


default search action
10. SecureComm 2014: Beijing, China
- Jing Tian, Jiwu Jing, Mudhakar Srivatsa:

International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 152, Springer 2015, ISBN 978-3-319-23828-9
Cloud Computing Security
- Xiaoyan Sun, Jun Dai

, Anoop Singhal, Peng Liu:
Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks. 3-23 - Tayyaba Zeb, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Muhammad Yousaf

:
A Secure Architecture for Inter-cloud Virtual Machine Migration. 24-35 - Jingwei Li

, Dan Lin, Anna Cinzia Squicciarini
, Chunfu Jia:
STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds. 36-44 - Zhangjie Fu, Jiangang Shu

, Xingming Sun:
An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability. 45-54 - Anna Cinzia Squicciarini

, Dan Lin, Smitha Sundareswaran, Jingwei Li
:
Policy Driven Node Selection in MapReduce. 55-72
Authentication and Identity
- Nicolas Van Balen, Haining Wang:

GridMap: Enhanced Security in Cued-Recall Graphical Passwords. 75-94 - Yazhe Wang, Mingming Hu, Chen Li:

UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts. 95-104 - Issa M. Khalil

, Zuochao Dou, Abdallah Khreishah
:
TPM-Based Authentication Mechanism for Apache Hadoop. 105-122 - Sarmad Ullah Khan, Rafiullah Khan, Inam Bari

, Naveed Jan:
An Authentication and Key Management Scheme for Heterogeneous Sensor Networks. 123-131 - Chengcheng Shao

, Liang Chen, Shuo Fan, Xinwen Jiang:
Social Authentication Identity: An Alternate to Internet Real Name System. 132-140 - Ding Wang

, Ping Wang:
On the Usability of Two-Factor Authentication. 141-150
Network Security
- Sushama Karumanchi, Jingwei Li

, Anna Cinzia Squicciarini
:
Securing Resource Discovery in Content Hosting Networks. 153-173 - Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips:

Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations. 174-182 - Kan Chen, Peidong Zhu, Yueshan Xiong:

Keep the Fakes Out: Defending Against Sybil Attack in P2P Systems. 183-191
Privacy and Wireless Security
- Binh Vo, Steven M. Bellovin:

Anonymous Publish-Subscribe Systems. 195-211 - Bhaswati Deka, Ryan M. Gerdes, Ming Li, Kevin P. Heaslip

:
Friendly Jamming for Secure Localization in Vehicular Transportation. 212-221 - Eirini D. Karapistoli, Panagiotis G. Sarigiannidis

, Anastasios A. Economides
:
Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks. 222-238 - Max Suraev:

Implementing an Affordable and Effective GSM IMSI Catcher with 3G Authentication. 239-256
System and Software Security
- Byungho Min, Vijay Varadharajan

:
A Simple and Novel Technique for Counteracting Exploit Kits. 259-277 - Yosra Ben Mustapha, Hervé Debar

, Gregory Blanc
:
Policy Enforcement Point Model. 278-286 - Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, Debin Gao

, Chunfu Jia:
Control Flow Obfuscation Using Neural Network to Fight Concolic Testing. 287-304 - Quanwei Cai

, Jingqiang Lin, Fengjun Li
, Qiongxiao Wang, Daren Zha:
EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients. 305-322 - Christopher Kugler, Tilo Müller:

SCADS - Separated Control- and Data-Stacks. 323-340
Crypto
- Qianying Zhang, Shijun Zhao, Yu Qin, Dengguo Feng:

Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware. 343-361 - Qinglong Zhang, Zongbin Liu, Quanwei Cai, Ji Xiang:

TST: A New Randomness Test Method Based on Coupon Collector's Problem. 362-373 - Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li, Fenghua Li:

Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy. 374-394 - Yuling Luo, Junxiu Liu, Lvchen Cao, Jinjie Bi, Senhui Qiu:

Hardware Implementation of Cryptographic Hash Function Based on Spatiotemporal Chaos. 395-404 - Yi-Ting Chiang, Tsan-sheng Hsu, Churn-Jung Liau, Yun-Ching Liu, Chih-Hao Shen, Da-Wei Wang, Justin Zhan:

An Information-Theoretic Approach for Secure Protocol Composition. 405-423
Mobile Security
- Swarup Chandra, Zhiqiang Lin, Ashish Kundu, Latifur Khan

:
Towards a Systematic Study of the Covert Channel Attacks in Smartphones. 427-435 - Hugo Gonzalez

, Natalia Stakhanova, Ali A. Ghorbani:
DroidKin: Lightweight Detection of Android Apps Similarity. 436-453 - Lulu Zhang, Yongzheng Zhang, Tianning Zang:

Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme. 454-462 - Duohe Ma, Zhen Xu, Dongdai Lin:

Defending Blind DDoS Attack on SDN Based on Moving Target Defense. 463-480 - Chen Cao, Yuqing Zhang, Qixu Liu, Kai Wang:

Function Escalation Attack. 481-497 - Lautaro Dolberg, Quentin Jérôme, Jérôme François, Radu State, Thomas Engel:

RAMSES: Revealing Android Malware Through String Extraction and Selection. 498-506 - Xi Xiao, Xianni Xiao, Yong Jiang, Qing Li

:
Detecting Mobile Malware with TMSVM. 507-516
Posters
- Guozhen Shi, Ying Shen, Fenghua Li, Mang Su, Dong Liu:

Research on Credible Regulation Mechanism for the Trading of Digital Works. 519-523 - Léa El Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Wael Kanoun, Samuel Dubus:

Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks. 524-529 - Xiaolin Xu, Yonglin Zhou, Qingshan Li:

Domain Algorithmically Generated Botnet Detection and Analysis. 530-534 - Jinqiao Shi, Xiao Wang, Binxing Fang, Qingfeng Tan, Li Guo:

Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy. 535-540 - Haofeng Jiao, Xiaohong Li, Lei Zhang, Guangquan Xu, Zhiyong Feng:

Hybrid Detection Using Permission Analysis for Android Malware. 541-545 - Fawad Khan

, Sarmad Ullah Khan, Inam Bari
:
Content Security Scheme for Content Centric Networks. 546-550 - Jinshuo Liu, Yabo Li, Yingyue Peng, Juan Deng, Xin Chen:

Detection of Food Safety Topics Based on SPLDAs. 551-555 - Parvez Faruki, Vijay Kumar, Ammar Bharmal, Manoj Singh Gaur, Vijay Laxmi

, Mauro Conti
:
Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps. 556-560
Web Security
- Jeroen Massar, Ian Mason, Linda Briesemeister, Vinod Yegneswaran:

JumpBox - A Seamless Browser Proxy for Tor Pluggable Transports. 563-581 - Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen, Guofei Gu:

Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks. 582-601 - Jialong Zhang, Jayant Notani, Guofei Gu:

Characterizing Google Hacking: A First Large-Scale Quantitative Study. 602-622 - Sami Zhioua

, Adnene Ben Jabeur, Mahjoub Langar, Wael Ilahi:
Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models. 623-631

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














