default search action
TrustCom/BigDataSE/ISPA 2016: Tianjin, China
- 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016. IEEE 2016, ISBN 978-1-5090-3205-1
TrustCom 2016: The 15th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications
TrustCom Trust Track
- Peng Xiao, Zhiyang Li, Heng Qi, Wenyu Qu, Haisheng Yu:
An Efficient DDoS Detection with Bloom Filter in SDN. 1-6 - Anirban Basu, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh:
PrefRank: Quantification and Aggregation of Subjective User Preferences. 7-13 - Xi Huang, Xiaoguang Liu, Gang Wang, Ming Su:
A Robust Image Hashing with Enhanced Randomness by Using Random Walk on Zigzag Blocking. 14-18 - Shengshan Hu, Qian Wang, Jingjun Wang, Sherman S. M. Chow, Qin Zou:
Securing Fast Learning! Ridge Regression over Encrypted Big Data. 19-26 - Tianqi Zhou, Bing Chen, Chunsheng Zhu, Xiangping Bryce Zhai:
TPAHS: A Truthful and Profit Maximizing Double Auction for Heterogeneous Spectrums. 27-33 - Quang-Vinh Dang, Claudia-Lavinia Ignat:
Computational Trust Model for Repeated Trust Games. 34-41 - Caimei Wang, Yan Xiong, Wenchao Huang, Huihua Xia, Jianmeng Huang:
Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus. 42-49 - Hui Xia, Guo-Dong Wang, Zhenkuan Pan:
Node Trust Prediction Framework in Mobile Ad Hoc Networks. 50-56 - Fajiang Yu, Lie Chen, Huanguo Zhang:
Virtual TPM Dynamic Trust Extension Suitable for Frequent Migrations. 57-65 - Xu Yang, Ting-Ting Lee, Joseph K. Liu, Xinyi Huang:
Trust Enhancement over Range Search for Encrypted Data. 66-73 - Haoyi Cui, Qingzhong Li, Hui Li, Zhongmin Yan:
Healthcare Fraud Detection Based on Trustworthiness of Doctors. 74-81 - Dilshan Jayarathna, Vijay Varadharajan, Udaya Kiran Tupakula:
Integrated Security for Services Hosted in Virtual Environments. 82-89 - Xinping Min, Qingzhong Li, Lei Liu, Lizhen Cui:
A Permissioned Blockchain Framework for Supporting Instant Transaction and Dynamic Block Size. 90-96 - Salman Manzoor, Ahmed Taha, Neeraj Suri:
Trust Validation of Cloud IaaS: A Customer-centric Approach. 97-104 - Xiuwen Zhou, Qianhong Wu, Bo Qin, Xinyi Huang, Jianwei Liu:
Distributed Bitcoin Account Management. 105-112 - Cong Zuo, James Macindoe, Siyin Yang, Ron Steinfeld, Joseph K. Liu:
Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption. 113-120 - Jian Peng, Kim-Kwang Raymond Choo, Helen Ashman:
Astroturfing Detection in Social Media: Using Binary n-Gram Analysis for Authorship Attribution. 121-128 - Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Chunkai Zhang, Xiaomeng Zhao:
Dynamic Attribute-Based Access Control in Cloud Storage Systems. 129-137 - Xu Yang, Yuexin Zhang, Joseph K. Liu, YaLi Zeng:
A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks. 138-143 - Christine Blakemore, João Redol, Miguel Correia:
Fingerprinting for Web Applications: From Devices to Related Groups. 144-151 - Wu Luo, Wei Liu, Yang Luo, Anbang Ruan, Qingni Shen, Zhonghai Wu:
Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations. 152-159 - Muhammad Saleem Khan, Idrees Ahmed, Abid Khan, Majid Iqbal Khan:
Adaptive Reputation Weights Assignment Scheme for MANETs. 160-167 - Carlton Shepherd, Ghada Arfaoui, Iakovos Gurulian, Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram, Damien Sauveron, Emmanuel Conchon:
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. 168-177 - Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan:
An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. 178-184 - Tharam S. Dillon, Elizabeth Chang:
Trust and Risk Semantics and Prediction through Big Data Analytics to Encompass Cloud Services, Cyber-Physical Systems, and Social Media: Issues and Challenges. 185-193
TrustCom Security Track
- Fangxiao Ning, Min Zhu, Ruibang You, Gang Shi, Dan Meng:
Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments. 194-200 - Kazuhide Fukushima, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean-Luc Danger, Sylvain Guilley, Yuto Nakano, Shinsaku Kiyomoto, Laurent Sauvage:
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology. 201-207 - Jinkun Pan, Xiaoguang Mao:
DomXssMicro: A Micro Benchmark for Evaluating DOM-Based Cross-Site Scripting Detection. 208-215 - Jiliang Zhang:
Combinational Logic Binding for FPGA System Security. 216-223 - Juhua Liu, Guoqiang Bai, Xingjun Wu:
Efficient Hardware Implementation of Roadrunner for Lightweight Application. 224-227 - Yan Yang, Xingang Shi, Xia Yin, Zhiliang Wang:
The Power of Prefix Hijackings in the Internet Hierarchy. 228-235 - Hong Rong, Huimei Wang, Jian Liu, Wei Wu, Ming Xian:
Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments. 236-243 - Xin Su, Dafang Zhang, Wenjia Li, Kai Zhao:
A Deep Learning Approach to Android Malware Feature Learning and Detection. 244-251 - Yajuan Xiao, Shoufeng Cao, Zhenzhong Cao, Fengyu Wang, Fengbo Lin, Jiayan Wu, Hancheng Bi:
Matching Similar Functions in Different Versions of a Malware. 252-259 - Hua Jin, Changda Wang:
Robustness of the Packet Delay Channels. 260-267 - Jianyi Zhang, Yang Pan, Zhiqiang Wang, Biao Liu:
URL Based Gateway Side Phishing Detection Method. 268-275 - Ziyu Wang, Jiahai Yang, Shize Zhang, Chenxi Li, Hui Zhang:
Automatic Model Selection for Anomaly Detection. 276-283 - Yafei Sang, Shicong Li, Yongzheng Zhang, Tao Xu:
ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding. 284-291 - Guozhu Zhang, Luning Xia, Shijie Jia, Yafei Ji:
Identification of Cloned HF RFID Proximity Cards Based on RF Fingerprinting. 292-300 - Zhengyang Chen, Bowen Yu, Yu Zhang, Jianzhong Zhang, Jingdong Xu:
Automatic Mobile Application Traffic Identification by Convolutional Neural Networks. 301-307 - Qian Zhang, Ying Jiang, Peng Wu:
Modelling and Analysis of Network Security - An Algebraic Approach. 308-315 - Li Cheng, Yijie Wang, Xingkong Ma, Yongjun Wang:
GSLAC: A General Scalable and Low-Overhead Alert Correlation Method. 316-323 - Ryoki Shinohara, Takashi Kamimoto, Kazuya Sato, Hiroshi Shigeno:
Cache Control Method Mitigating Packet Concentration of Router Caused by Interest Flooding Attack. 324-331 - Hannan Xiao, Awatif Ali Alshehri, Bruce Christianson:
A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels. 332-339 - Gustavo Gonzalez Granadillo, Jose Rubio-Hernan, Joaquín García-Alfaro, Hervé Debar:
Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms. 340-348 - Haibin Chen, Lei Zhang, Junyuan Xie, Chongjun Wang:
New Efficient Certificateless Blind Signature Scheme. 349-353 - Zonghao Guo, Ou Wei, Peng Yu, Lansheng Han, Weiming Wu:
Model Checking Probabilistic Network Propagation Protection Strategies. 354-361 - Zhenhai Cao, Bo Lang, Jinmiao Wang:
An Efficient and Fine-Grained Access Control Scheme for Multidimensional Data Aggregation in Smart Grid. 362-369 - Florian Gottwalt, Adrian Waller, Weiru Liu:
Natural Laws as a Baseline for Network Anomaly Detection. 370-377 - Zimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, Chuankun Wu:
Classifying Android Malware with Dynamic Behavior Dependency Graphs. 378-385 - Zimin Lin, Rui Wang, Xiaoqi Jia, Jingyu Yang, Daojuan Zhang, Chuankun Wu:
ForceDROID: Extracting Hidden Information in Android Apps by Forced Execution Technique. 386-393 - Jianming Fu, Yan Lin, Xu Zhang:
Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table. 394-401 - Xiaochao Li, Chunhui Cao, Pengtao Li, Shuli Shen, Yihui Chen, Lin Li:
Energy-Efficient Hardware Implementation of LUKS PBKDF2 with AES on FPGA. 402-409 - Yu Wang, Yuqing Zhang, Kai Wang, Jingbo Yan:
Security Analysis and Vulnerability Detection of Gesture-Based Lock in Android Applications. 410-417 - Xiaochao Wei, Han Jiang, Chuan Zhao, Minghao Zhao, Qiuliang Xu:
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries. 418-425 - Thomas Lenz, Bernd Zwattendorfer:
Towards Cross-Border Authorization in European eID Federations. 426-434 - Xinyu Yang, Xiaofei He, Jie Lin, Wei Yu, Qingyu Yang:
A Game-Theoretic Model on Coalitional Attacks in Smart Grid. 435-442 - Danushka Jayasinghe, Konstantinos Markantonakis, Iakovos Gurulian, Raja Naeem Akram, Keith Mayes:
Extending EMV Tokenised Payments to Offline-Environments. 443-450 - Lei Zhou, Xiaowei Liu, Qin Liu, Guojun Wang:
A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation. 451-457 - Liu Yang, Xingmin Cui, Changyuan Wang, Shanqing Guo, Xin-Shun Xu:
Risk Analysis of Exposed Methods to JavaScript in Hybrid Apps. 458-464 - Heng Zhang, Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri:
SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats. 465-472 - Jacob Abegunde, Hannan Xiao, Joseph Spring:
A Dynamic Game with Adaptive Strategies for IEEE 802.15.4 and IoT. 473-480 - Danye Wu, Zhiwei Xu, Bo Chen, Yujun Zhang:
What If Routers Are Malicious? Mitigating Content Poisoning Attack in NDN. 481-488 - Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Tianzhang Xing, Guixin Ye, Jie Zhang, Zheng Wang:
Exploiting Dynamic Scheduling for VM-Based Code Obfuscation. 489-496 - Hong Zhu, Bin Wu, Meiyi Xie, Zongmin Cui, Zongda Wu:
Secure Shortest Path Search over Encrypted Graph Supporting Synonym Query in Cloud Computing. 497-504 - Fangwen Yu, Ming Su, Gang Wang, Mingming Ren:
Error Decomposition Algorithm for Approximating the k-Error Linear Complexity of Periodic Sequences. 505-510 - Fang Lyu, Yapin Lin, Junfeng Yang, Junhai Zhou:
SUIDroid: An Efficient Hardening-Resilient Approach to Android App Clone Detection. 511-518 - Yang Lu, Richard O. Sinnott:
Semantic-Based Privacy Protection of Electronic Health Records for Collaborative Research. 519-526 - Shaun Stricot-Tarboton, Sivadon Chaisiri, Ryan K. L. Ko:
Taxonomy of Man-in-the-Middle Attacks on HTTPS. 527-534 - Sivadon Chaisiri, Ryan K. L. Ko:
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty. 535-543 - Thabet Kacem, Duminda Wijesekera, Paulo Cesar G. da Costa, Alexandre Barreto:
An ADS-B Intrusion Detection System. 544-551 - Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula:
An Accurate FDD-Based Approach for Discovering Distributed Firewalls Misconfigurations. 552-559 - Jianming Fu, Pengwei Li, Yan Lin, Shuang Ding:
Android App Malicious Behavior Detection Based on User Intention. 560-567 - Lyes Touati, Hamed Hellaoui, Yacine Challal:
Threshold Yoking/Grouping Proofs Based on CP-ABE for IoT Applications. 568-575 - Weiwei Ding, Jin Wang, Xiumin Wang, Ruimin Zhao, Yanqin Zhu:
Optimal Flow Allocation and Linear Network Coding Design for Multiple Multicasts under the Requirements of Information Theoretical Security. 576-583 - Zhongyuan Hao, Wei Guo, Jizeng Wei, Dazhi Sun:
Dual Processing Engine Architecture to Speed Up Optimal Ate Pairing on FPGA Platform. 584-589 - Muhammad Usman, Mian Ahmad Jan, Xiangjian He, Priyadarsi Nanda:
Data Sharing in Secure Multimedia Wireless Sensor Networks. 590-597 - Montida Pattaranantakul, Ruan He, Ahmed Meddahi, Zonghua Zhang:
SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration. 598-605 - Raja Naeem Akram, Pierre-François Bonnefoi, Serge Chaumette, Konstantinos Markantonakis, Damien Sauveron:
Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements. 606-614 - Tao Yin, Yongzheng Zhang, Jia Li:
AppBot: A Novel P2P Botnet Architecture Resistant to Graph-Based Tracking. 615-622 - Yuchuan Luo, Shaojing Fu, Kai Huang, Dongsheng Wang, Ming Xu:
Securely Outsourcing of Bilinear Pairings with Untrusted Servers for Cloud Storage. 623-629 - Yang Luo, Wu Luo, Xiaoning Sun, Qingni Shen, Anbang Ruan, Zhonghai Wu:
Whispers between the Containers: High-Capacity Covert Channel Attacks in Docker. 630-637 - Daniel Tse, Lu Wang, Yuxi Li:
Mobility Management for Enterprises in BYOD Deployment. 638-645 - Tianyi Xie, Yuanyuan Zhang, Juanru Li, Hui Liu, Dawu Gu:
New Exploit Methods against Ptmalloc of GLIBC. 646-653 - Nian Xue, Xin Huang, Jie Zhang:
S2Net: A Security Framework for Software Defined Intelligent Building Networks. 654-661 - Qian Sun, Qingni Shen, Cong Li, Zhonghai Wu:
SeLance: Secure Load Balancing of Virtual Machines in Cloud. 662-669 - Xiaoyan Yang, Han Jiang, Qiuliang Xu, Mengbo Hou, Xiaochao Wei, Minghao Zhao, Kim-Kwang Raymond Choo:
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol. 670-677 - Jian Li, Wenhuan Lu, Chen Zhang, Jianguo Wei, Xiaochun Cao, Jianwu Dang:
A Study on Detection and Recovery of Speech Signal Tampering. 678-682 - Zilong Wen, Weiqi Dai, Deqing Zou, Hai Jin:
PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures. 683-690 - Dan Su, Wei Wang, Xing Wang, Jiqiang Liu:
Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown Malapps. 691-698 - Jiexin Zhang, Xiaoxue Liu, Peidong Zhu:
Securing Power System State Estimation. 699-706 - Sardar Hussain, Richard O. Sinnott, Ron Poet:
A Security-Oriented Workflow Framework for Collaborative Environments. 707-714 - Bo Zhou, Qi Shi, Po Yang:
A Survey on Quantitative Evaluation of Web Service Security. 715-721
TrustCom Privacy Track
- Xuying Meng, Zhiwei Xu, Bo Chen, Yujun Zhang:
Privacy-Preserving Query Log Sharing Based on Prior N-Word Aggregation. 722-729 - Shaobo Zhang, Qin Liu, Guojun Wang:
Enhancing Location Privacy through User-Defined Grid in Location-Based Services. 730-736 - Xin Pei, Yongjian Wang, Wei Yao, Jiuchuan Lin, Ruxiang Peng:
Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud. 737-743 - Dali Zhu, Na Pang, Gang Li, Wenjing Rong, Zheming Fan:
WiN: Non-invasive Abnormal Activity Detection Leveraging Fine-Grained WiFi Signals. 744-751 - Shu Chen, Hong Shen:
Semantic-Aware Dummy Selection for Location Privacy Preservation. 752-759 - Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu:
Multiple Mix-Zones Deployment for Continuous Location Privacy Protection. 760-766 - Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi:
Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach. 767-774 - Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Shlomi Dolev:
Local Self-Organization with Strong Privacy Protection. 775-782 - Erald Troja, Spiridon Bakiras:
Privacy-Preserving Location-Aware Mobile Advertisement. 783-790 - Zakaria Gheid, Yacine Challal:
Efficient and Privacy-Preserving k-Means Clustering for Big Data Mining. 791-798 - Zaid Ameen Abduljabbar, Hai Jin, Ayad Ibrahim, Zaid Alaa Hussien, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Privacy-Preserving Image Retrieval in IoT-Cloud. 799-806 - Xiaolei Wang, Yuexiang Yang, Chuan Tang, Yingzhi Zeng, Jie He:
DroidContext: Identifying Malicious Mobile Privacy Leak Using Context. 807-814 - Yiping Teng, Xiang Cheng, Sen Su, Rong Bi:
Privacy-Preserving Top-k Nearest Keyword Search on Outsourced Graphs. 815-822 - Peng Liu, Yidong Li, Yingpeng Sang, Ji Zhang:
Anonymity-Based Privacy Preserving Network Data Publication. 823-828 - Shibin Sun, Yuliang Shi, Shidong Zhang, Lizhen Cui:
A Privacy Protection Mechanism for NoSql Database Based on Data Chunks. 829-836 - Yu Chen, Yuliang Shi, Li-zhen Cui:
Model for Hiding Data Relationships Based on Chunk-Confusion in Cloud Computing. 837-844 - Xiaoyu Zhu, Qin Liu, Guojun Wang:
A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing. 845-851 - Kunding Fang, Xiaohong Li, Jianye Hao, Zhiyong Feng:
Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on UML 2.3. 852-859 - Sanjeet Kumar Nayak, Somanath Tripathy:
Privacy Preserving Provable Data Possession for Cloud Based Electronic Health Record System. 860-867 - Gaurav Misra, Jose M. Such, Hamed Balogun:
IMPROVE - Identifying Minimal PROfile VEctors for Similarity Based Access Control. 868-875 - Juru Zeng, Yuncheng Wu, Yao Wu, Hong Chen, Cuiping Li, Shan Wang:
Energy-Efficient and Privacy-Preserving Range Query in Participatory Sensing. 876-883 - Longkun Guo, Hong Shen:
Privacy-Preserving Internet Traffic Publication. 884-891