


default search action
TrustCom/BigDataSE/ISPA 2015: Helsinki, Finland - Volume 1
- 2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1. IEEE 2015, ISBN 978-1-4673-7952-6 
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
TrustCom Trust Track 1: Trust Evaluation, Reputation and Recommender Systems
- Huanyang Zheng, Jie Wu: 
 DynFluid: Predicting Time-Evolving Rating in Recommendation Systems via Fluid Dynamics. 1-8
- Wei Tang, Zheng Yan  : :
 CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive QoS Management. 9-16
- Jiageng Chen  , Atsuko Miyaji , Atsuko Miyaji , Hiroyuki Sato, Chunhua Su: , Hiroyuki Sato, Chunhua Su:
 Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags. 17-24
- Richard S. Weiss, Leon Reznik  , Yanyan Zhuang, Andrew Hoffman, Darrell Pollard, Albert Rafetseder, Tao Li, Justin Cappos: , Yanyan Zhuang, Andrew Hoffman, Darrell Pollard, Albert Rafetseder, Tao Li, Justin Cappos:
 Trust Evaluation in Mobile Devices: An Empirical Study. 25-32
- Jiaojiao Song, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng: 
 Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor. 33-40
TrustCom Trust Track 2: Trusted Environments
- Yingjun Zhang, Shijun Zhao, Yu Qin, Bo Yang, Dengguo Feng: 
 TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone. 41-48
- Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen: 
 On Rehoming the Electronic ID to TEEs. 49-56
- Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah: 
 Trusted Execution Environment: What It is, and What It is Not. 57-64
- Mordechai Guri, Yuri Poliak, Bracha Shapira  , Yuval Elovici: , Yuval Elovici:
 JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface. 65-73
- Nishant Patanaik, Ana Elisa P. Goulart: 
 Performance of Cooperative Firewalls in Real-World Deployments. 74-81
TrustCom Trust Track 3: Trust in Wireless and Sensor Networks
- Po-Hung Yang  , Sung-Ming Yen: , Sung-Ming Yen:
 Memory Attestation of Wireless Sensor Nodes by Trusted Local Agents. 82-89
- Bo Liu  , Wanlei Zhou , Wanlei Zhou , Longxiang Gao, Sheng Wen , Longxiang Gao, Sheng Wen , Tom H. Luan , Tom H. Luan : :
 Mobility Increases the Risk of Malware Propagations in Wireless Networks. 90-95
- Ming Xiang  , William Liu , William Liu , Quan Bai , Quan Bai , Adnan Al-Anbuky , Adnan Al-Anbuky : :
 Simmelian Ties and Structural Holes: Exploring Their Topological Roles in Forming Trust for Securing Wireless Sensor Networks. 96-103
- Weidong Yang, Le Xiao, Limin Sun, Qing Li: 
 Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks. 104-110
- Chuanyou Li, Michel Hurfin, Yun Wang: 
 Reputation Propagation and Updating in Mobile Ad Hoc Networks with Byzantine Failures. 111-118
TrustCom Trust Track 4: Trust in Social and Cloud Computing
- Xiaoming Zheng, Yan Wang  , Mehmet A. Orgun , Mehmet A. Orgun : :
 Contextual Sub-network Extraction in Contextual Social Networks. 119-126
- Ahmed Bouchami, Olivier Perrin, Ehtesham Zahoor: 
 Trust-Based Formal Delegation Framework for Enterprise Social Networks. 127-134
- Mirela Riveni  , Hong Linh Truong, Schahram Dustdar , Hong Linh Truong, Schahram Dustdar : :
 Trust-Aware Elastic Social Compute Units. 135-142
- Jing Chen, Yuling Peng, Ruiying Du, Quan Yuan, Minghui Zheng: 
 Regenerating-Codes-Based Efficient Remote Data Checking and Repairing in Cloud Storage. 143-150
TrustCom Security Track 1: Key Management
- Wei Zhou, Yang Xu, Guojun Wang: 
 Research on Key Management for Multi-privileged Group Communications. 151-158
- Fabrizio Biondi, Thomas Given-Wilson  , Axel Legay: , Axel Legay:
 Attainable Unconditional Security for Shared-Key Cryptosystems. 159-166
- Keita Emura  , Le Trieu Phong, Yohei Watanabe: , Le Trieu Phong, Yohei Watanabe:
 Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability. 167-174
- Kai Fan, Yuanyuan Gong, Zhao Du, Hui Li, Yintang Yang: 
 RFID Secure Application Revocation for IoT in 5G. 175-181
TrustCom Security Track 2: Software and OS Security
- Ludovic Apvrille, Axelle Apvrille: 
 Identifying Unknown Android Malware with Feature Extractions and Classification Techniques. 182-189
- Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, Qingkai Zeng: 
 Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses. 190-197
- Luiza Sayfullina, Emil Eirola  , Dmitry Komashinsky, Paolo Palumbo, Yoan Miché, Amaury Lendasse, Juha Karhunen: , Dmitry Komashinsky, Paolo Palumbo, Yoan Miché, Amaury Lendasse, Juha Karhunen:
 Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive Bayes. 198-205
- Zhenxiang Chen, Hongbo Han, Qiben Yan  , Bo Yang, Lizhi Peng, Lei Zhang, Jin Li: , Bo Yang, Lizhi Peng, Lei Zhang, Jin Li:
 A First Look at Android Malware Traffic in First Few Minutes. 206-213
- Marián Kühnel, Manfred Smieschek, Ulrike Meyer: 
 Fast Identification of Obfuscation and Mobile Advertising in Mobile Malware. 214-221
TrustCom Security Track 3: Data and Application Security
- Daniel M. Hein, Johannes Winter, Andreas Fitzek: 
 Secure Block Device - Secure, Flexible, and Efficient Data Storage for ARM TrustZone Systems. 222-229
- Jing Long, Dafang Zhang, Wei Liang  , Wenwei Li: , Wenwei Li:
 A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection. 230-237
- Daniel Gonçalves, Joao Bota, Miguel Correia  : :
 Big Data Analytics for Detecting Host Misbehavior in Large Logs. 238-245
- Deepak Puthal, Surya Nepal, Rajiv Ranjan  , Jinjun Chen: , Jinjun Chen:
 DPBSV - An Efficient and Secure Scheme for Big Sensing Data Stream. 246-253
- Brahim Hamid  : :
 Interplay of Security&Dependability and Resource Using Model-Driven and Pattern-Based Development. 254-262
TrustCom Security Track 4: Network Security
- Yue-Bin Luo, Baosheng Wang, Xiaofeng Wang, Xiao-Feng Hu, Gui-Lin Cai, Hao Sun: 
 RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries. 263-270
- Zigang Cao, Gang Xiong  , Li Guo: , Li Guo:
 MimicHunter: A General Passive Network Protocol Mimicry Detection Framework. 271-278
- Douglas Stebila  , Nick Sullivan: , Nick Sullivan:
 An Analysis of TLS Handshake Proxying. 279-286
- Lars Baumgärtner  , Jonas Hochst , Jonas Hochst , Matthias Leinweber, Bernd Freisleben , Matthias Leinweber, Bernd Freisleben : :
 How to Misuse SMTP over TLS: A Study of the (In) Security of Email Server Communication. 287-294
TrustCom Security Track 5: Network Security
- Mohammed A. Ambusaidi, Xiangjian He  , Priyadarsi Nanda: , Priyadarsi Nanda:
 Unsupervised Feature Selection Method for Intrusion Detection System. 295-301
- Jiao Jiao Jiang  , Andi Zhou, Kasra Majbouri Yazdi, Sheng Wen , Andi Zhou, Kasra Majbouri Yazdi, Sheng Wen , Shui Yu , Shui Yu , Yang Xiang: , Yang Xiang:
 Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach. 302-309
- Rui Wang  , Zhiping Jia, Lei Ju: , Zhiping Jia, Lei Ju:
 An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking. 310-317
- Mian Ahmad Jan  , Priyadarsi Nanda, Xiangjian He , Priyadarsi Nanda, Xiangjian He , Ren Ping Liu: , Ren Ping Liu:
 A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network. 318-325
TrustCom Security Track 6: Information Security
- Jukka A. Koskinen  : :
 Surveys of Daily Information Security of Citizens in Finland. 326-333
- Ismail Adel Al-Taharwa  , Hahn-Ming Lee, Albert B. Jeng, Cheng-Seen Ho, Kuo-Ping Wu, Shyi-Ming Chen: , Hahn-Ming Lee, Albert B. Jeng, Cheng-Seen Ho, Kuo-Ping Wu, Shyi-Ming Chen:
 Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction. 334-343
- Sampsa Rauti, Jukka Teuhola, Ville Leppänen  : :
 Diversifying SQL to Prevent Injection Attacks. 344-351
- Ali Farooq  , Johanna Isoaho, Seppo Virtanen , Johanna Isoaho, Seppo Virtanen , Jouni Isoaho , Jouni Isoaho : :
 Information Security Awareness in Educational Institution: An Analysis of Students' Individual Factors. 352-359
TrustCom Security Track 7: Authentication and Crypto
- Abdullah Mohammed Almuhaideb  , Bala Srinivasan, Phu Dung Le, Mohammed A. Alhabeeb, Waleed Alfehaid: , Bala Srinivasan, Phu Dung Le, Mohammed A. Alhabeeb, Waleed Alfehaid:
 A Hybrid Mobile Authentication Model for Ubiquitous Networking. 360-367
- Sufian Hameed  , Usman Murad Jamali, Adnan Samad: , Usman Murad Jamali, Adnan Samad:
 Integrity Protection of NDEF Message with Flexible and Enhanced NFC Signature Records. 368-375
- Jianming Fu, Xu Zhang, Yan Lin: 
 An Instruction-Set Randomization Using Length-Preserving Permutation. 376-383
- Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao: 
 Cut-and-Choose Bilateral Oblivious Transfer and Its Application. 384-391
- Chaohui Du, Guoqiang Bai: 
 A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based Cryptography. 392-399
TrustCom Security Track 8: Secure Environments
- Brian McGillion  , Tanel Dettenborn, Thomas Nyman , Tanel Dettenborn, Thomas Nyman , N. Asokan , N. Asokan : :
 Open-TEE - An Open Virtual Trusted Execution Environment. 400-407
- Julian Horsch  , Sascha Wessel: , Sascha Wessel:
 Transparent Page-Based Kernel and User Space Execution Tracing from a Custom Minimal ARM Hypervisor. 408-417
- Nuno Teodoro, Luis Goncalves, Carlos Serrão  : :
 NIST CyberSecurity Framework Compliance: A Generic Model for Dynamic Assessment and Predictive Requirements. 418-425
- Sivadon Chaisiri  , Ryan K. L. Ko , Ryan K. L. Ko , Dusit Niyato , Dusit Niyato : :
 A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management. 426-433
TrustCom Security Track 9: Cloud Security
- Yuchuan Luo, Ming Xu, Shaojing Fu, Dongsheng Wang, Junquan Deng  : :
 Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation. 434-442
- Kenichi Kourai  , Tatuya Kajiwara: , Tatuya Kajiwara:
 Secure Out-of-Band Remote Management Using Encrypted Virtual Serial Consoles in IaaS Clouds. 443-450
- Chang Liu, Liehuang Zhu, Jinjun Chen: 
 Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud. 451-458
- Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu, Fangfang Shan: 
 Achieving Lightweight and Secure Access Control in Multi-authority Cloud. 459-466
TrustCom Security Track 10: IoT and Wireless Security, Heterogeneous
- Kim Thuat Nguyen, Nouha Oualha  , Maryline Laurent , Maryline Laurent : :
 Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things. 467-474
- Guowei Wu, Jie Wang, Lin Yao: 
 Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network Calculus. 475-482
- Raja Naeem Akram  , Konstantinos Markantonakis , Konstantinos Markantonakis , Damien Sauveron, Keith Mayes: , Damien Sauveron, Keith Mayes:
 Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures. 483-490
- Robert Mark Seepers, Christos Strydis  , Ioannis Sourdis, Chris Innocentius De Zeeuw: , Ioannis Sourdis, Chris Innocentius De Zeeuw:
 On Using a Von Neumann Extractor in Heart-Beat-Based Security. 491-498
TrustCom Privacy Track 2: User Privacy
- Li Lu, Muhammad Jawad Hussain, Hongzi Zhu: 
 WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID Systems. 499-506
- Seung-Hyun Kim, Han-Gyu Ko, In-Young Ko, Daeseon Choi: 
 Effects of Contextual Properties on Users' Privacy Preferences in Mobile Computing Environments. 507-514
- Tommi Meskanen, Jian Liu, Sara Ramezanian, Valtteri Niemi: 
 Private Membership Test for Bloom Filters. 515-522
- Julien Mineraud, Federico Lancerin, Sasitharan Balasubramaniam  , Mauro Conti , Mauro Conti , Sasu Tarkoma , Sasu Tarkoma : :
 You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental Data. 523-530
TrustCom Privacy Track 3: Location Privacy and others
- Matthew Bradbury  , Matthew Leeke, Arshad Jhumka: , Matthew Leeke, Arshad Jhumka:
 A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks. 531-538
- Vincent Primault, Sonia Ben Mokhtar  , Cédric Lauradoux, Lionel Brunie: , Cédric Lauradoux, Lionel Brunie:
 Time Distortion Anonymization for the Publication of Mobility Data with High Utility. 539-546
- Ian Oliver, Silke Holtmanns: 
 Aligning the Conflicting Needs of Privacy, Malware Detection and Network Protection. 547-554
- Hui Peng, Xiaoying Zhang, Hong Chen, Yuncheng Wu, Yao Wu, Juru Zeng: 
 Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor Networks. 555-562
TrustCom Privacy Track 4: Data Privacy
- Mark A. Will, Ryan K. L. Ko  , Ian H. Witten: , Ian H. Witten:
 Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud. 563-570
- Albin Petit, Thomas Cerqueus, Sonia Ben Mokhtar  , Lionel Brunie, Harald Kosch: , Lionel Brunie, Harald Kosch:
 PEAS: Private, Efficient and Accurate Web Search. 571-580
- Olof Görnerup, Nima Dokoohaki  , Andrea Hess , Andrea Hess : :
 Privacy-Preserving Mining of Frequent Routes in Cellular Network Data. 581-587
- Milica Milutinovic, Italo Dacosta, Andreas Put, Bart De Decker: 
 uCentive: An Efficient, Anonymous and Unlinkable Incentives Scheme. 588-595
TrustCom Privacy Track 5: Identity Privacy
- Yuichi Sei  , Takao Takenouchi, Akihiko Ohsuga: , Takao Takenouchi, Akihiko Ohsuga:
 (l1, ..., lq)-diversity for Anonymizing Sensitive Quasi-Identifiers. 596-603
- Neetesh Saxena  , Bong Jun Choi , Bong Jun Choi , Shinyoung Cho: , Shinyoung Cho:
 Lightweight Privacy-Preserving Authentication Scheme for V2G Networks in the Smart Grid. 604-611
- Pierre-François Bonnefoi, Pierre Dusart, Damien Sauveron, Raja Naeem Akram  , Konstantinos Markantonakis , Konstantinos Markantonakis : :
 A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags. 612-620
- Takao Murakami, Atsunori Kanemura  , Hideitsu Hino , Hideitsu Hino : :
 Group Sparsity Tensor Factorization for De-anonymization of Mobility Traces. 621-629
The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (RATSP)
RATSP Trust Track 1
- Jiun Yi Yap, Allan Tomlinson: 
 Provenance-Based Attestation for Trustworthy Computing. 630-637
- Nazila Gol Mohammadi, Torsten Bandyszak, Costas Kalogiros, Michalis Kanakakis, Thorsten Weyer  : :
 A Framework for Evaluating the End-to-End Trustworthiness. 638-645
- Mohammad M. Bany Taha, Sivadon Chaisiri  , Ryan K. L. Ko , Ryan K. L. Ko : :
 Trusted Tamper-Evident Data Provenance. 646-653
- Igor V. Kotenko  , Igor Saenko , Igor Saenko , Sergey Ageev: , Sergey Ageev:
 Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference. 654-659
RATSP Trust Track 2
- Jouni Hiltunen, Jarkko Kuusijärvi  : :
 Trust Metrics Based on a Trusted Network Element. 660-667
- Zhengping Wu, Lifeng Wang: 
 Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria Analysis. 668-675
- Alessandro Aldini  , Jean-Marc Seigneur , Jean-Marc Seigneur , Carlos Ballester Lafuente, Xavier Titi, Jonathan Guislain: , Carlos Ballester Lafuente, Xavier Titi, Jonathan Guislain:
 Formal Modeling and Verification of Opportunity-enabled Risk Management. 676-684
RATSP Trust Track 3
- Andrew Bolster, Alan Marshall: 
 Single and Multi-metric Trust Management Frameworks for Use in Underwater Autonomous Networks. 685-693
- Abdullah Aref  , Thomas T. Tran: , Thomas T. Tran:
 RLTE: A Reinforcement Learning Based Trust Establishment Model. 694-701
- Florian Reimair, Peter Teufl, Bernd Prünster  : :
 In Certificates We Trust - Revisited. 702-709
- Sayaka Umeda, Takashi Kamimoto, Yuri Ohata, Hiroshi Shigeno: 
 Interest Flow Control Method Based on User Reputation and Content Name Prefixes in Named Data Networking. 710-717
RATSP Trust Track 4
- Muhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, Elisa Bertino: 
 Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation. 718-725
- Hao Xue, Fengjun Li  , Hyunjin Seo , Hyunjin Seo , Roseann Pluretti: , Roseann Pluretti:
 Trust-Aware Review Spam Detection. 726-733
- Ester López, Leandro Navarro  : :
 KDet: Coordinated Detection of Forwarding Faults in Wireless Community Networks. 734-741
- Xin Li, Chaitanya Joshi  , Alan Yu Shyang Tan , Alan Yu Shyang Tan , Ryan Kok Leong Ko , Ryan Kok Leong Ko : :
 Inferring User Actions from Provenance Logs. 742-749
RATSP Security Track 1
- Thanh Dat Dang, Doan B. Hoang, Priyadarsi Nanda: 
 Data Mobility Management Model for Active Data Cubes. 750-757
- Daiki Chiba  , Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto: , Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto:
 BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts. 758-765
- Nada Alruhaily, Behzad Bordbar, Tom Chothia: 
 Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection. 766-773
- Subil Abraham, Suku Nair: 
 A Novel Architecture for Predictive CyberSecurity Using Non-homogenous Markov Models. 774-781
- Mourad Benmalek  , Yacine Challal , Yacine Challal : :
 eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid. 782-789
RATSP Security Track 2
- John Ross Wallrabenstein  : :
 Implementing Authentication Systems Based on Physical Unclonable Functions. 790-796
- Martin Boonk, Ronald Petrlic, Christoph Sorge: 
 Save Our Passwords. 797-800
- Luigi Lo Iacono  : :
 Partial Data Protection via Structure-Preserving Document Partitioning. 801-807
- Danushka Jayasinghe, Raja Naeem Akram, Konstantinos Markantonakis, Konstantinos Rantos, Keith Mayes: 
 Enhancing EMV Online PIN Verification. 808-817
- Fabian Lanze, Andriy Panchenko, Thomas Engel: 
 A Formalization of Fingerprinting Techniques. 818-825
RATSP Security Track 3
- Aleksandr Ometov  , Konstantin Zhidanov, Sergey Bezzateev, Roman Florea, Sergey D. Andreev , Konstantin Zhidanov, Sergey Bezzateev, Roman Florea, Sergey D. Andreev , Yevgeni Koucheryavy , Yevgeni Koucheryavy : :
 Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity. 826-833
- Christian Banse  , Sathyanarayanan Rangarajan: , Sathyanarayanan Rangarajan:
 A Secure Northbound Interface for SDN Applications. 834-839
- Yuri Ohata, Sayaka Umeda, Takashi Kamimoto, Hiroshi Shigeno: 
 Secure Routing Protocol Considering Load Distribution in Mobile Ad Hoc Networks. 840-847
- Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, Zheng Yan  : :
 A Study of IEEE 802.15.6 Association Protocols. 848-855
RATSP Security Track 4
- Lorena González-Manzano, José María de Fuentes  , Agustín Orfila: , Agustín Orfila:
 Access Control for the Cloud Based on Multi-device Authentication. 856-863
- Ahmed Bouchami, Elio Goettelmann, Olivier Perrin, Claude Godart: 
 Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms. 864-871
- Elochukwu Ukwandu  , William J. Buchanan , William J. Buchanan , Lu Fan, Gordon Russell , Lu Fan, Gordon Russell , Owen Lo: , Owen Lo:
 RESCUE: Resilient Secret Sharing Cloud-Based Architecture. 872-879
- Holger Kühner, Hannes Hartenstein: 
 On the Resource Consumption of Secure Data Sharing. 880-889
- Maksim Avdyushkin, Musfiq Rahman: 
 Secure Location Validation with Wi-Fi Geo-fencing and NFC. 890-896
RATSP Security Track 5
- Dongxi Liu, John Zic  : :
 Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators. 897-904
- Gyan Singh Yadav, Aparajita Ojha: 
 A Scalable Data Hiding Scheme Using Hilbert Space Curve and Chaos. 905-909
- Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy: 
 Detecting Data Semantic: A Data Leakage Prevention Approach. 910-917
- Shigui Qi, Dan Feng, Nan Su, Wenguo Liu, Jingning Liu: 
 A New Solution Based on Multi-rate LDPC for Flash Memory to Reduce ECC Redundancy. 918-923
- Mohamed Ali El-Serngawy, Chamseddine Talhi: 
 CaptureMe: Attacking the User Credential in Mobile Banking Applications. 924-933
RATSP Privacy Track 1
- Zakaria Sahnoune  , Esma Aïmeur, Ghada El Haddad, Rodrigue Sokoudjou: , Esma Aïmeur, Ghada El Haddad, Rodrigue Sokoudjou:
 Watch Your Mobile Payment: An Empirical Study of Privacy Disclosure. 934-941
- Robert Koch, Mario Golling, Gabi Dreo Rodosek: 
 Disequilibrium: Tor's Exit Node Selection under the Stereoscope. 942-949
- Tommi Meskanen, Valtteri Niemi, Noora Nieminen: 
 Extended Model of Side-Information in Garbling. 950-957
- Ahmad Sabouri: 
 A Cloud-Based Model to Facilitate Mobility of Privacy-Preserving Attribute-Based Credential Users. 958-965
- Vladimir Estivill-Castro  , David F. Nettleton: , David F. Nettleton:
 Can On-line Social Network Users Trust That What They Designated as Confidential Data Remains So? 966-973
RATSP Privacy Track 2
- Mahmoud Khonji, Youssef Iraqi  : :
 Stylometric Anonymity: Is Imitation the Best Strategy? 974-982
- Anirban Basu, Toru Nakamura, Seira Hidano, Shinsaku Kiyomoto: 
 k-anonymity: Risks and the Reality. 983-989
- Dali Zhu, Zheming Fan, Na Pang: 
 A Dynamic Credible Factory Reset Mechanism of Personal Data in Android Device. 990-998
- Christiaan Hillen: 
 The Pseudonym Broker Privacy Pattern in Medical Data Collection. 999-1005
- Emmanouil A. Panaousis  , Aron Laszka , Aron Laszka , Johannes Pohl, Andreas Noack, Tansu Alpcan: , Johannes Pohl, Andreas Noack, Tansu Alpcan:
 Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking. 1006-1013
RATSP Privacy Track 3
- Yen-Lin Chen, Hahn-Ming Lee, Albert B. Jeng, Te-En Wei: 
 DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps. 1014-1021
- Kok-Seng Wong  , Minji Seo , Minji Seo , Myung Ho Kim , Myung Ho Kim : :
 Secure Two-Party Rank Correlation Computations for Recommender Systems. 1022-1028
- Anna Rohunen, Jouni Markkula: 
 The Role of Risk Perceptions in Privacy Concerns Evaluation. 1029-1036
- Ronan-Alexandre Cherrueau, Rémi Douence, Mario Südholt: 
 A Language for the Composition of Privacy-Enforcement Techniques. 1037-1044
- Silvia Puglisi, David Rebollo-Monedero  , Jordi Forné , Jordi Forné : :
 Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications. 1045-1052
The Fifth IEEE International Symposium on Trust and Security in Cloud Computing (TSCloud)
TSCloud Session I
- Jason Walls, Kim-Kwang Raymond Choo  : :
 A Review of Free Cloud-Based Anti-Malware Apps for Android. 1053-1058
- Ming Di Leom, Christian Javier D'Orazio, Gaye Deegan  , Kim-Kwang Raymond Choo , Kim-Kwang Raymond Choo : :
 Forensic Collection and Analysis of Thumbnails in Android. 1059-1066
- Mohammad Reza Memarian, Mauro Conti  , Ville Leppänen , Ville Leppänen : :
 EyeCloud: A BotCloud Detection System. 1067-1072
TSCloud Session II
- Kin Suntana Tep, Ben Martini, Ray Hunt, Kim-Kwang Raymond Choo  : :
 A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management. 1073-1080
- Umar Mukhtar Ismail, Shareeful Islam, Haralambos Mouratidis: 
 Cloud Security Audit for Migration and Continuous Monitoring. 1081-1087
- Bob Duncan, Mark Whittington: 
 Enhancing Cloud Security and Privacy: Broadening the Service Level Agreement. 1088-1093
- Felix Immanuel, Ben Martini, Kim-Kwang Raymond Choo  : :
 Android Cache Taxonomy and Forensic Process. 1094-1101
TSCloud Session III
- Cengiz Örencik, Mahmoud Alewiwi, Erkay Savas: 
 Secure Sketch Search for Document Similarity. 1102-1107
- Luciano Barreto, Joni da Silva Fraga, Frank Siqueira: 
 Architectural Model and Security Mechanisms for Cloud Federations. 1108-1115
- Gwan-Hwan Hwang, Kuh-Yih Huang, Yu-Cheng Hsiao  : :
 A Framework for Cryptography Based Accountability and Service Invocation Control for Service Composition in a Multicloud Architecture. 1116-1121
- Jose Juan Mijares Chan, Parimala Thulasiraman, Gabriel Thomas, Ruppa K. Thulasiram: 
 Stationarity Enforcement of Accelerator Based TRNG by Genetic Algorithm. 1122-1128
The First IEEE International Workshop on Trustworthy Software Systems (TrustSoft)
TrustSoft Session I
- Baden Delamore, Ryan K. L. Ko  : :
 A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications. 1129-1135
- Dennis Titze, Julian Schütte  : :
 Preventing Library Spoofing on Android. 1136-1141
TrustSoft Session II
- Mazen Ezzeddine  , Haitham Akkary: , Haitham Akkary:
 Issues in Trustworthy Software Systems. 1142-1147
- Xiaotian Wang, Matthew Davis, Junjie Zhang, Vance Saunders: 
 Mission-Aware Vulnerability Assessment for Cyber-Physical Systems. 1148-1153
- Zhaoli Liu, Tao Qin, Xiaohong Guan, Xiaoqiang Niu, Tao Yang: 
 Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics. 1154-1159
- Haining Meng, Xinhong Hei, Yan Li, Yanning Du, Guo Xie  : :
 A Rejuvenation Model for Software System under Normal Attack. 1160-1164
The First IEEE International Workshop on 5G Security (IW5GS)
IW5GS Session I
- Peter Schneider, Günther Horn: 
 Towards 5G Security. 1165-1170
- Siddharth Prakash Rao  , Silke Holtmanns, Ian Oliver, Tuomas Aura , Silke Holtmanns, Ian Oliver, Tuomas Aura : :
 Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access. 1171-1176
- Vikramajeet Khatri  , Joerg Abendroth: , Joerg Abendroth:
 Mobile Guard Demo: Network Based Malware Detection. 1177-1179
IW5GS Session II
- Nicolae Paladi, Christian Gehrmann: 
 Towards Secure Multi-tenant Virtualized Networks. 1180-1185
- Elena Dubrova, Mats Näslund, Göran Selander: 
 CRC-Based Message Authentication for 5G Mobile Technology. 1186-1191
- Prajwol Kumar Nakarmi, Oscar Ohlsson, Michael Liljenstam: 
 An Air Interface Signaling Protection Function for Mobile Networks: GSM Experiments and Beyond. 1192-1198
IW5GS Session III
- Mingjun Wang, Zheng Yan  : :
 Security in D2D Communications: A Review. 1199-1204
- Jari Arkko, Karl Norrman, Mats Näslund, Bengt Sahlin: 
 A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy. 1205-1209
The Eighth IEEE International Symposium on Security, Privacy and Anonymity in Internet of Things (SpaIoT)
SpaIoT Session I
- Francisco Martín-Fernández, Pino Caballero-Gil  , Cándido Caballero-Gil: , Cándido Caballero-Gil:
 Revocation Management in Vehicular Ad-hoc Networks. 1210-1217
- Daiyong Quan, Lihua Yin, Yunchuan Guo: 
 Enhancing the Trajectory Privacy with Laplace Mechanism. 1218-1223
- Di Wu, Jingfu Du, Dali Zhu, Siye Wang  : :
 A Simple RFID-Based Architecture for Privacy Preservation. 1224-1229
- Chaohui Du, Guoqiang Bai, Hongyi Chen: 
 Towards Efficient Implementation of Lattice-Based Public-Key Encryption on Modern CPUs. 1230-1236
- Shinsaku Kiyomoto, Toru Nakamura, Yutaka Miyake: 
 Towards Tracing of k-Anonymized Datasets. 1237-1242
SpaIoT Session II
- Wei Wang, Zhan Wang, Wen Tao Zhu, Lei Wang: 
 WAVE: Secure Wireless Pairing Exploiting Human Body Movements. 1243-1248
- Naveen Kumar, Anish Mathuria, Manik Lal Das: 
 Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System. 1249-1254
- Bernd Jäger: 
 Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture. 1255-1260
- Catia Prandi  , Stefano Ferretti, Silvia Mirri , Stefano Ferretti, Silvia Mirri , Paola Salomoni: , Paola Salomoni:
 A Trustworthiness Model for Crowdsourced and Crowdsensed Data. 1261-1266
The First IEEE International Workshop on Trust and Security in Wireless Sensor Networks (TrustWSN)
TrustWSN Session I
- Yanchao Song, Juan Luo  , Chang Liu, Wenfeng He: , Chang Liu, Wenfeng He:
 Periodicity-and-Linear-Based Data Suppression Mechanism for WSN. 1267-1271
- Hongsong Chen, Zhi Han, Zhongchuan Fu: 
 Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks. 1272-1278
- Kyoungsoo Bok, Eunkyung Ryu, Junho Park, Jaesoo Yoo: 
 An Energy Efficient Congestion Control Scheme for Multimedia Data in Wireless Sensor Networks. 1279-1283
TrustWSN Session II
- Zuo Chen, Mengyuan Jia, Yan Wang, Xiaolong Yan: 
 A Security Topology Protocol of Wireless Sensor Networks Based on Community Detection and Energy Aware. 1284-1291
- Huan Zhao, Qian Zhang, Liang Zhang, Yan Wang: 
 A Novel Sensor Deployment Approach Using Fruit Fly Optimization Algorithm in Wireless Sensor Networks. 1292-1297
- Zuo Chen, Xue Li, Bin Lv, Mengyuan Jia: 
 A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Particle Swarm Optimization and Cuckoo Search. 1298-1305
TrustWSN Session III
- Fei Zhu, Quan Liu, Xiaofang Zhang, Bairong Shen: 
 Protein-Protein Interaction Network Constructing Based on Text Mining and Reinforcement Learning with Application to Prostate Cancer. 1306-1311
- Huan Zhao, Chaoming Hu, Rui Zheng, Bin Lv: 
 Study on the Coverage of Adaptive Wireless Sensor Network Based on Trust. 1312-1317
- Weiqing Huang, Chang Ding, Siye Wang  , Shuang Hu: , Shuang Hu:
 An Efficient Clustering Mining Algorithm for Indoor Moving Target Trajectory Based on the Improved AGNES. 1318-1323
- Wei Fan, Wei-qing Huang, Zhujun Zhang, Ye Wang, Degang Sun: 
 A Near Field Communication(NFC) Security Model Based on OSI Reference Model. 1324-1328
- Kenta Muranaka, Naoto Yanai  , Shingo Okamura, Toru Fujiwara: , Shingo Okamura, Toru Fujiwara:
 Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers. 1329-1336
The Seventh IEEE International Symposium on UbiSafe Computing (UbiSafe)
UbiSafe Session I
- Raimo Hilden, Kimmo Hätönen: 
 A Method for Deriving and Testing Malicious Behavior Detection Rules. 1337-1342
- Jorge López, Stephane Maag: 
 Towards a Generic Trust Management Framework Using a Machine-Learning-Based Trust Model. 1343-1348
- Jiska Classen, Johannes Braun, Florian Volk, Matthias Hollick  , Johannes Buchmann, Max Mühlhäuser: , Johannes Buchmann, Max Mühlhäuser:
 A Distributed Reputation System for Certification Authority Trust Management. 1349-1356
UbiSafe Session II
- Maryam Sepehri, Stelvio Cimato  , Ernesto Damiani , Ernesto Damiani , Chan Yeob Yeun: , Chan Yeob Yeun:
 Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries. 1357-1362
- Fouad Amine Guenane, Michele Nogueira Lima  , Ahmed Serhrouchni: , Ahmed Serhrouchni:
 DDOS Mitigation Cloud-Based Service. 1363-1368
- Shunan Ma: 
 Dynamic Game Access Control Based on Trust. 1369-1373
- Muhammad Sabir Idrees, Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens: 
 Dynamic Security Policies Enforcement and Adaptation Using Aspects. 1374-1379
The Second IEEE International Workshop on the Emerging Future Internet and Network Security (EFINS)
EFINS Session I
- Ameer Al-Nemrat, Chafika Benzaid  : :
 Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. 1380-1385
- Najla Etaher, George R. S. Weir, Mamoun Alazab  : :
 From ZeuS to Zitmo: Trends in Banking Malware. 1386-1391
- Heman Awang Mangut, Ameer Al-Nemrat, Chafika Benzaid  , Abdel-Rahman H. Tawil , Abdel-Rahman H. Tawil : :
 ARP Cache Poisoning Mitigation and Forensics Investigation. 1392-1397
EFINS Session II
- Midhun Babu Tharayanil, Gill Whitney, Mahdi Aiash, Chafika Benzaid  : :
 Virtualization and Cyber Security: Arming Future Security Practitioners. 1398-1402
- Florian Jacob  , Jens Mittag, Hannes Hartenstein: , Jens Mittag, Hannes Hartenstein:
 A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe. 1403-1410
- Muhammad N. Sakib, Chin-Tser Huang: 
 Automated Collection and Analysis of Malware Disseminated via Online Advertising. 1411-1416

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














