default search action
TrustCom/BigDataSE/ISPA 2015: Helsinki, Finland - Volume 1
- 2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1. IEEE 2015, ISBN 978-1-4673-7952-6
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
TrustCom Trust Track 1: Trust Evaluation, Reputation and Recommender Systems
- Huanyang Zheng, Jie Wu:
DynFluid: Predicting Time-Evolving Rating in Recommendation Systems via Fluid Dynamics. 1-8 - Wei Tang, Zheng Yan:
CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive QoS Management. 9-16 - Jiageng Chen, Atsuko Miyaji, Hiroyuki Sato, Chunhua Su:
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags. 17-24 - Richard S. Weiss, Leon Reznik, Yanyan Zhuang, Andrew Hoffman, Darrell Pollard, Albert Rafetseder, Tao Li, Justin Cappos:
Trust Evaluation in Mobile Devices: An Empirical Study. 25-32 - Jiaojiao Song, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng:
Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor. 33-40
TrustCom Trust Track 2: Trusted Environments
- Yingjun Zhang, Shijun Zhao, Yu Qin, Bo Yang, Dengguo Feng:
TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone. 41-48 - Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen:
On Rehoming the Electronic ID to TEEs. 49-56 - Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah:
Trusted Execution Environment: What It is, and What It is Not. 57-64 - Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici:
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface. 65-73 - Nishant Patanaik, Ana Elisa P. Goulart:
Performance of Cooperative Firewalls in Real-World Deployments. 74-81
TrustCom Trust Track 3: Trust in Wireless and Sensor Networks
- Po-Hung Yang, Sung-Ming Yen:
Memory Attestation of Wireless Sensor Nodes by Trusted Local Agents. 82-89 - Bo Liu, Wanlei Zhou, Longxiang Gao, Sheng Wen, Tom H. Luan:
Mobility Increases the Risk of Malware Propagations in Wireless Networks. 90-95 - Ming Xiang, William Liu, Quan Bai, Adnan Al-Anbuky:
Simmelian Ties and Structural Holes: Exploring Their Topological Roles in Forming Trust for Securing Wireless Sensor Networks. 96-103 - Weidong Yang, Le Xiao, Limin Sun, Qing Li:
Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks. 104-110 - Chuanyou Li, Michel Hurfin, Yun Wang:
Reputation Propagation and Updating in Mobile Ad Hoc Networks with Byzantine Failures. 111-118
TrustCom Trust Track 4: Trust in Social and Cloud Computing
- Xiaoming Zheng, Yan Wang, Mehmet A. Orgun:
Contextual Sub-network Extraction in Contextual Social Networks. 119-126 - Ahmed Bouchami, Olivier Perrin, Ehtesham Zahoor:
Trust-Based Formal Delegation Framework for Enterprise Social Networks. 127-134 - Mirela Riveni, Hong Linh Truong, Schahram Dustdar:
Trust-Aware Elastic Social Compute Units. 135-142 - Jing Chen, Yuling Peng, Ruiying Du, Quan Yuan, Minghui Zheng:
Regenerating-Codes-Based Efficient Remote Data Checking and Repairing in Cloud Storage. 143-150
TrustCom Security Track 1: Key Management
- Wei Zhou, Yang Xu, Guojun Wang:
Research on Key Management for Multi-privileged Group Communications. 151-158 - Fabrizio Biondi, Thomas Given-Wilson, Axel Legay:
Attainable Unconditional Security for Shared-Key Cryptosystems. 159-166 - Keita Emura, Le Trieu Phong, Yohei Watanabe:
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability. 167-174 - Kai Fan, Yuanyuan Gong, Zhao Du, Hui Li, Yintang Yang:
RFID Secure Application Revocation for IoT in 5G. 175-181
TrustCom Security Track 2: Software and OS Security
- Ludovic Apvrille, Axelle Apvrille:
Identifying Unknown Android Malware with Feature Extractions and Classification Techniques. 182-189 - Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, Qingkai Zeng:
Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses. 190-197 - Luiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Yoan Miché, Amaury Lendasse, Juha Karhunen:
Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive Bayes. 198-205 - Zhenxiang Chen, Hongbo Han, Qiben Yan, Bo Yang, Lizhi Peng, Lei Zhang, Jin Li:
A First Look at Android Malware Traffic in First Few Minutes. 206-213 - Marián Kühnel, Manfred Smieschek, Ulrike Meyer:
Fast Identification of Obfuscation and Mobile Advertising in Mobile Malware. 214-221
TrustCom Security Track 3: Data and Application Security
- Daniel M. Hein, Johannes Winter, Andreas Fitzek:
Secure Block Device - Secure, Flexible, and Efficient Data Storage for ARM TrustZone Systems. 222-229 - Jing Long, Dafang Zhang, Wei Liang, Wenwei Li:
A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection. 230-237 - Daniel Gonçalves, Joao Bota, Miguel Correia:
Big Data Analytics for Detecting Host Misbehavior in Large Logs. 238-245 - Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen:
DPBSV - An Efficient and Secure Scheme for Big Sensing Data Stream. 246-253 - Brahim Hamid:
Interplay of Security&Dependability and Resource Using Model-Driven and Pattern-Based Development. 254-262
TrustCom Security Track 4: Network Security
- Yue-Bin Luo, Baosheng Wang, Xiaofeng Wang, Xiao-Feng Hu, Gui-Lin Cai, Hao Sun:
RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries. 263-270 - Zigang Cao, Gang Xiong, Li Guo:
MimicHunter: A General Passive Network Protocol Mimicry Detection Framework. 271-278 - Douglas Stebila, Nick Sullivan:
An Analysis of TLS Handshake Proxying. 279-286 - Lars Baumgärtner, Jonas Hochst, Matthias Leinweber, Bernd Freisleben:
How to Misuse SMTP over TLS: A Study of the (In) Security of Email Server Communication. 287-294
TrustCom Security Track 5: Network Security
- Mohammed A. Ambusaidi, Xiangjian He, Priyadarsi Nanda:
Unsupervised Feature Selection Method for Intrusion Detection System. 295-301 - Jiao Jiao Jiang, Andi Zhou, Kasra Majbouri Yazdi, Sheng Wen, Shui Yu, Yang Xiang:
Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach. 302-309 - Rui Wang, Zhiping Jia, Lei Ju:
An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking. 310-317 - Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network. 318-325
TrustCom Security Track 6: Information Security
- Jukka A. Koskinen:
Surveys of Daily Information Security of Citizens in Finland. 326-333 - Ismail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Cheng-Seen Ho, Kuo-Ping Wu, Shyi-Ming Chen:
Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction. 334-343 - Sampsa Rauti, Jukka Teuhola, Ville Leppänen:
Diversifying SQL to Prevent Injection Attacks. 344-351 - Ali Farooq, Johanna Isoaho, Seppo Virtanen, Jouni Isoaho:
Information Security Awareness in Educational Institution: An Analysis of Students' Individual Factors. 352-359
TrustCom Security Track 7: Authentication and Crypto
- Abdullah Mohammed Almuhaideb, Bala Srinivasan, Phu Dung Le, Mohammed A. Alhabeeb, Waleed Alfehaid:
A Hybrid Mobile Authentication Model for Ubiquitous Networking. 360-367 - Sufian Hameed, Usman Murad Jamali, Adnan Samad:
Integrity Protection of NDEF Message with Flexible and Enhanced NFC Signature Records. 368-375 - Jianming Fu, Xu Zhang, Yan Lin:
An Instruction-Set Randomization Using Length-Preserving Permutation. 376-383 - Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao:
Cut-and-Choose Bilateral Oblivious Transfer and Its Application. 384-391 - Chaohui Du, Guoqiang Bai:
A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based Cryptography. 392-399
TrustCom Security Track 8: Secure Environments
- Brian McGillion, Tanel Dettenborn, Thomas Nyman, N. Asokan:
Open-TEE - An Open Virtual Trusted Execution Environment. 400-407 - Julian Horsch, Sascha Wessel:
Transparent Page-Based Kernel and User Space Execution Tracing from a Custom Minimal ARM Hypervisor. 408-417 - Nuno Teodoro, Luis Goncalves, Carlos Serrão:
NIST CyberSecurity Framework Compliance: A Generic Model for Dynamic Assessment and Predictive Requirements. 418-425 - Sivadon Chaisiri, Ryan K. L. Ko, Dusit Niyato:
A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management. 426-433
TrustCom Security Track 9: Cloud Security
- Yuchuan Luo, Ming Xu, Shaojing Fu, Dongsheng Wang, Junquan Deng:
Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation. 434-442 - Kenichi Kourai, Tatuya Kajiwara:
Secure Out-of-Band Remote Management Using Encrypted Virtual Serial Consoles in IaaS Clouds. 443-450 - Chang Liu, Liehuang Zhu, Jinjun Chen:
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud. 451-458 - Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu, Fangfang Shan:
Achieving Lightweight and Secure Access Control in Multi-authority Cloud. 459-466
TrustCom Security Track 10: IoT and Wireless Security, Heterogeneous
- Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent:
Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things. 467-474 - Guowei Wu, Jie Wang, Lin Yao:
Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network Calculus. 475-482 - Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron, Keith Mayes:
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures. 483-490 - Robert Mark Seepers, Christos Strydis, Ioannis Sourdis, Chris Innocentius De Zeeuw:
On Using a Von Neumann Extractor in Heart-Beat-Based Security. 491-498
TrustCom Privacy Track 2: User Privacy
- Li Lu, Muhammad Jawad Hussain, Hongzi Zhu:
WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID Systems. 499-506 - Seung-Hyun Kim, Han-Gyu Ko, In-Young Ko, Daeseon Choi:
Effects of Contextual Properties on Users' Privacy Preferences in Mobile Computing Environments. 507-514 - Tommi Meskanen, Jian Liu, Sara Ramezanian, Valtteri Niemi:
Private Membership Test for Bloom Filters. 515-522 - Julien Mineraud, Federico Lancerin, Sasitharan Balasubramaniam, Mauro Conti, Sasu Tarkoma:
You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental Data. 523-530
TrustCom Privacy Track 3: Location Privacy and others
- Matthew Bradbury, Matthew Leeke, Arshad Jhumka:
A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks. 531-538 - Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, Lionel Brunie:
Time Distortion Anonymization for the Publication of Mobility Data with High Utility. 539-546 - Ian Oliver, Silke Holtmanns:
Aligning the Conflicting Needs of Privacy, Malware Detection and Network Protection. 547-554 - Hui Peng, Xiaoying Zhang, Hong Chen, Yuncheng Wu, Yao Wu, Juru Zeng:
Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor Networks. 555-562
TrustCom Privacy Track 4: Data Privacy
- Mark A. Will, Ryan K. L. Ko, Ian H. Witten:
Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud. 563-570 - Albin Petit, Thomas Cerqueus, Sonia Ben Mokhtar, Lionel Brunie, Harald Kosch:
PEAS: Private, Efficient and Accurate Web Search. 571-580 - Olof Görnerup, Nima Dokoohaki, Andrea Hess:
Privacy-Preserving Mining of Frequent Routes in Cellular Network Data. 581-587 - Milica Milutinovic, Italo Dacosta, Andreas Put, Bart De Decker:
uCentive: An Efficient, Anonymous and Unlinkable Incentives Scheme. 588-595
TrustCom Privacy Track 5: Identity Privacy
- Yuichi Sei, Takao Takenouchi, Akihiko Ohsuga:
(l1, ..., lq)-diversity for Anonymizing Sensitive Quasi-Identifiers. 596-603 - Neetesh Saxena, Bong Jun Choi, Shinyoung Cho:
Lightweight Privacy-Preserving Authentication Scheme for V2G Networks in the Smart Grid. 604-611 - Pierre-François Bonnefoi, Pierre Dusart, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis:
A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags. 612-620 - Takao Murakami, Atsunori Kanemura, Hideitsu Hino:
Group Sparsity Tensor Factorization for De-anonymization of Mobility Traces. 621-629
The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (RATSP)
RATSP Trust Track 1
- Jiun Yi Yap, Allan Tomlinson:
Provenance-Based Attestation for Trustworthy Computing. 630-637 - Nazila Gol Mohammadi, Torsten Bandyszak, Costas Kalogiros, Michalis Kanakakis, Thorsten Weyer:
A Framework for Evaluating the End-to-End Trustworthiness. 638-645 - Mohammad M. Bany Taha, Sivadon Chaisiri, Ryan K. L. Ko:
Trusted Tamper-Evident Data Provenance. 646-653 - Igor V. Kotenko, Igor Saenko, Sergey Ageev:
Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference. 654-659
RATSP Trust Track 2
- Jouni Hiltunen, Jarkko Kuusijärvi:
Trust Metrics Based on a Trusted Network Element. 660-667 - Zhengping Wu, Lifeng Wang:
Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria Analysis. 668-675 - Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi, Jonathan Guislain:
Formal Modeling and Verification of Opportunity-enabled Risk Management. 676-684
RATSP Trust Track 3
- Andrew Bolster, Alan Marshall:
Single and Multi-metric Trust Management Frameworks for Use in Underwater Autonomous Networks. 685-693 - Abdullah Aref, Thomas T. Tran:
RLTE: A Reinforcement Learning Based Trust Establishment Model. 694-701 - Florian Reimair, Peter Teufl, Bernd Prünster:
In Certificates We Trust - Revisited. 702-709 - Sayaka Umeda, Takashi Kamimoto, Yuri Ohata, Hiroshi Shigeno:
Interest Flow Control Method Based on User Reputation and Content Name Prefixes in Named Data Networking. 710-717
RATSP Trust Track 4
- Muhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, Elisa Bertino:
Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation. 718-725 - Hao Xue, Fengjun Li, Hyunjin Seo, Roseann Pluretti:
Trust-Aware Review Spam Detection. 726-733 - Ester López, Leandro Navarro:
KDet: Coordinated Detection of Forwarding Faults in Wireless Community Networks. 734-741 - Xin Li, Chaitanya Joshi, Alan Yu Shyang Tan, Ryan Kok Leong Ko:
Inferring User Actions from Provenance Logs. 742-749
RATSP Security Track 1
- Thanh Dat Dang, Doan B. Hoang, Priyadarsi Nanda:
Data Mobility Management Model for Active Data Cubes. 750-757 - Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts. 758-765 - Nada Alruhaily, Behzad Bordbar, Tom Chothia:
Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection. 766-773 - Subil Abraham, Suku Nair:
A Novel Architecture for Predictive CyberSecurity Using Non-homogenous Markov Models. 774-781 - Mourad Benmalek, Yacine Challal:
eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid. 782-789
RATSP Security Track 2
- John Ross Wallrabenstein:
Implementing Authentication Systems Based on Physical Unclonable Functions. 790-796 - Martin Boonk, Ronald Petrlic, Christoph Sorge:
Save Our Passwords. 797-800 - Luigi Lo Iacono:
Partial Data Protection via Structure-Preserving Document Partitioning. 801-807 - Danushka Jayasinghe, Raja Naeem Akram, Konstantinos Markantonakis, Konstantinos Rantos, Keith Mayes:
Enhancing EMV Online PIN Verification. 808-817 - Fabian Lanze, Andriy Panchenko, Thomas Engel:
A Formalization of Fingerprinting Techniques. 818-825
RATSP Security Track 3
- Aleksandr Ometov, Konstantin Zhidanov, Sergey Bezzateev, Roman Florea, Sergey D. Andreev, Yevgeni Koucheryavy:
Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity. 826-833 - Christian Banse, Sathyanarayanan Rangarajan:
A Secure Northbound Interface for SDN Applications. 834-839 - Yuri Ohata, Sayaka Umeda, Takashi Kamimoto, Hiroshi Shigeno:
Secure Routing Protocol Considering Load Distribution in Mobile Ad Hoc Networks. 840-847 - Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, Zheng Yan:
A Study of IEEE 802.15.6 Association Protocols. 848-855
RATSP Security Track 4
- Lorena González-Manzano, José María de Fuentes, Agustín Orfila:
Access Control for the Cloud Based on Multi-device Authentication. 856-863 - Ahmed Bouchami, Elio Goettelmann, Olivier Perrin, Claude Godart:
Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms. 864-871 - Elochukwu Ukwandu, William J. Buchanan, Lu Fan, Gordon Russell, Owen Lo:
RESCUE: Resilient Secret Sharing Cloud-Based Architecture. 872-879 - Holger Kühner, Hannes Hartenstein:
On the Resource Consumption of Secure Data Sharing. 880-889 - Maksim Avdyushkin, Musfiq Rahman:
Secure Location Validation with Wi-Fi Geo-fencing and NFC. 890-896
RATSP Security Track 5
- Dongxi Liu, John Zic:
Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators. 897-904 - Gyan Singh Yadav, Aparajita Ojha:
A Scalable Data Hiding Scheme Using Hilbert Space Curve and Chaos. 905-909 - Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Detecting Data Semantic: A Data Leakage Prevention Approach. 910-917 - Shigui Qi, Dan Feng, Nan Su, Wenguo Liu, Jingning Liu:
A New Solution Based on Multi-rate LDPC for Flash Memory to Reduce ECC Redundancy. 918-923 - Mohamed Ali El-Serngawy, Chamseddine Talhi:
CaptureMe: Attacking the User Credential in Mobile Banking Applications. 924-933
RATSP Privacy Track 1
- Zakaria Sahnoune, Esma Aïmeur, Ghada El Haddad, Rodrigue Sokoudjou:
Watch Your Mobile Payment: An Empirical Study of Privacy Disclosure. 934-941 - Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Disequilibrium: Tor's Exit Node Selection under the Stereoscope. 942-949 - Tommi Meskanen, Valtteri Niemi, Noora Nieminen:
Extended Model of Side-Information in Garbling. 950-957 - Ahmad Sabouri:
A Cloud-Based Model to Facilitate Mobility of Privacy-Preserving Attribute-Based Credential Users. 958-965 - Vladimir Estivill-Castro, David F. Nettleton:
Can On-line Social Network Users Trust That What They Designated as Confidential Data Remains So? 966-973
RATSP Privacy Track 2
- Mahmoud Khonji, Youssef Iraqi:
Stylometric Anonymity: Is Imitation the Best Strategy? 974-982 - Anirban Basu, Toru Nakamura, Seira Hidano, Shinsaku Kiyomoto:
k-anonymity: Risks and the Reality. 983-989 - Dali Zhu, Zheming Fan, Na Pang:
A Dynamic Credible Factory Reset Mechanism of Personal Data in Android Device. 990-998 - Christiaan Hillen:
The Pseudonym Broker Privacy Pattern in Medical Data Collection. 999-1005 - Emmanouil A. Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, Tansu Alpcan:
Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking. 1006-1013
RATSP Privacy Track 3
- Yen-Lin Chen, Hahn-Ming Lee, Albert B. Jeng, Te-En Wei:
DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps. 1014-1021 - Kok-Seng Wong, Minji Seo, Myung Ho Kim:
Secure Two-Party Rank Correlation Computations for Recommender Systems. 1022-1028 - Anna Rohunen, Jouni Markkula:
The Role of Risk Perceptions in Privacy Concerns Evaluation. 1029-1036 - Ronan-Alexandre Cherrueau, Rémi Douence, Mario Südholt:
A Language for the Composition of Privacy-Enforcement Techniques. 1037-1044 - Silvia Puglisi, David Rebollo-Monedero, Jordi Forné:
Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications. 1045-1052
The Fifth IEEE International Symposium on Trust and Security in Cloud Computing (TSCloud)
TSCloud Session I
- Jason Walls, Kim-Kwang Raymond Choo:
A Review of Free Cloud-Based Anti-Malware Apps for Android. 1053-1058 - Ming Di Leom, Christian Javier D'Orazio, Gaye Deegan, Kim-Kwang Raymond Choo:
Forensic Collection and Analysis of Thumbnails in Android. 1059-1066 - Mohammad Reza Memarian, Mauro Conti, Ville Leppänen:
EyeCloud: A BotCloud Detection System. 1067-1072
TSCloud Session II
- Kin Suntana Tep, Ben Martini, Ray Hunt, Kim-Kwang Raymond Choo:
A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management. 1073-1080 - Umar Mukhtar Ismail, Shareeful Islam, Haralambos Mouratidis:
Cloud Security Audit for Migration and Continuous Monitoring. 1081-1087 - Bob Duncan, Mark Whittington:
Enhancing Cloud Security and Privacy: Broadening the Service Level Agreement. 1088-1093 - Felix Immanuel, Ben Martini, Kim-Kwang Raymond Choo:
Android Cache Taxonomy and Forensic Process. 1094-1101
TSCloud Session III
- Cengiz Örencik, Mahmoud Alewiwi, Erkay Savas:
Secure Sketch Search for Document Similarity. 1102-1107 - Luciano Barreto, Joni da Silva Fraga, Frank Siqueira:
Architectural Model and Security Mechanisms for Cloud Federations. 1108-1115 - Gwan-Hwan Hwang, Kuh-Yih Huang, Yu-Cheng Hsiao:
A Framework for Cryptography Based Accountability and Service Invocation Control for Service Composition in a Multicloud Architecture. 1116-1121 - Jose Juan Mijares Chan, Parimala Thulasiraman, Gabriel Thomas, Ruppa K. Thulasiram:
Stationarity Enforcement of Accelerator Based TRNG by Genetic Algorithm. 1122-1128
The First IEEE International Workshop on Trustworthy Software Systems (TrustSoft)
TrustSoft Session I
- Baden Delamore, Ryan K. L. Ko:
A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications. 1129-1135 - Dennis Titze, Julian Schütte:
Preventing Library Spoofing on Android. 1136-1141
TrustSoft Session II
- Mazen Ezzeddine, Haitham Akkary:
Issues in Trustworthy Software Systems. 1142-1147 - Xiaotian Wang, Matthew Davis, Junjie Zhang, Vance Saunders:
Mission-Aware Vulnerability Assessment for Cyber-Physical Systems. 1148-1153 - Zhaoli Liu, Tao Qin, Xiaohong Guan, Xiaoqiang Niu, Tao Yang:
Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics. 1154-1159 - Haining Meng, Xinhong Hei, Yan Li, Yanning Du, Guo Xie:
A Rejuvenation Model for Software System under Normal Attack. 1160-1164
The First IEEE International Workshop on 5G Security (IW5GS)
IW5GS Session I
- Peter Schneider, Günther Horn:
Towards 5G Security. 1165-1170 - Siddharth Prakash Rao, Silke Holtmanns, Ian Oliver, Tuomas Aura:
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access. 1171-1176 - Vikramajeet Khatri, Joerg Abendroth:
Mobile Guard Demo: Network Based Malware Detection. 1177-1179
IW5GS Session II
- Nicolae Paladi, Christian Gehrmann:
Towards Secure Multi-tenant Virtualized Networks. 1180-1185 - Elena Dubrova, Mats Näslund, Göran Selander:
CRC-Based Message Authentication for 5G Mobile Technology. 1186-1191 - Prajwol Kumar Nakarmi, Oscar Ohlsson, Michael Liljenstam:
An Air Interface Signaling Protection Function for Mobile Networks: GSM Experiments and Beyond. 1192-1198
IW5GS Session III
- Mingjun Wang, Zheng Yan:
Security in D2D Communications: A Review. 1199-1204 - Jari Arkko, Karl Norrman, Mats Näslund, Bengt Sahlin:
A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy. 1205-1209
The Eighth IEEE International Symposium on Security, Privacy and Anonymity in Internet of Things (SpaIoT)
SpaIoT Session I
- Francisco Martín-Fernández, Pino Caballero-Gil, Cándido Caballero-Gil:
Revocation Management in Vehicular Ad-hoc Networks. 1210-1217 - Daiyong Quan, Lihua Yin, Yunchuan Guo:
Enhancing the Trajectory Privacy with Laplace Mechanism. 1218-1223 - Di Wu, Jingfu Du, Dali Zhu, Siye Wang:
A Simple RFID-Based Architecture for Privacy Preservation. 1224-1229 - Chaohui Du, Guoqiang Bai, Hongyi Chen:
Towards Efficient Implementation of Lattice-Based Public-Key Encryption on Modern CPUs. 1230-1236 - Shinsaku Kiyomoto, Toru Nakamura, Yutaka Miyake:
Towards Tracing of k-Anonymized Datasets. 1237-1242
SpaIoT Session II
- Wei Wang, Zhan Wang, Wen Tao Zhu, Lei Wang:
WAVE: Secure Wireless Pairing Exploiting Human Body Movements. 1243-1248 - Naveen Kumar, Anish Mathuria, Manik Lal Das:
Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System. 1249-1254 - Bernd Jäger:
Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture. 1255-1260 - Catia Prandi, Stefano Ferretti, Silvia Mirri, Paola Salomoni:
A Trustworthiness Model for Crowdsourced and Crowdsensed Data. 1261-1266
The First IEEE International Workshop on Trust and Security in Wireless Sensor Networks (TrustWSN)
TrustWSN Session I
- Yanchao Song, Juan Luo, Chang Liu, Wenfeng He:
Periodicity-and-Linear-Based Data Suppression Mechanism for WSN. 1267-1271 - Hongsong Chen, Zhi Han, Zhongchuan Fu:
Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks. 1272-1278 - Kyoungsoo Bok, Eunkyung Ryu, Junho Park, Jaesoo Yoo:
An Energy Efficient Congestion Control Scheme for Multimedia Data in Wireless Sensor Networks. 1279-1283
TrustWSN Session II
- Zuo Chen, Mengyuan Jia, Yan Wang, Xiaolong Yan:
A Security Topology Protocol of Wireless Sensor Networks Based on Community Detection and Energy Aware. 1284-1291 - Huan Zhao, Qian Zhang, Liang Zhang, Yan Wang:
A Novel Sensor Deployment Approach Using Fruit Fly Optimization Algorithm in Wireless Sensor Networks. 1292-1297 - Zuo Chen, Xue Li, Bin Lv, Mengyuan Jia:
A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Particle Swarm Optimization and Cuckoo Search. 1298-1305
TrustWSN Session III
- Fei Zhu, Quan Liu, Xiaofang Zhang, Bairong Shen:
Protein-Protein Interaction Network Constructing Based on Text Mining and Reinforcement Learning with Application to Prostate Cancer. 1306-1311 - Huan Zhao, Chaoming Hu, Rui Zheng, Bin Lv:
Study on the Coverage of Adaptive Wireless Sensor Network Based on Trust. 1312-1317 - Weiqing Huang, Chang Ding, Siye Wang, Shuang Hu:
An Efficient Clustering Mining Algorithm for Indoor Moving Target Trajectory Based on the Improved AGNES. 1318-1323 - Wei Fan, Wei-qing Huang, Zhujun Zhang, Ye Wang, Degang Sun:
A Near Field Communication(NFC) Security Model Based on OSI Reference Model. 1324-1328 - Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara:
Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers. 1329-1336
The Seventh IEEE International Symposium on UbiSafe Computing (UbiSafe)
UbiSafe Session I
- Raimo Hilden, Kimmo Hätönen:
A Method for Deriving and Testing Malicious Behavior Detection Rules. 1337-1342 - Jorge López, Stephane Maag:
Towards a Generic Trust Management Framework Using a Machine-Learning-Based Trust Model. 1343-1348 - Jiska Classen, Johannes Braun, Florian Volk, Matthias Hollick, Johannes Buchmann, Max Mühlhäuser:
A Distributed Reputation System for Certification Authority Trust Management. 1349-1356
UbiSafe Session II
- Maryam Sepehri, Stelvio Cimato, Ernesto Damiani, Chan Yeob Yeun:
Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries. 1357-1362 - Fouad Amine Guenane, Michele Nogueira Lima, Ahmed Serhrouchni:
DDOS Mitigation Cloud-Based Service. 1363-1368 - Shunan Ma:
Dynamic Game Access Control Based on Trust. 1369-1373 - Muhammad Sabir Idrees, Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Dynamic Security Policies Enforcement and Adaptation Using Aspects. 1374-1379
The Second IEEE International Workshop on the Emerging Future Internet and Network Security (EFINS)
EFINS Session I
- Ameer Al-Nemrat, Chafika Benzaid:
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. 1380-1385 - Najla Etaher, George R. S. Weir, Mamoun Alazab:
From ZeuS to Zitmo: Trends in Banking Malware. 1386-1391 - Heman Awang Mangut, Ameer Al-Nemrat, Chafika Benzaid, Abdel-Rahman H. Tawil:
ARP Cache Poisoning Mitigation and Forensics Investigation. 1392-1397
EFINS Session II
- Midhun Babu Tharayanil, Gill Whitney, Mahdi Aiash, Chafika Benzaid:
Virtualization and Cyber Security: Arming Future Security Practitioners. 1398-1402 - Florian Jacob, Jens Mittag, Hannes Hartenstein:
A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe. 1403-1410 - Muhammad N. Sakib, Chin-Tser Huang:
Automated Collection and Analysis of Malware Disseminated via Online Advertising. 1411-1416
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.