. 1706-1713
Network Protocols
- Uthman Baroudi, Anas Al-Roubaiey, Samir Mekid, Abdelhafid Bouhraoua:
The Impact of Sensor Node Distribution on Routing Protocols Performance: A Comparitive Study. 1714-1720 - Ji Ma, Klaus-Dieter Schewe:
A Temporalised Belief Logic for Reasoning about Authentication Protocols. 1721-1728 - Andreas Bontozoglou, Kun Yang, Ken Guild:
Cross-Technology Overlay Control Protocol for Resource Management in Converged Networks. 1729-1734 - Linchen Yu:
Improving Query for P2P SIP VoIP. 1735-1740 - Sarah Abdallah, Elias Najjar, Ayman I. Kayssi:
A Round Robin Load Balancing and Redundancy Protocol for Network Routers. 1741-1747
Smart Home and Ambient Intelligence
- Joseph C. H. So, Po-Choi Wong:
Genetic Algorithm in Resource Provider Selection for Personal Live Content Delivery in User-Provided Platform. 1748-1754 - Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka:
On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters. 1755-1762 - George Okeyo, Liming Chen, Hui Wang, Roy Sterritt:
A Hybrid Ontological and Temporal Approach for Composite Activity Modelling. 1763-1770 - Abhinav Duggal, Manoj Misra, Ramesh Srinivasaraghavan:
Categorising Context and Using Short Term Contextual Information to Obtain Long Term Context. 1771-1776 - Yan Tang, Ioana Ciuciu:
Semantic Decision Support Models for Energy Efficiency in Smart-Metered Homes. 1777-1784 - Athanasios Vourvopoulos, Fotis Liarokapis:
Robot Navigation Using Brain-Computer Interfaces. 1785-1792
KAMIoT-2012: International Workshop on Knowledge Acquisition and Management in the Internet of Things
- Wei Wang, Suparna De, Ralf Tönjes, Eike Steffen Reetz, Klaus Moessner:
A Comprehensive Ontology for Knowledge Representation in the Internet of Things. 1793-1798 - Zhichun Wang, Rongfang Bie, Mingquan Zhou:
Hybrid Ontology Matching for Solving the Heterogeneous Problem of the IoT. 1799-1804 - Wei Jiang, Limin Meng:
Design of Real Time Multimedia Platform and Protocol to the Internet of Things. 1805-1810 - Antonio J. Jara, Miguel A. Zamora, Antonio Fernandez Gómez-Skarmeta:
Knowledge Acquisition and Management Architecture for Mobile and Personal Health Environments Based on the Internet of Things. 1811-1818 - Weiwei Yuan, Donghai Guan, Lei Shu, Jianwei Niu:
Efficient Searching Mechanism for Trust-Aware Recommender Systems Based on Scale-Freeness of Trust Networks. 1819-1823 - Junqi Guo, Hongyang Zhang, Yunchuan Sun, Rongfang Bie:
Square-Root Unscented Kalman Filtering Based Localization and Tracking in the Internet of Things. 1824-1829 - Xue Chen, Chao Wu:
A Text Representation Method Based on Harmonic Series. 1830-1834 - Guicheng Shen, Bingwu Liu:
Research on Embedding ECC into RFID Authentication Protocol. 1835-1838 - Dandan Li, Xiaohui Ji, ZhangBing Zhou, Qun Wang:
A Hybrid MPI/OpenMP Model Based on DDM for Large-Scale Partial Differential Equations. 1839-1843 - Stefan Forsström, Theo Kanter, Olle Johansson:
Real-Time Distributed Sensor-Assisted mHealth Applications on the Internet-of-Things. 1844-1849
MultiCom-2012: The Second International Workshop on Multimedia Communications and Networking
- Colin Bailey, Xiao-Hong Peng:
Quality Assessment of Video Transmission in Heterogeneous Networks as Applied to Real-Time Telecare. 1850-1855 - S. Nayyef, Charalampos Tsimenidis, Arafat Al-Dweik, Bayan S. Sharif, Ali Hazmi:
Time- and Frequency-Domain Impulsive Noise Spreader for OFDM Systems. 1856-1861 - Sanjay Kumar, Nadeem Javaid, Zahid Yousuf, Haresh Kumar, Zahoor Ali Khan, Ayesha Bibi:
DSDV, DYMO, OLSR: Link Duration and Path Stability. 1862-1866 - Subhash Sagar, Nadeem Javaid, Zahoor Ali Khan, J. Saqib, Ayesha Bibi, Safdar Hussain Bouk:
Analysis and Modeling Experiment Performance Parameters of Routing Protocols in MANETs and VANETs. 1867-1871
AIPNGN-2012: The Second International Workshop on All-IP Next Generation Networks
- Hui Lin, Jia Hu, Atulya Nagar, Li Xu:
Role Based Privacy-Aware Secure Routing in WMNs. 1872-1877 - Gang Liu, Hua Wang, Hong Zhang:
An Ant Colony Optimization Algorithm for Overlay Backbone Multicast Routing in Content Delivery Networks. 1878-1882 - Zhenzhou Li, Feng Li, Zhiping Jia, Lei Ju, Renhai Chen:
The Research and Application of a Specific Instruction Processor for SMS4. 1883-1888 - Yongji Yu, Zhiping Jia, Ruihua Zhang:
Prediction-Based Algorithm for Event Detection in Wireless Sensor Networks. 1889-1894
IWVT-2012: The Third International Workshop on Virtualization Technology
- Fan Yang, Huanguo Zhang, Fei Yan, Jian Yang:
Testing Method of Code Redundancy Simplification Based on Program Dependency Graph. 1895-1900 - Jiahui Wen, Li Shen, Zhiying Wang:
Dynamic Optimization on Multi-core Platform. 1901-1906 - Xiaolin Wang, Xiang Wen, Yechen Li, Yingwei Luo, Xiaoming Li, Zhenlin Wang:
A Dynamic Cache Partitioning Mechanism under Virtualization Environment. 1907-1911 - Fan Xu, Shen Li, Zhiying Wang:
HVD-TLS: A Novel Framework of Thread Level Speculation. 1912-1917 - Xin Peng, Xiaofei Liao, Hai Jin, Xuepeng Fan, Xuping Tu, Linchen Yu:
An Efficient Distributed Transactional Memory System. 1918-1923
IEETeL-2012: The Third International Workshop on Interactive Environments and Emergent Technologies for eLearning
- Minoru Nakayama, Kouichi Mutsuura, Hiroh Yamamoto:
Causal Analysis of Student's Characteristics of Note-Taking Activities and Learning Performance during a Fully Online Course. 1924-1929 - Xiaodong Li, Hong Zhang:
Research on Cooperative Learning of Digital English Writing in Network Environment. 1930-1935 - Katherine Inalef, Julio Guerra, Eliana Scheihing:
Development and Validation of a Virtual Worklog as a Collaboration Tool for the Kelluwen Learning Community. 1936-1941 - Malinka Ivanova, Tatyana Ivanova:
Actualization of a Course Library through Influential Twitter Knowledge. 1942-1947
AUCN-2012: The 2012 International Symposium on Advances in Ubiquitous Computing and Networking
Cloud Computing and Wireless Networks
- Francis Owusu, Colin Pattinson:
The Current State of Understanding of the Energy Efficiency of Cloud Computing. 1948-1953 - Marco Bazzani, Davide Conzon, Andrea Scalera, Maurizio A. Spirito, Claudia Irene Trainito:
Enabling the IoT Paradigm in E-health Solutions through the VIRTUS Middleware. 1954-1959 - Naveed A. Khan, Nadeem Javaid, Zahoor Ali Khan, M. Jaffar, U. Rafiq, Ayesha Bibi:
Ubiquitous HealthCare in Wireless Body Area Networks. 1960-1967 - Obaid Ur Rehman, Nadeem Javaid, Ayesha Bibi, Zahoor Ali Khan:
Performance Study of Localization Techniques in Wireless Body Area Sensor Networks. 1968-1975 - Uthman Baroudi, Amin-ud-din Qureshi, Samir Mekid, Abdelhafid Bouhraoua:
Radio Frequency Energy Harvesting Characterization: An Experimental Study. 1976-1981
Network Analysis
- Xiaoqiang Li, Yun Mi, Yingwei Jin, Heng Qi, Zhiyang Li:
A Novel System for Evaluating Website Using Link Analysis. 1982-1987 - Jianzhi Jin, Yuhua Liu, Laurence Tianruo Yang, Naixue Xiong, Fang Hu:
An Efficient Detecting Communities Algorithm with Self-Adapted Fuzzy C-Means Clustering in Complex Networks. 1988-1993 - Andrew Jones, Lu Liu, Nick Antonopoulos, Weining Liu:
An Analysis of Peer to Peer Protocols for Massively Multiplayer Online Games. 1994-1999 - Deepak Pai, Sasi Inguva, Phani Shekhar Mantripragada, Mudit Malpani, Nitin Aggarwal:
Padati: A Robust Pedestrian Dead Reckoning System on Smartphones. 2000-2007 - Sérgio Ivan Lopes, José Manuel Neto Vieira, Daniel Filipe Albuquerque:
High Accuracy 3D Indoor Positioning Using Broadband Ultrasonic Signals. 2008-2014
Ubiquitous System, Services, and Applications
- Yean-Fu Wen:
Weighted Flow and Spectral Resource to Enhance QoS for Multi-hop Cognitive Radio Networks. 2015-2020 - Attila Reiss, Didier Stricker, Ilias Lamprinos:
An Integrated Mobile System for Long-Term Aerobic Activity Monitoring and Support in Daily Life. 2021-2028 - David Martín, Carlos Lamsfus, Aurkene Alzua, Diego López-de-Ipiña:
Foundations for a Platform to Develop Context-aware Systems by Domain Experts. 2029-2034 - Huihui Wu, Jiguang He, Liangliang Xu, Lin Wang:
Joint Source-Channel Coding Based on P-LDPC Codes for Radiography Images Transmission. 2035-2039
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.