Search dblp for Publications

export results for "toc:db/conf/trustcom/trustcom2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/trustcom/Abawajy11,
  author       = {Jemal H. Abawajy},
  title        = {Establishing Trust in Hybrid Cloud Computing Environments},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {118--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.18},
  doi          = {10.1109/TRUSTCOM.2011.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Abawajy11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbbadiAM11,
  author       = {Imad M. Abbadi and
                  Muntaha Alawneh and
                  Andrew P. Martin},
  title        = {Secure Virtual Layer Management in Clouds},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {99--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.16},
  doi          = {10.1109/TRUSTCOM.2011.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbbadiAM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbdullahiWM11,
  author       = {Muhammad Bashir Abdullahi and
                  Guojun Wang and
                  Felix Musau},
  title        = {A Reliable and Secure Distributed In-network Data Storage Scheme in
                  Wireless Sensor Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {548--555},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.71},
  doi          = {10.1109/TRUSTCOM.2011.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbdullahiWM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AhmedX11,
  author       = {Mahbub Ahmed and
                  Yang Xiang},
  title        = {Trust Ticket Deployment: {A} Notion of a Data Owner's Trust in Cloud
                  Computing},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {111--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.17},
  doi          = {10.1109/TRUSTCOM.2011.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AhmedX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AkramMM11,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {Cross-Platform Application Sharing Mechanism},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {597--605},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.77},
  doi          = {10.1109/TRUSTCOM.2011.77},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AkramMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Al-KhazzarS11,
  author       = {Ahmed Al{-}Khazzar and
                  Nick Savage},
  title        = {Biometric Identification Using User Interactions with Virtual Worlds},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {517--524},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.67},
  doi          = {10.1109/TRUSTCOM.2011.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Al-KhazzarS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlawnehA11,
  author       = {Muntaha Alawneh and
                  Imad M. Abbadi},
  title        = {Defining and Analyzing Insiders and Their Threats in Organizations},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {785--794},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.103},
  doi          = {10.1109/TRUSTCOM.2011.103},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlawnehA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlnemrSM11,
  author       = {Rehab Alnemr and
                  Maxim Schnjakin and
                  Christoph Meinel},
  title        = {Towards Context-Aware Service-Oriented Semantic Reputation Framework},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {362--372},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.47},
  doi          = {10.1109/TRUSTCOM.2011.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlnemrSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AroraPRJ11,
  author       = {Ankita Arora and
                  Sri Parameswaran and
                  Roshan G. Ragel and
                  Darshana Jayasinghe},
  title        = {A Hardware/Software Countermeasure and a Testing Framework for Cache
                  Based Side Channel Attacks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1005--1014},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.138},
  doi          = {10.1109/TRUSTCOM.2011.138},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AroraPRJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AsadpourD11,
  author       = {Mahdi Asadpour and
                  Mohammad Torabi Dashti},
  title        = {A Privacy-Friendly {RFID} Protocol Using Reusable Anonymous Tickets},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {206--213},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.29},
  doi          = {10.1109/TRUSTCOM.2011.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AsadpourD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AsamiHK11,
  author       = {Kenichi Asami and
                  Hayato Hagiwara and
                  Mochimitsu Komori},
  title        = {Visual Navigation System with Real-Time Image Processing for Patrol
                  Service Robot},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1229--1234},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.166},
  doi          = {10.1109/TRUSTCOM.2011.166},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AsamiHK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AysanDPJ11,
  author       = {H{\"{u}}seyin Aysan and
                  Radu Dobrin and
                  Sasikumar Punnekkat and
                  Rolf Johansson},
  title        = {Probabilistic Schedulability Guarantees for Dependable Real-Time Systems
                  under Error Bursts},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1154--1163},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.157},
  doi          = {10.1109/TRUSTCOM.2011.157},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AysanDPJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AzketaUMAG11,
  author       = {Ekain Azketa and
                  Juan P. Uribe and
                  Marga Marcos and
                  Lu{\'{\i}}s Almeida and
                  J. Javier Guti{\'{e}}rrez},
  title        = {Permutational Genetic Algorithm for the Optimized Assignment of Priorities
                  to Tasks and Messages in Distributed Real-Time Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {958--965},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.132},
  doi          = {10.1109/TRUSTCOM.2011.132},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AzketaUMAG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BaderRH11,
  author       = {Firas Bader and
                  Andra Radoveneanu and
                  Hani Ragab Hassen},
  title        = {A New Security Architecture for BitTorrent},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {451--455},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.58},
  doi          = {10.1109/TRUSTCOM.2011.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BaderRH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BaiSLTZM11,
  author       = {Quan Bai and
                  Xing Su and
                  Qing Liu and
                  Andrew Terhorst and
                  Minjie Zhang and
                  Yi Mu},
  title        = {Case-Based Trust Evaluation from Provenance Information},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {336--343},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.44},
  doi          = {10.1109/TRUSTCOM.2011.44},
  timestamp    = {Thu, 23 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BaiSLTZM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BalinskyCS11,
  author       = {Helen Balinsky and
                  Liqun Chen and
                  Steven J. Simske},
  title        = {Publicly Posted Composite Documents in Variably Ordered Workflows},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {631--638},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.81},
  doi          = {10.1109/TRUSTCOM.2011.81},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BalinskyCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BalinskyMS11,
  author       = {Helen Balinsky and
                  Neil C. A. Moore and
                  Steven J. Simske},
  title        = {Intelligent Assistant for Context-Aware Policies},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {621--630},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.80},
  doi          = {10.1109/TRUSTCOM.2011.80},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BalinskyMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BankovicMVFM11,
  author       = {Zorana Bankovic and
                  Jos{\'{e}} Manuel Moya and
                  Juan Carlos Vallejo and
                  David Fraga and
                  Pedro Malag{\'{o}}n},
  title        = {Holistic Solution for Confining Insider Attacks in Wireless Sensor
                  Networks Using Reputation Systems Coupled with Clustering Techniques},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {61--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.12},
  doi          = {10.1109/TRUSTCOM.2011.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BankovicMVFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BaraniA11,
  author       = {Fatemeh Barani and
                  Mahdi Abadi},
  title        = {An {ABC-AIS} Hybrid Approach to Dynamic Anomaly Detection in AODV-Based
                  MANETs},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {714--720},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.92},
  doi          = {10.1109/TRUSTCOM.2011.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BaraniA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BarguiBF11,
  author       = {Fahmi Bargui and
                  Han{\^{e}}ne Ben{-}Abdallah and
                  Jamel Feki},
  title        = {A Decision Making Ontology Building Process for Analytical Requirements
                  Elicitation},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1529--1536},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.212},
  doi          = {10.1109/TRUSTCOM.2011.212},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BarguiBF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Barisch11,
  author       = {Marc Barisch},
  title        = {Design and Evaluation of an Architecture for Ubiquitous User Authentication
                  Based on Identity Management Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {863--872},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.116},
  doi          = {10.1109/TRUSTCOM.2011.116},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Barisch11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BeitollahiD11,
  author       = {Hakem Beitollahi and
                  Geert Deconinck},
  title        = {A Cooperative Mechanism to Defense against Distributed Denial of Service
                  Attacks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.6},
  doi          = {10.1109/TRUSTCOM.2011.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BeitollahiD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BellaC11,
  author       = {Giampaolo Bella and
                  Lizzie Coles{-}Kemp},
  title        = {Internet Users' Security and Privacy While They Interact with Amazon},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {878--883},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.118},
  doi          = {10.1109/TRUSTCOM.2011.118},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BellaC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BelwalC11,
  author       = {Chaitanya Belwal and
                  Albert M. K. Cheng},
  title        = {Feasibility Interval for the Transactional Event Handlers of {P-FRP}},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {966--973},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.133},
  doi          = {10.1109/TRUSTCOM.2011.133},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BelwalC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BelwalC11a,
  author       = {Chaitanya Belwal and
                  Albert M. K. Cheng},
  title        = {A Sufficient Schedulability Test for Real-Time Software Transactional
                  Memory},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1060--1067},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.145},
  doi          = {10.1109/TRUSTCOM.2011.145},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BelwalC11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BelwalC11b,
  author       = {Chaitanya Belwal and
                  Albert M. K. Cheng},
  title        = {Schedulability Analysis of Transactions in Software Transactional
                  Memory Using Timed Automata},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1091--1098},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.149},
  doi          = {10.1109/TRUSTCOM.2011.149},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BelwalC11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BelwalCT11,
  author       = {Chaitanya Belwal and
                  Albert M. K. Cheng and
                  Walid Taha},
  title        = {Release Offset Bounds for Response Time Analysis of {P-FRP} Using
                  Exhaustive Enumeration},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {950--957},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.131},
  doi          = {10.1109/TRUSTCOM.2011.131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BelwalCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Bhumiratana11,
  author       = {Bhume Bhumiratana},
  title        = {A Model for Automating Persistent Identity Clone in Online Social
                  Network},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {681--686},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.87},
  doi          = {10.1109/TRUSTCOM.2011.87},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Bhumiratana11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BilalC11,
  author       = {Muhammad Bilal and
                  Pauline M. L. Chan},
  title        = {A Game Theoretic Coalitional Bidding Scheme for Efficient Routing
                  in Vehicular Ad Hoc Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1638--1645},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.227},
  doi          = {10.1109/TRUSTCOM.2011.227},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BilalC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BontozoglouYG11,
  author       = {Andreas Bontozoglou and
                  Kun Yang and
                  Ken Guild},
  title        = {Simulation Tools Enabling Research in Convergence of Fixed and Mobile
                  Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1789--1794},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.254},
  doi          = {10.1109/TRUSTCOM.2011.254},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BontozoglouYG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BoukhanoufaRT11,
  author       = {Mohamed{-}Lamine Boukhanoufa and
                  Ansgar Radermacher and
                  Fran{\c{c}}ois Terrier},
  title        = {Offline Validation of Real-Time Application Constraints Considering
                  Adaptation Rules},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {974--980},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.134},
  doi          = {10.1109/TRUSTCOM.2011.134},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BoukhanoufaRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CallegariGPP11,
  author       = {Christian Callegari and
                  Stefano Giordano and
                  Michele Pagano and
                  Teresa Pepe},
  title        = {Forecasting the Distribution of Network Traffic for Anomaly Detection},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {173--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.25},
  doi          = {10.1109/TRUSTCOM.2011.25},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CallegariGPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CanepaLH11,
  author       = {Gonzalo Huerta C{\'{a}}nepa and
                  Dongman Lee and
                  Seon{-}Yeong Han},
  title        = {Trust {ME:} {A} Trust Decision Framework for Mobile Environments},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {464--471},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.60},
  doi          = {10.1109/TRUSTCOM.2011.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CanepaLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoCCW11,
  author       = {Weihua Cao and
                  Gang Chen and
                  Xin Chen and
                  Min Wu},
  title        = {Optimal Tracking Agent: {A} New Framework for Multi-agent Reinforcement
                  Learning},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1328--1334},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.182},
  doi          = {10.1109/TRUSTCOM.2011.182},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoCCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoMYHWL11,
  author       = {Jiang Cao and
                  XinJun Mao and
                  Huining Yan and
                  Yushi Huang and
                  Huaimin Wang and
                  Xicheng Lu},
  title        = {Capability as Requirement Metaphor},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1543--1549},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.214},
  doi          = {10.1109/TRUSTCOM.2011.214},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoMYHWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoO11,
  author       = {Xiaolin Cao and
                  M{\'{a}}ire O'Neill},
  title        = {A Private and Scalable Authentication for {RFID} Systems Using Reasonable
                  Storage},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {373--380},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.48},
  doi          = {10.1109/TRUSTCOM.2011.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CesareX11,
  author       = {Silvio Cesare and
                  Yang Xiang},
  title        = {Malware Variant Detection Using Similarity Search over Sets of Control
                  Flow Graphs},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {181--189},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.26},
  doi          = {10.1109/TRUSTCOM.2011.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CesareX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChandrasekaranE11,
  author       = {Partheeban Chandrasekaran and
                  Babak Esfandiari},
  title        = {A Model for a Testbed for Evaluating Reputation Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {296--303},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.40},
  doi          = {10.1109/TRUSTCOM.2011.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChandrasekaranE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChangL11,
  author       = {Ming{-}Feng Chang and
                  Wen{-}Yew Liang},
  title        = {Learning-Directed Dynamic Voltage and Frequency Scaling for Computation
                  Time Prediction},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1023--1029},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.140},
  doi          = {10.1109/TRUSTCOM.2011.140},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChangL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenC11,
  author       = {Xiaowen Chen and
                  Shuming Chen},
  title        = {{DSBS:} Distributed and Scalable Barrier Synchronization in Many-Core
                  Network-on-Chips},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1030--1037},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.141},
  doi          = {10.1109/TRUSTCOM.2011.141},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenH11,
  author       = {Lingfeng Chen and
                  Doan B. Hoang},
  title        = {Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection
                  Models for Healthcare Cloud},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {126--133},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.19},
  doi          = {10.1109/TRUSTCOM.2011.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLW11,
  author       = {Geng Chen and
                  Lei Luo and
                  Lijie Wang},
  title        = {A Precise Memory Model for Operating System Code Verification},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1125--1132},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.153},
  doi          = {10.1109/TRUSTCOM.2011.153},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenMM11,
  author       = {Wenfei Chen and
                  Zuohua Miao and
                  Delie Ming},
  title        = {Automated Inspection Using X-Ray Imaging},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1769--1772},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.247},
  doi          = {10.1109/TRUSTCOM.2011.247},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenSL11,
  author       = {Weike Chen and
                  Heng Shou and
                  Wenfeng Li},
  title        = {A Method for Searching the Centroid of a 3D Cluster Based on {RSSI}},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1652--1656},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.229},
  doi          = {10.1109/TRUSTCOM.2011.229},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenYN11,
  author       = {Yu Chen and
                  Zheng Yan and
                  Valtteri Niemi},
  title        = {Implementation of a Reputation System for Pervasive Social Networking},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {857--862},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.115},
  doi          = {10.1109/TRUSTCOM.2011.115},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenYN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenYZD11,
  author       = {Chaoxiang Chen and
                  Shiping Ye and
                  Binbin Zhou and
                  Guoyong Dai},
  title        = {Study and Practice on Teaching Team Construction of Computer Specialties
                  in Private Undergraduate Universities and Colleges},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1313--1318},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.179},
  doi          = {10.1109/TRUSTCOM.2011.179},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenYZD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenZJ11,
  author       = {Zhen Chen and
                  Chunhong Zhang and
                  Yang Ji},
  title        = {Context Awareness for Self-Adaptiveness in Smart Terminals},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1783--1788},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.249},
  doi          = {10.1109/TRUSTCOM.2011.249},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenZJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenZX11,
  author       = {Hailin Chen and
                  Zuping Zhang and
                  Jing Xia},
  title        = {A Refined and Heuristic Algorithm for {LD} tagSNPs Selection},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1691--1694},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.234},
  doi          = {10.1109/TRUSTCOM.2011.234},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenZX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengW11,
  author       = {Li Cheng and
                  Cong Wang},
  title        = {Study of Experiment Structure in the Computer Networks Course Using
                  {PBL} Methodology},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1294--1297},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.175},
  doi          = {10.1109/TRUSTCOM.2011.175},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengWWMRM11,
  author       = {Yong Cheng and
                  Zhiying Wang and
                  Jiangjiang Wu and
                  Songzhu Mei and
                  Jiangchun Ren and
                  Jun Ma},
  title        = {SWHash: An Efficient Data Integrity Verification Scheme Appropriate
                  for {USB} Flash Disk},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {381--388},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.49},
  doi          = {10.1109/TRUSTCOM.2011.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengWWMRM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengYWWJ11,
  author       = {Shaoyin Cheng and
                  Jun Yang and
                  Jiajie Wang and
                  Jinding Wang and
                  Fan Jiang},
  title        = {LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability
                  in Binary Code},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {150--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.22},
  doi          = {10.1109/TRUSTCOM.2011.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengYWWJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChibaIYY11,
  author       = {Takahiro Chiba and
                  Yuichi Itami and
                  Myungryun Yoo and
                  Takanori Yokoyama},
  title        = {A Distributed Real-Time Operating System with Location-Transparent
                  System Calls for Task Management and Inter-task Synchronization},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1133--1138},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.154},
  doi          = {10.1109/TRUSTCOM.2011.154},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChibaIYY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CovinoP11,
  author       = {Emanuele Covino and
                  Giovanni Pani},
  title        = {A Formal Approach for Modeling Interactive Visual Interfaces},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1675--1683},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.232},
  doi          = {10.1109/TRUSTCOM.2011.232},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CovinoP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DasariANPEL11,
  author       = {Dakshina Dasari and
                  Bj{\"{o}}rn Andersson and
                  Vincent N{\'{e}}lis and
                  Stefan M. Petters and
                  Arvind Easwaran and
                  Jinkyu Lee},
  title        = {Response Time Analysis of COTS-Based Multicores Considering the Contention
                  on the Shared Memory Bus},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1068--1075},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.146},
  doi          = {10.1109/TRUSTCOM.2011.146},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DasariANPEL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DimitriouS11,
  author       = {Tassos Dimitriou and
                  Ahmad Sabouri},
  title        = {Pollination: {A} Data Authentication Scheme for Unattended Wireless
                  Sensor Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {409--416},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.53},
  doi          = {10.1109/TRUSTCOM.2011.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DimitriouS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanGH11,
  author       = {Xinxin Fan and
                  Guang Gong and
                  Honggang Hu},
  title        = {Remedying the Hummingbird Cryptographic Algorithm},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {772--778},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.101},
  doi          = {10.1109/TRUSTCOM.2011.101},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanGH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanLSYL11,
  author       = {Jianbo Fan and
                  Liangxu Liu and
                  Rina Su and
                  Hua Yu and
                  Qingfeng Li},
  title        = {Reform and Practice of Training Engineering Professionals in 2C+E
                  Computer Science},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1308--1312},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.178},
  doi          = {10.1109/TRUSTCOM.2011.178},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanLSYL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanXLLL11,
  author       = {Xiaoping Fan and
                  Yueshan Xie and
                  Zhifang Liao and
                  Xiaoqing Li and
                  Li{-}min Liu},
  title        = {A Weighted Cluster Ensemble Algorithm Based on Graph},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1519--1523},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.210},
  doi          = {10.1109/TRUSTCOM.2011.210},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanXLLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanYCL11,
  author       = {Guisheng Fan and
                  Huiqun Yu and
                  Liqiong Chen and
                  Dongmei Liu},
  title        = {A Certificate Driven Access Control Strategy for Service Composition
                  and Its Analysis},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1584--1591},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.220},
  doi          = {10.1109/TRUSTCOM.2011.220},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanYCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FangCW11,
  author       = {Ming Fang and
                  Songqiao Chen and
                  Kefei Wang},
  title        = {Achieving High Throughput in High-Radix Switch},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1452--1456},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.199},
  doi          = {10.1109/TRUSTCOM.2011.199},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FangCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FangZSM11,
  author       = {Hui Fang and
                  Jie Zhang and
                  Murat Sensoy and
                  Nadia Magnenat{-}Thalmann},
  title        = {A Reputation Mechanism for Virtual Reality - Five-Sense Oriented Feedback
                  Provision and Subjectivity Alignment},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {312--319},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.42},
  doi          = {10.1109/TRUSTCOM.2011.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FangZSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FariaALL11,
  author       = {Alexandre Wagner Chagas Faria and
                  Leandro Pfleger de Aguiar and
                  Daniel S. D. Lara and
                  Antonio Alfredo Ferreira Loureiro},
  title        = {Comparative Analysis of Power Consumption in the Implementation of
                  Arithmetic Algorithms},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1247--1254},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.256},
  doi          = {10.1109/TRUSTCOM.2011.256},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FariaALL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FengHPC11,
  author       = {Zaiwen Feng and
                  Keqing He and
                  Rong Peng and
                  Buqing Cao},
  title        = {Towards a Behavior-Based Restructure Approach for Service Composition},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1564--1571},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.217},
  doi          = {10.1109/TRUSTCOM.2011.217},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FengHPC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FengQYF11,
  author       = {Wei Feng and
                  Yu Qin and
                  Aimin Yu and
                  Dengguo Feng},
  title        = {A DRTM-Based Method for Trusted Network Connection},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {425--435},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.55},
  doi          = {10.1109/TRUSTCOM.2011.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FengQYF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FerdousMS11,
  author       = {Raihana Ferdous and
                  Vallipuram Muthukkumarasamy and
                  Elankayer Sithirasenan},
  title        = {Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {589--596},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.76},
  doi          = {10.1109/TRUSTCOM.2011.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FerdousMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FernandoA11,
  author       = {Harinda Fernando and
                  Jemal H. Abawajy},
  title        = {Mutual Authentication Protocol for Networked {RFID} Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {417--424},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.54},
  doi          = {10.1109/TRUSTCOM.2011.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FernandoA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FhomB11,
  author       = {Hervais Simo Fhom and
                  Kpatcha M. Bayarou},
  title        = {Towards a Holistic Privacy Engineering Approach for Smart Grid Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {234--241},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.32},
  doi          = {10.1109/TRUSTCOM.2011.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FhomB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FuLC11,
  author       = {Jianming Fu and
                  Xinwen Liu and
                  Binling Cheng},
  title        = {Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {328--335},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.43},
  doi          = {10.1109/TRUSTCOM.2011.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FuLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FukushimaHS11,
  author       = {Yoshiro Fukushima and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  title        = {Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation
                  Based on Domain and {IP} Address Registration},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {352--361},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.46},
  doi          = {10.1109/TRUSTCOM.2011.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FukushimaHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FungL11,
  author       = {Ben S. Y. Fung and
                  Patrick P. C. Lee},
  title        = {A Privacy-Preserving Defense Mechanism against Request Forgery Attacks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {45--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.10},
  doi          = {10.1109/TRUSTCOM.2011.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FungL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoLM11,
  author       = {Yan Gao and
                  Jin Liu and
                  PeiXun Ma},
  title        = {The Hot Keyphrase Extraction Based on TF*PDF},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1524--1528},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.211},
  doi          = {10.1109/TRUSTCOM.2011.211},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoWZ11,
  author       = {Li Gao and
                  Xiaomin Wang and
                  Wenfang Zhang},
  title        = {Chaotic Hash Function Based on Tandem-DM Construction},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1745--1749},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.244},
  doi          = {10.1109/TRUSTCOM.2011.244},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GongMLZ11,
  author       = {Xiaoli Gong and
                  Jie Ma and
                  Qingcheng Li and
                  Jin Zhang},
  title        = {Automatic Model Building and Verification of Embedded Software with
                  {UPPAAL}},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1118--1124},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.152},
  doi          = {10.1109/TRUSTCOM.2011.152},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GongMLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GonzalezAJ11,
  author       = {Jesus M. Gonzalez and
                  Mohd Anwar and
                  James B. D. Joshi},
  title        = {Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless
                  Networks: {A} Survey},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {556--563},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.72},
  doi          = {10.1109/TRUSTCOM.2011.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GonzalezAJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GoyalGKJ11,
  author       = {Poonam Goyal and
                  Navneet Goyal and
                  Rohan Sunil Karwa and
                  Matthew John},
  title        = {Phase-Wise Clustering of Time Series Gene Expression Data},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1668--1674},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.231},
  doi          = {10.1109/TRUSTCOM.2011.231},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GoyalGKJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GranlundA11,
  author       = {Daniel Granlund and
                  Christer {\AA}hlund},
  title        = {A Scalability Study of {AAA} Support in Heterogeneous Networking Environments
                  with Global Roaming Support},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {488--493},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.63},
  doi          = {10.1109/TRUSTCOM.2011.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GranlundA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuYPK11,
  author       = {Xing Gu and
                  Qun Yang and
                  Dechang Pi and
                  He{-}yang Ke},
  title        = {A Global Scheduling Algorithm Based on Dynamic Critical Path},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1335--1338},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.183},
  doi          = {10.1109/TRUSTCOM.2011.183},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuYPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoCT11,
  author       = {Fan Guo and
                  Zixing Cai and
                  Jin Tang},
  title        = {Chinese Traffic Police Gesture Recognition in Complex Scene},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1505--1511},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.208},
  doi          = {10.1109/TRUSTCOM.2011.208},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoMH11,
  author       = {Yi Guo and
                  XinJun Mao and
                  Cuiyun Hu},
  title        = {Design Pattern for Self-Organization Multi-agent Systems Based on
                  Policy},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1572--1577},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.218},
  doi          = {10.1109/TRUSTCOM.2011.218},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoMH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoMZ11,
  author       = {Ji Guo and
                  Alan Marshall and
                  Bosheng Zhou},
  title        = {A New Trust Management Framework for Detecting Malicious and Selfish
                  Behaviour for Mobile Ad Hoc Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {142--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.21},
  doi          = {10.1109/TRUSTCOM.2011.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoZHS11,
  author       = {Yibo Guo and
                  Qingfeng Zhuge and
                  Jingtong Hu and
                  Edwin Hsing{-}Mean Sha},
  title        = {Optimal Data Placement for Memory Architectures with Scratch-Pad Memories},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1045--1050},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.143},
  doi          = {10.1109/TRUSTCOM.2011.143},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoZHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HabibRM11,
  author       = {Sheikh Mahbub Habib and
                  Sebastian Ries and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Towards a Trust Management System for Cloud Computing},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {933--939},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.129},
  doi          = {10.1109/TRUSTCOM.2011.129},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HabibRM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HagnerAG11,
  author       = {Matthias Hagner and
                  Adina Aniculaesei and
                  Ursula Goltz},
  title        = {UML-Based Analysis of Power Consumption for Real-Time Embedded Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1196--1201},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.161},
  doi          = {10.1109/TRUSTCOM.2011.161},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HagnerAG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HamidA11,
  author       = {Isredza Rahmi A. Hamid and
                  Jemal H. Abawajy},
  title        = {Phishing Email Feature Selection Approach},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {916--921},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.126},
  doi          = {10.1109/TRUSTCOM.2011.126},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HamidA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanDGZW11,
  author       = {Wenfeng Han and
                  Jianwei Dong and
                  Yuting Guo and
                  Ming Zhang and
                  Jianzhong Wang},
  title        = {Identification of Masses in Digital Mammogram Using an Optimal Set
                  of Features},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1763--1768},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.246},
  doi          = {10.1109/TRUSTCOM.2011.246},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanDGZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanJC11,
  author       = {Bingning Han and
                  Lihong Jiang and
                  Hongming Cai},
  title        = {Abnormal Process Instances Identification Method in Healthcare Environment},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1387--1392},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.189},
  doi          = {10.1109/TRUSTCOM.2011.189},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanJC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Hansen11,
  author       = {Hallstein Asheim Hansen},
  title        = {Safety Verification of Non-linear, Planar Proportional Control with
                  Differential Inclusions},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1146--1153},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.156},
  doi          = {10.1109/TRUSTCOM.2011.156},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Hansen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HaoC11,
  author       = {Jianan Hao and
                  Wentong Cai},
  title        = {Trusted Block as a Service: Towards Sensitive Applications on the
                  Cloud},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {73--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.13},
  doi          = {10.1109/TRUSTCOM.2011.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HaoC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HassanMK11,
  author       = {Muhammad Hassan and
                  Ahsen Mehmood and
                  Muhammad Faisal Khan},
  title        = {An Efficient Method of Tracking across Multiple Cameras},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1477--1481},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.203},
  doi          = {10.1109/TRUSTCOM.2011.203},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HassanMK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeinrichEKKN11,
  author       = {Patrick Heinrich and
                  Dirk Eilers and
                  Rudi Knorr and
                  Markus K{\"{o}}niger and
                  Bernd Niehoff},
  title        = {Autonomous Parameter and Schedule Configuration for TDMA-Based Communication
                  Protocols Such as FlexRay},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1241--1246},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.168},
  doi          = {10.1109/TRUSTCOM.2011.168},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeinrichEKKN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeydenrychE11,
  author       = {Mark Heydenrych and
                  Elizabeth Marie Ehlers},
  title        = {A Charged {PSO} Inspired Method for Generating Immune Detectors for
                  Network Intrusion Detection},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {134--141},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.20},
  doi          = {10.1109/TRUSTCOM.2011.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeydenrychE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HouHHL11,
  author       = {Cuiqin Hou and
                  Yibin Hou and
                  Zhangqin Huang and
                  Qian Liu},
  title        = {Overlapping One-Class SVMs for Utterance Verification in Speech Recognition},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1500--1504},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.207},
  doi          = {10.1109/TRUSTCOM.2011.207},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HouHHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HouXHL11,
  author       = {Fangyong Hou and
                  Nong Xiao and
                  Hongjun He and
                  Fang Liu},
  title        = {Inter-Chip Authentication through {I/O} Character},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {398--402},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.51},
  doi          = {10.1109/TRUSTCOM.2011.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HouXHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangCL11,
  author       = {Zhiwu Huang and
                  Yuan Cheng and
                  Weirong Liu},
  title        = {A Novel Energy-Efficient Routing Algorithm in Multi-sink Wireless
                  Sensor Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1646--1651},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.228},
  doi          = {10.1109/TRUSTCOM.2011.228},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangHLLHC11,
  author       = {Tian{-}Liang Huang and
                  Tian{-}An Hsieh and
                  Kuan{-}Chou Lai and
                  Kuan{-}Ching Li and
                  Ching{-}Hsien Hsu and
                  Hsi{-}Ya Chang},
  title        = {Fault Tolerance Policy on Dynamic Load Balancing in {P2P} Grids},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1413--1420},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.193},
  doi          = {10.1109/TRUSTCOM.2011.193},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangHLLHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangLX11,
  author       = {Yazhi Huang and
                  Qing'an Li and
                  Chun Jason Xue},
  title        = {Minimizing Schedule Length via Cooperative Register Allocation and
                  Loop Scheduling for Embedded Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1038--1044},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.142},
  doi          = {10.1109/TRUSTCOM.2011.142},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangSS11,
  author       = {Jianyong Huang and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Repeated Differential Properties of the {AES-128} and {AES-256} Key
                  Schedules},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {525--532},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.68},
  doi          = {10.1109/TRUSTCOM.2011.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangWL11,
  author       = {Fang Huang and
                  Cai{-}xia Wang and
                  Jun Long},
  title        = {Design and Implementation of Single Sign on System with Cluster {CAS}
                  for Public Service Platform of Science and Technology Evaluation},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {732--737},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.95},
  doi          = {10.1109/TRUSTCOM.2011.95},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangY11,
  author       = {Wenqi Huang and
                  Liang Yu},
  title        = {A Quasi Physical Method for the Equal Sphere Packing Problem},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1684--1690},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.233},
  doi          = {10.1109/TRUSTCOM.2011.233},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HungLLWG11,
  author       = {Che{-}Lun Hung and
                  Yaw{-}Ling Lin and
                  Kuan{-}Ching Li and
                  Hsiao{-}Hsi Wang and
                  Shih{-}Wei Guo},
  title        = {Efficient GPGPU-Based Parallel Packet Classification},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1367--1374},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.186},
  doi          = {10.1109/TRUSTCOM.2011.186},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HungLLWG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Isern-DeyaHFP11,
  author       = {Andreu Pere Isern{-}Dey{\`{a}} and
                  M. Francisca Hinarejos and
                  Josep Llu{\'{\i}}s Ferrer{-}Gomila and
                  Magdalena Payeras{-}Capell{\`{a}}},
  title        = {A Secure Multicoupon Solution for Multi-merchant Scenarios},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {655--663},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.84},
  doi          = {10.1109/TRUSTCOM.2011.84},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Isern-DeyaHFP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JangHN11,
  author       = {Julian Jang and
                  Hon Hwang and
                  Surya Nepal},
  title        = {Biometric Enabled Portable Trusted Computing Platform},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {436--442},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.56},
  doi          = {10.1109/TRUSTCOM.2011.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JangHN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangW11,
  author       = {Wenjun Jiang and
                  Guojun Wang},
  title        = {SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social
                  Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {320--327},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.251},
  doi          = {10.1109/TRUSTCOM.2011.251},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangYX11,
  author       = {Haiyang Jiang and
                  Jianhua Yang and
                  Gaogang Xie},
  title        = {Exploring and Enhancing the Performance of Parallel {IDS} on Multi-core
                  Processors},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {673--680},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.86},
  doi          = {10.1109/TRUSTCOM.2011.86},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangYX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiaoLLL11,
  author       = {Han Jiao and
                  Jixue Liu and
                  Jiuyong Li and
                  Chengfei Liu},
  title        = {A Framework for Reputation Bootstrapping Based on Reputation Utility
                  and Game Theories},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {344--351},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.45},
  doi          = {10.1109/TRUSTCOM.2011.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiaoLLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JinSS11,
  author       = {Dongxu Jin and
                  Fei Shi and
                  JooSeok Song},
  title        = {Energy-Efficiency Media Independent Handover Mechanism},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1727--1732},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.241},
  doi          = {10.1109/TRUSTCOM.2011.241},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JinSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JinT11,
  author       = {Dong Jin and
                  Tatsuo Tsuji},
  title        = {Parallel Data Cube Construction Based on an Extendible Multidimensional
                  Array},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1139--1145},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.155},
  doi          = {10.1109/TRUSTCOM.2011.155},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JinT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JungF11,
  author       = {Younchan Jung and
                  Enrique Festijo},
  title        = {Session Key Generation for a Group Call and Device for Security Control},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1756--1762},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.245},
  doi          = {10.1109/TRUSTCOM.2011.245},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JungF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KarlocaiBL11,
  author       = {Bal{\'{a}}zs Karl{\'{o}}cai and
                  Andras Boj{\'{a}}rszky and
                  J{\'{a}}nos Levendovszky},
  title        = {Energy Aware Routing Protocols for Wireless Sensor Networks Using
                  Discrete Transmission Energies},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1704--1707},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.237},
  doi          = {10.1109/TRUSTCOM.2011.237},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KarlocaiBL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KellyAZ11,
  author       = {Owen R. Kelly and
                  Hakan Aydin and
                  Baoxian Zhao},
  title        = {On Partitioned Scheduling of Fixed-Priority Mixed-Criticality Task
                  Sets},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1051--1059},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.144},
  doi          = {10.1109/TRUSTCOM.2011.144},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KellyAZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KhorshedAW11,
  author       = {Md. Tanzim Khorshed and
                  A. B. M. Shawkat Ali and
                  Saleh A. Wasimi},
  title        = {Monitoring Insiders Activities in Cloud Computing Using Rule Based
                  Learning},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {757--764},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.99},
  doi          = {10.1109/TRUSTCOM.2011.99},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KhorshedAW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Kiravuo11,
  author       = {Timo Kiravuo},
  title        = {Reputation Based Collaboration among Ethernet Switches},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {893--896},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.121},
  doi          = {10.1109/TRUSTCOM.2011.121},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Kiravuo11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KoJL11,
  author       = {Ryan K. L. Ko and
                  Peter Jagadpramana and
                  Bu{-}Sung Lee},
  title        = {Flogger: {A} File-Centric Logger for Monitoring File Access and Transfers
                  within Cloud Computing Environments},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {765--771},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.100},
  doi          = {10.1109/TRUSTCOM.2011.100},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KoJL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KondelaJ11,
  author       = {Emmanuel Kondela and
                  Huang Dong Jun},
  title        = {A Power Law Transformation Predicting Lightness Conditions Based on
                  Skin Color Space Detection},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1472--1476},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.202},
  doi          = {10.1109/TRUSTCOM.2011.202},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KondelaJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KrishnaV11,
  author       = {Aarthi Krishna and
                  Vijay Varadharajan},
  title        = {A Hybrid Trust Model for Authorisation Using Trusted Platforms},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {288--295},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.39},
  doi          = {10.1109/TRUSTCOM.2011.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KrishnaV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LafuenteTS11,
  author       = {Carlos Ballester Lafuente and
                  Xavier Titi and
                  Jean{-}Marc Seigneur},
  title        = {Flexible Communication: {A} Secure and Trust-Based Free Wi-Fi Password
                  Sharing Service},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {706--713},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.91},
  doi          = {10.1109/TRUSTCOM.2011.91},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LafuenteTS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Lee11,
  author       = {Moon Ho Lee},
  title        = {Jacket Matrix and Its Applications to Signal Processing},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {5--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.3},
  doi          = {10.1109/TRUSTCOM.2011.3},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Lee11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LeeCL11,
  author       = {Yann{-}Hang Lee and
                  Preetham Chandrian and
                  Bo Li},
  title        = {Efficient Java Native Interface for Android Based Mobile Devices},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1202--1209},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.162},
  doi          = {10.1109/TRUSTCOM.2011.162},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LeeCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LeeLW11,
  author       = {Hyun{-}Jung Lee and
                  Kwang{-}Woo Lee and
                  Dongho Won},
  title        = {Protection Profile of Personal Information Security System: Designing
                  a Secure Personal Information Security System},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {806--811},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.106},
  doi          = {10.1109/TRUSTCOM.2011.106},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LeeLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiCJZ11,
  author       = {Jianhua Li and
                  Songqiao Chen and
                  Lin Jian and
                  Hongyu Zhang},
  title        = {A Web Services Composition Model and Its Verification Algorithm Based
                  on Interface Automata},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1556--1563},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.216},
  doi          = {10.1109/TRUSTCOM.2011.216},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiCJZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiCLLR11,
  author       = {Deng Li and
                  Zhigang Chen and
                  Jiaqi Liu and
                  Hui Liu and
                  Zhong Ren},
  title        = {A Simulation Study of Unstructured {P2P} Overlay for Multimedia Streaming},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1393--1399},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.190},
  doi          = {10.1109/TRUSTCOM.2011.190},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiCLLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiCLZ11,
  author       = {Jianhua Li and
                  Songqiao Chen and
                  Yongjun Li and
                  Qian Zhang},
  title        = {Semantic Web Service Automatic Composition Based on Service Parameter
                  Relationship Graph},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1773--1778},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.253},
  doi          = {10.1109/TRUSTCOM.2011.253},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiCLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiH11,
  author       = {Jinshun Li and
                  Yanyu Hu},
  title        = {Nose Surgery Simulation Based on Volumetric Laplacian Deformation},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1482--1487},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.204},
  doi          = {10.1109/TRUSTCOM.2011.204},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLWG11,
  author       = {Qingrui Li and
                  Juan Li and
                  Hui Wang and
                  Ashok Ginjala},
  title        = {Semantics-Enhanced Privacy Recommendation for Social Networking Sites},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {226--233},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.31},
  doi          = {10.1109/TRUSTCOM.2011.31},
  timestamp    = {Sat, 15 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLWG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiNMDW11,
  author       = {Ruixuan Li and
                  Li Nie and
                  Xiaopu Ma and
                  Meng Dong and
                  Wei Wang},
  title        = {{SMEF:} An Entropy-Based Security Framework for Cloud-Oriented Service
                  Mashup},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {304--311},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.41},
  doi          = {10.1109/TRUSTCOM.2011.41},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiNMDW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZG11,
  author       = {Yi Li and
                  Mingzhe Zhang and
                  Jiaqi Gu},
  title        = {An Email Server Optimized for Storage Issues},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1437--1443},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.197},
  doi          = {10.1109/TRUSTCOM.2011.197},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiangBW11,
  author       = {Shaohua Liang and
                  Md. Zakirul Alam Bhuiyan and
                  Guojun Wang},
  title        = {Auction-Based Adaptive Sensor Activation Algorithm for Target Tracking
                  in WSNs},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1217--1223},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.164},
  doi          = {10.1109/TRUSTCOM.2011.164},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiangBW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinTL11,
  author       = {Hsiao{-}Ying Lin and
                  Wen{-}Guey Tzeng and
                  Bao{-}Shuh Paul Lin},
  title        = {A Decentralized Repair Mechanism for Decentralized Erasure Code Based
                  Storage Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {613--620},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.79},
  doi          = {10.1109/TRUSTCOM.2011.79},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinTL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinTW11,
  author       = {Yisong Lin and
                  Tao Tang and
                  Guibin Wang},
  title        = {Power Optimization for {GPU} Programs Based on Software Prefetching},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1339--1346},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.184},
  doi          = {10.1109/TRUSTCOM.2011.184},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Liu11,
  author       = {Lin Liu},
  title        = {Uncovering {SIP} Vulnerabilities to DoS Attacks Using Coloured Petri
                  Nets},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {29--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.8},
  doi          = {10.1109/TRUSTCOM.2011.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Liu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuA11,
  author       = {Tong Liu and
                  Prathima Agrawal},
  title        = {A Trusted Integrity Measurement Architecture for Securing Enterprise
                  Network},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {726--731},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.94},
  doi          = {10.1109/TRUSTCOM.2011.94},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuFJ11,
  author       = {Mei Liu and
                  Ge Fu and
                  Jiwu Jing},
  title        = {eHCBAC: Flexible Column Based Access Control for Electronic Healthcare
                  Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {745--750},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.97},
  doi          = {10.1109/TRUSTCOM.2011.97},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuFJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuGLW11,
  author       = {Hao Liu and
                  Wei Guo and
                  Chao Lu and
                  Jizeng Wei},
  title        = {An Efficient Stereoscopic Game Conversion System for Embedded Platform},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1235--1240},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.167},
  doi          = {10.1109/TRUSTCOM.2011.167},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuGLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuHGJZ11,
  author       = {Limin Liu and
                  Jin Han and
                  Debin Gao and
                  Jiwu Jing and
                  Daren Zha},
  title        = {Launching Return-Oriented Programming Attacks against Randomized Relocatable
                  Executables},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {37--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.9},
  doi          = {10.1109/TRUSTCOM.2011.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuHGJZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuK11,
  author       = {Fuwen Liu and
                  Hartmut K{\"{o}}nig},
  title        = {A Simple Balanced Password-Authenticated Key Agreement Protocol},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {403--408},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.52},
  doi          = {10.1109/TRUSTCOM.2011.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLG11,
  author       = {Sheng Liu and
                  Hongdan Liu and
                  Zhenguo Gao},
  title        = {Power Control Game Algorithm Based on Combination Pricing Function},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1421--1424},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.194},
  doi          = {10.1109/TRUSTCOM.2011.194},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuO11,
  author       = {Weiguo Liu and
                  Jia OuYang},
  title        = {Clustering Algorithm for High Dimensional Data Stream over Sliding
                  Windows},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1537--1542},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.213},
  doi          = {10.1109/TRUSTCOM.2011.213},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuPS11,
  author       = {Yujing Liu and
                  Wei Peng and
                  Jinshu Su},
  title        = {Study on {IP} Prefix Hijacking in Cloud Computing Networks Based on
                  Attack Planning},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {922--926},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.127},
  doi          = {10.1109/TRUSTCOM.2011.127},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuSD11,
  author       = {Wei Liu and
                  Feiyan Shi and
                  Wei Du},
  title        = {An LIRS-Based Replica Replacement Strategy for Data-Intensive Applications},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1381--1386},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.188},
  doi          = {10.1109/TRUSTCOM.2011.188},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuSD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuW11,
  author       = {Xiaojian Liu and
                  Zhixue Wang},
  title        = {Extending {EAST-ADL2} to Support Aspectual Requirement Specification
                  and Analysis for Automotive Software},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1255--1263},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.169},
  doi          = {10.1109/TRUSTCOM.2011.169},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWZT11,
  author       = {Yizhi Liu and
                  Xiangdong Wang and
                  Yongdong Zhang and
                  Sheng Tang},
  title        = {Fusing Audio-Words with Visual Features for Pornographic Video Detection},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1488--1493},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.205},
  doi          = {10.1109/TRUSTCOM.2011.205},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LouC11,
  author       = {Xiaoping Lou and
                  Zhigang Chen},
  title        = {Quantum Distributed Ballot Scheme Based on Entanglement Swapping},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {911--915},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.125},
  doi          = {10.1109/TRUSTCOM.2011.125},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LouC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Lu11,
  author       = {Kim{-}Yung Lu},
  title        = {A Data Simulator for ZigBee-Base Wireless Sensor Network System},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1699--1703},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.236},
  doi          = {10.1109/TRUSTCOM.2011.236},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Lu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuZZ11,
  author       = {Zhou Lu and
                  Kailong Zhang and
                  Xingshe Zhou},
  title        = {A Software Fault-Tolerant Method Based on Exception Handling in {RT/E}
                  System},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1283--1287},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.173},
  doi          = {10.1109/TRUSTCOM.2011.173},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoFZL11,
  author       = {Sanding Luo and
                  Xiaomin Fang and
                  Cong Zhao and
                  Yisha Luo},
  title        = {Text Line Based Correction of Distorted Document Images},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1494--1499},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.206},
  doi          = {10.1109/TRUSTCOM.2011.206},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoFZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaASN11,
  author       = {Jianqiang Ma and
                  Habtamu Abie and
                  Torbj{\o}rn Skramstad and
                  Mads Nyg{\aa}rd},
  title        = {A Framework for the Assessment of the Trustworthiness of Digital Records
                  over Time},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {738--744},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.96},
  doi          = {10.1109/TRUSTCOM.2011.96},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaASN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaJW11,
  author       = {Zheng Ma and
                  Weijia Jia and
                  Guojun Wang},
  title        = {Routing with Virtual Region Coordinates in Wireless Sensor Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1657--1661},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.252},
  doi          = {10.1109/TRUSTCOM.2011.252},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaJW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Mao11,
  author       = {Chengying Mao},
  title        = {Variable Precision Rough Set-Based Fault Diagnosis for Web Services},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1550--1555},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.215},
  doi          = {10.1109/TRUSTCOM.2011.215},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Mao11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MarauLPAR11,
  author       = {Ricardo Marau and
                  Karthik Lakshmanan and
                  Paulo Pedreiras and
                  Lu{\'{\i}}s Almeida and
                  Raj Rajkumar},
  title        = {Efficient Elastic Resource Management for Dynamic Embedded Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {981--990},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.135},
  doi          = {10.1109/TRUSTCOM.2011.135},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MarauLPAR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MarturanaMBT11,
  author       = {Fabio Marturana and
                  Gianluigi Me and
                  Rosamaria Berte and
                  Simone Tacconi},
  title        = {A Quantitative Approach to Triaging in Mobile Forensics},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {582--588},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.75},
  doi          = {10.1109/TRUSTCOM.2011.75},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MarturanaMBT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MeiYS11,
  author       = {Chunlei Mei and
                  Maoxiang Yi and
                  Zhifei Shen},
  title        = {Decreasing SoC Test Power Dissipation and Test Data Volume Based on
                  Pattern Recombination},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {701--705},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.90},
  doi          = {10.1109/TRUSTCOM.2011.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MeiYS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MengCWZ11,
  author       = {Yinghui Meng and
                  Jian Chen and
                  Yingyou Wen and
                  Hong Zhao},
  title        = {The Four Corners DV-Hop Localization Algorithm for Wireless Sensor
                  Network},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1733--1738},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.242},
  doi          = {10.1109/TRUSTCOM.2011.242},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MengCWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MizoguchiM11,
  author       = {Atsushi Mizoguchi and
                  Kazunori Miyata},
  title        = {Modeling Trees with Rugged Surfaces},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1464--1471},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.201},
  doi          = {10.1109/TRUSTCOM.2011.201},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MizoguchiM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MoridOS11,
  author       = {Mohammad Amin Morid and
                  Amin Omidvar and
                  Hamid Reza Shahriari},
  title        = {An Enhanced Method for Computation of Similarity between the Contexts
                  in Trust Evaluation Using Weighted Ontology},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {721--725},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.93},
  doi          = {10.1109/TRUSTCOM.2011.93},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MoridOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MusauWA11,
  author       = {Felix Musau and
                  Guojun Wang and
                  Muhammad Bashir Abdullahi},
  title        = {Group Formation with Neighbor Similarity Trust in {P2P} E-Commerce},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {835--840},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.111},
  doi          = {10.1109/TRUSTCOM.2011.111},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MusauWA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NepalSP11,
  author       = {Surya Nepal and
                  Wanita Sherchan and
                  C{\'{e}}cile Paris},
  title        = {STrust: {A} Trust Model for Social Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {841--846},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.112},
  doi          = {10.1109/TRUSTCOM.2011.112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NepalSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NevilleH11,
  author       = {Stephen W. Neville and
                  Michael Horie},
  title        = {Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level
                  eCommerce and M-Commerce Transactions},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {664--672},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.85},
  doi          = {10.1109/TRUSTCOM.2011.85},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NevilleH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Niemi11,
  author       = {Valtteri Niemi},
  title        = {Privacy, Identity and Trust in Context-Aware Mobile Services},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {9--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.5},
  doi          = {10.1109/TRUSTCOM.2011.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Niemi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NikolicAP11,
  author       = {Borislav Nikolic and
                  Muhammad Ali Awan and
                  Stefan M. Petters},
  title        = {{SPARTS:} Simulator for Power Aware and Real-Time Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {999--1004},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.137},
  doi          = {10.1109/TRUSTCOM.2011.137},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NikolicAP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NinggalA11,
  author       = {Mohd Izuan Hafez Ninggal and
                  Jemal H. Abawajy},
  title        = {Attack Vector Analysis and Privacy-Preserving Social Network Data
                  Publishing},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {847--852},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.113},
  doi          = {10.1109/TRUSTCOM.2011.113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NinggalA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OkmanGGGA11,
  author       = {Lior Okman and
                  Nurit Gal{-}Oz and
                  Yaron Gonen and
                  Ehud Gudes and
                  Jenny Abramov},
  title        = {Security Issues in NoSQL Databases},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {541--547},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.70},
  doi          = {10.1109/TRUSTCOM.2011.70},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/OkmanGGGA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OuCLLHH11,
  author       = {Yi{-}Zong Ou and
                  Edward T.{-}H. Chu and
                  Wen{-}wei Lu and
                  Jane W.{-}S. Liu and
                  Ta{-}Chih Hung and
                  Jwu{-}Sheng Hu},
  title        = {Resource Management for Robotic Applications},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1210--1216},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.163},
  doi          = {10.1109/TRUSTCOM.2011.163},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/OuCLLHH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PanchenkoSEE11,
  author       = {Andriy Panchenko and
                  Otto Spaniol and
                  Andr{\'{e}} Egners and
                  Thomas Engel},
  title        = {Lightweight Hidden Services},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {533--540},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.69},
  doi          = {10.1109/TRUSTCOM.2011.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PanchenkoSEE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PathanJ11,
  author       = {Risat Mahmud Pathan and
                  Jan Jonsson},
  title        = {{FTGS:} Fault-Tolerant Fixed-Priority Scheduling on Multiprocessors},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1164--1175},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.158},
  doi          = {10.1109/TRUSTCOM.2011.158},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PathanJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PatilKYRT11,
  author       = {Annapurna P. Patil and
                  K. Rajani Kanth and
                  Apoorva Yadhava and
                  H. P. Rakshith and
                  Joseph Tom},
  title        = {Implementation and Performance Evaluation of an Adaptive Routing Algorithm
                  in MANETs},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1750--1755},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.258},
  doi          = {10.1109/TRUSTCOM.2011.258},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PatilKYRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengLLL11,
  author       = {Jun Peng and
                  Junbo Li and
                  Shuo Li and
                  Jing Li},
  title        = {Multi-relay Cooperative Mechanism with Q-Learning in Cognitive Radio
                  Multimedia Sensor Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1624--1629},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.225},
  doi          = {10.1109/TRUSTCOM.2011.225},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengLLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengW11,
  author       = {Sancheng Peng and
                  Guojun Wang},
  title        = {Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth
                  Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {282--287},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.38},
  doi          = {10.1109/TRUSTCOM.2011.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengXZL11,
  author       = {Jun Peng and
                  Huiyuan Xian and
                  Xiaoyong Zhang and
                  Zheqin Li},
  title        = {Context-Aware Vertical Handoff Decision Scheme in Heterogeneous Wireless
                  Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1375--1380},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.187},
  doi          = {10.1109/TRUSTCOM.2011.187},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengXZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Petrlic11,
  author       = {Ronald Petrlic},
  title        = {Integrity Protection for Automated Teller Machines},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {829--834},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.110},
  doi          = {10.1109/TRUSTCOM.2011.110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Petrlic11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PiergiovanniMWL11,
  author       = {Sara {Tucci Piergiovanni} and
                  Chokri Mraidha and
                  Ernest Wozniak and
                  Agnes Lanusse and
                  S{\'{e}}bastien G{\'{e}}rard},
  title        = {A {UML} Model-Based Approach for Replication Assessment of {AUTOSAR}
                  Safety-Critical Applications},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1176--1187},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.159},
  doi          = {10.1109/TRUSTCOM.2011.159},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PiergiovanniMWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PunJC11,
  author       = {Chi{-}Man Pun and
                  Jing{-}Jing Jiang and
                  C. L. Philip Chen},
  title        = {Adaptive Client-Side LUT-Based Digital Watermarking},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {795--799},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.104},
  doi          = {10.1109/TRUSTCOM.2011.104},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PunJC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PunYC11,
  author       = {Chi{-}Man Pun and
                  Xiaochen Yuan and
                  C. L. Philip Chen},
  title        = {Geometric Invariant Digital Image Watermarking Scheme Based on Feature
                  Points Detector and Histogram Distribution},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {166--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.24},
  doi          = {10.1109/TRUSTCOM.2011.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PunYC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QinCZZ11,
  author       = {Yu Qin and
                  Dexian Chang and
                  Shijun Zhao and
                  Qianying Zhang},
  title        = {A Property-Based Attestation Scheme with the Variable Privacy},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1616--1623},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.224},
  doi          = {10.1109/TRUSTCOM.2011.224},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QinCZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ReeceLR11,
  author       = {Trey Reece and
                  Daniel B. Limbrick and
                  William H. Robinson},
  title        = {Design Comparison to Identify Malicious Hardware in External Intellectual
                  Property},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {639--646},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.82},
  doi          = {10.1109/TRUSTCOM.2011.82},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ReeceLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RiesFMM11,
  author       = {Sebastian Ries and
                  Marc Fischlin and
                  Leonardo A. Martucci and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Learning Whom to Trust in a Privacy-Friendly Way},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {214--225},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.30},
  doi          = {10.1109/TRUSTCOM.2011.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RiesFMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RozenbergGEF11,
  author       = {Boris Rozenberg and
                  Ehud Gudes and
                  Yuval Elovici and
                  Yuval Fledel},
  title        = {A Method for Detecting Unknown Malicious Executables},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {190--196},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.27},
  doi          = {10.1109/TRUSTCOM.2011.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RozenbergGEF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RuanRHS11,
  author       = {Na Ruan and
                  Yizhi Ren and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  title        = {Performance Analysis of Key Management Schemes in Wireless Sensor
                  Network Using Analytic Hierarchy Process},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1739--1744},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.243},
  doi          = {10.1109/TRUSTCOM.2011.243},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RuanRHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RujNS11,
  author       = {Sushmita Ruj and
                  Amiya Nayak and
                  Ivan Stojmenovic},
  title        = {{DACC:} Distributed Access Control in Clouds},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {91--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.15},
  doi          = {10.1109/TRUSTCOM.2011.15},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RujNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SaccoPD11,
  author       = {Owen Sacco and
                  Alexandre Passant and
                  Stefan Decker},
  title        = {An Access Control Framework for the Web of Data},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {456--463},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.59},
  doi          = {10.1109/TRUSTCOM.2011.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SaccoPD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SantosBV11,
  author       = {Ricardo Jorge Santos and
                  Jorge Bernardino and
                  Marco Vieira},
  title        = {Balancing Security and Performance for Enhancing Data Privacy in Data
                  Warehouses},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {242--249},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.33},
  doi          = {10.1109/TRUSTCOM.2011.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SantosBV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SchackelerJ11,
  author       = {Stefan Sch{\"{a}}ckeler and
                  Nityananda Jayadevaprakash},
  title        = {Visualization of Computational Processes of Procedural Abstraction
                  Optimization Passes},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1099--1108},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.150},
  doi          = {10.1109/TRUSTCOM.2011.150},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SchackelerJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SeffrinH11,
  author       = {Andr{\'{e}} Seffrin and
                  Sorin A. Huss},
  title        = {Ensuring Secure Information Flow in Partially Reconfigurable Architectures
                  by Means of Process Algebra Analysis},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {443--450},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.57},
  doi          = {10.1109/TRUSTCOM.2011.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SeffrinH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShaH11,
  author       = {Sha Sha and
                  Rosemary Halliwell},
  title        = {Performance Modelling and Analysis of Dynamic Class-Based Call Admission
                  Control Algorithm Using Fuzzy Logic for Heterogeneous Wireless Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1795--1800},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.250},
  doi          = {10.1109/TRUSTCOM.2011.250},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShaH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShengZYW11,
  author       = {Jinfang Sheng and
                  Wen Zou and
                  Liu Yang and
                  Bin Wang},
  title        = {A RFID-Based Context-Aware Service Model},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {779--784},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.102},
  doi          = {10.1109/TRUSTCOM.2011.102},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShengZYW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SherchanNB11,
  author       = {Wanita Sherchan and
                  Surya Nepal and
                  Athman Bouguettaya},
  title        = {A Trust Prediction Model for Service Web},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {258--265},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.35},
  doi          = {10.1109/TRUSTCOM.2011.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SherchanNB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShiJLS11,
  author       = {Fei Shi and
                  Dongxu Jin and
                  Weijie Liu and
                  JooSeok Song},
  title        = {Time-Based Detection and Location of Wormhole Attacks in Wireless
                  Ad Hoc Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1721--1726},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.240},
  doi          = {10.1109/TRUSTCOM.2011.240},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShiJLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShiSGL11,
  author       = {Ronghua Shi and
                  Qian Su and
                  Ying Guo and
                  Moon Ho Lee},
  title        = {Quantum Secure Communication Based on Nonmaximally Entangled Qubit
                  Pair and Dining Cryptographers Problem},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {900--904},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.123},
  doi          = {10.1109/TRUSTCOM.2011.123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShiSGL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShiSGL11a,
  author       = {Ronghua Shi and
                  Jinjing Shi and
                  Ying Guo and
                  Moon Ho Lee},
  title        = {Multiparty Quantum Group Signature Scheme with Quantum Parallel Computation},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {905--910},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.124},
  doi          = {10.1109/TRUSTCOM.2011.124},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShiSGL11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SithirasenanKRM11,
  author       = {Elankayer Sithirasenan and
                  Saurabh Kumar and
                  Khosrow Ramezani and
                  Vallipuram Muthukkumarasamy},
  title        = {An {EAP} Framework for Unified Authentication in Wireless Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {389--397},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.50},
  doi          = {10.1109/TRUSTCOM.2011.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SithirasenanKRM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SommestadHE11,
  author       = {Teodor Sommestad and
                  Hannes Holm and
                  Mathias Ekstedt},
  title        = {Estimates of Success Rates of Denial-of-Service Attacks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {21--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.7},
  doi          = {10.1109/TRUSTCOM.2011.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SommestadHE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongPKK11,
  author       = {Chi{-}won Song and
                  Sungmin Park and
                  Dongwook Kim and
                  Sooyong Kang},
  title        = {Parity Cloud Service: {A} Privacy-Protected Personal Data Recovery
                  Service},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {812--817},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.107},
  doi          = {10.1109/TRUSTCOM.2011.107},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongPKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongSYLZ11,
  author       = {Hongzhi Song and
                  Guodong Si and
                  Lei Yang and
                  Huakun Liang and
                  Lixia Zhang},
  title        = {Using Project-Based Learning and Collaborative Learning in Software
                  Engineering Talent Cultivation},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1288--1293},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.174},
  doi          = {10.1109/TRUSTCOM.2011.174},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongSYLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongXWY11,
  author       = {Hong Song and
                  Xiao Xiao and
                  Weiping Wang and
                  Luming Yang},
  title        = {{DENNC:} {A} Wireless Malicious Detection Approach Based on Network
                  Coding},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {160--165},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.23},
  doi          = {10.1109/TRUSTCOM.2011.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongXWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Stojmenovic11,
  author       = {Ivan Stojmenovic},
  title        = {Access Control in Distributed Systems: Merging Theory with Practice},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.1},
  doi          = {10.1109/TRUSTCOM.2011.1},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Stojmenovic11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunW11,
  author       = {Qian Sun and
                  Min Wu},
  title        = {A Double Key-Sharing Based False Data Filtering Scheme in Wireless
                  Sensor Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {509--516},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.66},
  doi          = {10.1109/TRUSTCOM.2011.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunWTZY11,
  author       = {Lili Sun and
                  Hua Wang and
                  Xiaohui Tao and
                  Yanchun Zhang and
                  Jing Yang},
  title        = {Privacy Preserving Access Control Policy and Algorithms for Conflicting
                  Problems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {250--257},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.34},
  doi          = {10.1109/TRUSTCOM.2011.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunWTZY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangL0Z11,
  author       = {Fei Tang and
                  Changlu Lin and
                  Yong Li and
                  Shengyuan Zhang},
  title        = {Identity-Based Strong Designated Verifier Signature Scheme with Full
                  Non-Delegatability},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {800--805},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.105},
  doi          = {10.1109/TRUSTCOM.2011.105},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangL0Z11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangLZS11,
  author       = {Zhenzhou Tang and
                  Chang Li and
                  Chunrong Zhang and
                  Xiaoqiu Shi},
  title        = {The Practice Teaching Reform of Modern Communication Technologies
                  Course for Non-communication Majors},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1303--1307},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.177},
  doi          = {10.1109/TRUSTCOM.2011.177},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangLZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TianMPZ11,
  author       = {Youliang Tian and
                  Jianfeng Ma and
                  Changgen Peng and
                  Jianming Zhu},
  title        = {Secret Sharing Scheme with Fairness},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {494--500},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.64},
  doi          = {10.1109/TRUSTCOM.2011.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TianMPZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TuncerT11,
  author       = {Taner Tuncer and
                  Yetkin Tatar},
  title        = {Detection DoS Attack on {FPGA} Using Fuzzy Association Rules},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1271--1276},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.171},
  doi          = {10.1109/TRUSTCOM.2011.171},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TuncerT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TupakulaV11,
  author       = {Udaya Kiran Tupakula and
                  Vijay Varadharajan},
  title        = {{TVLAN:} Trusted and Virtualised Local Area Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {606--612},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.78},
  doi          = {10.1109/TRUSTCOM.2011.78},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TupakulaV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WanA11,
  author       = {Kaiyu Wan and
                  Vangalur S. Alagar},
  title        = {Dependable Context-Sensitive Services in Cyber Physical Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {687--694},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.88},
  doi          = {10.1109/TRUSTCOM.2011.88},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WanA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Wang11,
  author       = {Huaimin Wang},
  title        = {{TRUSTIE:} Design of a Trustworthy Software Production Environment},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {3--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.2},
  doi          = {10.1109/TRUSTCOM.2011.2},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Wang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLW11,
  author       = {Qiong Wang and
                  Cong Liu and
                  Zhiying Wang},
  title        = {An Advanced and Effective Literature Search Algorithm Based on Analytic
                  Hierarchy Process},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1264--1270},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.170},
  doi          = {10.1109/TRUSTCOM.2011.170},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangQZT11,
  author       = {Qiang Wang and
                  Xue Qiu and
                  Quan Zhang and
                  Chaojing Tang},
  title        = {Key Privacy in McEliece Public Key Cryptosystem},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {824--828},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.109},
  doi          = {10.1109/TRUSTCOM.2011.109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangQZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWLWZ11,
  author       = {Youxiang Wang and
                  Jianquan Wang and
                  Zhaobiao Lu and
                  Minghui Wang and
                  Wenyue Zhang},
  title        = {Improved Partial Parallel Decision Feedback Multiuser Detection for
                  Multiuser-MIMO System},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1695--1698},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.235},
  doi          = {10.1109/TRUSTCOM.2011.235},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWLWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYWS11,
  author       = {Bin Wang and
                  Dan Yin and
                  Taiwen Wu and
                  Jinfang Sheng},
  title        = {Plug-In Based Integrated Development Platform for Industrial Control
                  System-P-IDP4ICS},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1578--1583},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.219},
  doi          = {10.1109/TRUSTCOM.2011.219},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZPF11,
  author       = {Kefei Wang and
                  Heying Zhang and
                  Lihong Peng and
                  Baohua Fan},
  title        = {Improving the Adaptiveness of {FAST} {TCP} Based on the Stability
                  with Time-Delay},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1444--1451},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.198},
  doi          = {10.1109/TRUSTCOM.2011.198},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZPF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WaqarRA11,
  author       = {Adeela Waqar and
                  Asad Raza and
                  Haider Abbas},
  title        = {User Privacy Issues in Eucalyptus: {A} Private Cloud Computing Environment},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {927--932},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.128},
  doi          = {10.1109/TRUSTCOM.2011.128},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WaqarRA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WenZHC11,
  author       = {Yan Wen and
                  Jinjing Zhao and
                  Minhuan Huang and
                  Hua Chen},
  title        = {Towards Detecting Thread Deadlock in Java Programs with {JVM} Introspection},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1600--1607},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.222},
  doi          = {10.1109/TRUSTCOM.2011.222},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WenZHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WerapunFP11,
  author       = {Warodom Werapun and
                  Julien Fasson and
                  B{\'{e}}atrice Paillassa},
  title        = {Home Service Communities and Authentication},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {818--823},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.108},
  doi          = {10.1109/TRUSTCOM.2011.108},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WerapunFP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WiederseinerGS11,
  author       = {Christian Wiederseiner and
                  Vahid Garousi and
                  Michael Smith},
  title        = {Tool Support for Automated Traceability of Test/Code Artifacts in
                  Embedded Software Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1109--1117},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.151},
  doi          = {10.1109/TRUSTCOM.2011.151},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WiederseinerGS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuKHL11,
  author       = {Libing Wu and
                  Yalin Ke and
                  Yanxiang He and
                  Nan Liu},
  title        = {A Block Gathering Based on Mobile Web Page Segmentation Algorithm},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1425--1430},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.195},
  doi          = {10.1109/TRUSTCOM.2011.195},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuKHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuWC11,
  author       = {Shao{-}Yu Wu and
                  Ming{-}Hung Wang and
                  Kuan{-}Ta Chen},
  title        = {Privacy Crisis Due to Crisis Response on the Web},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {197--205},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.28},
  doi          = {10.1109/TRUSTCOM.2011.28},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuWC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuWMCR11,
  author       = {Jiangjiang Wu and
                  Zhiying Wang and
                  Songzhu Mei and
                  Yong Cheng and
                  Jiangchun Ren},
  title        = {VerFAT: {A} Transparent and Efficient Multi-versioning Mechanism for
                  {FAT} File System},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1608--1615},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.223},
  doi          = {10.1109/TRUSTCOM.2011.223},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuWMCR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiJY011,
  author       = {Rongrong Xi and
                  Shuyuan Jin and
                  Xiao{-}chun Yun and
                  Yongzheng Zhang},
  title        = {{CNSSA:} {A} Comprehensive Network Security Situation Awareness System},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {482--487},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.62},
  doi          = {10.1109/TRUSTCOM.2011.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiJY011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaJJZ11,
  author       = {Hui Xia and
                  Zhiping Jia and
                  Lei Ju and
                  Youqin Zhu},
  title        = {Multicast Trusted Routing with QoS Multi-constraints in Wireless Ad
                  Hoc Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1277--1282},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.172},
  doi          = {10.1109/TRUSTCOM.2011.172},
  timestamp    = {Tue, 07 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaJJZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Xiang11,
  author       = {Yang Xiang},
  title        = {Defending against Large-Scale and Coordinated Attacks in the Ubiquitous
                  Environments},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {7--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.4},
  doi          = {10.1109/TRUSTCOM.2011.4},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Xiang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XieGY11,
  author       = {Yinbo Xie and
                  Chengcheng Guo and
                  Jianfeng Yang},
  title        = {The Effective Second Classroom on Embedded System Education},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1298--1302},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.176},
  doi          = {10.1109/TRUSTCOM.2011.176},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XieGY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XieHT11,
  author       = {Miao Xie and
                  Song Han and
                  Biming Tian},
  title        = {Highly Efficient Distance-Based Anomaly Detection through Univariate
                  with {PCA} in Wireless Sensor Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {564--571},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.73},
  doi          = {10.1109/TRUSTCOM.2011.73},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XieHT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XieW11,
  author       = {Yongming Xie and
                  Guojun Wang},
  title        = {Distributed Private-Key Generation Scheme with Self-Certified Identity},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {501--508},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.65},
  doi          = {10.1109/TRUSTCOM.2011.65},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XieW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XieXWLCG11,
  author       = {Guangjun Xie and
                  Guangzhi Xu and
                  Gang Wang and
                  Jing Liu and
                  Rui Cao and
                  Yan Gao},
  title        = {hUBI: An Optimized Hybrid Mapping Scheme for {NAND} Flash-Based SSDs},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1015--1022},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.139},
  doi          = {10.1109/TRUSTCOM.2011.139},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XieXWLCG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XieZCJY11,
  author       = {Xia Xie and
                  Haiqing Zhu and
                  Wenzhi Cao and
                  Hai Jin and
                  Pingpeng Yuan},
  title        = {{I/O} Scheduling by Using Multi-network Interfaces of Virtualization
                  System},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1347--1354},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.257},
  doi          = {10.1109/TRUSTCOM.2011.257},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XieZCJY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiongNZL11,
  author       = {Junjie Xiong and
                  Edith C. H. Ngai and
                  Yangfan Zhou and
                  Michael R. Lyu},
  title        = {RealProct: Reliable Protocol Conformance Testing with Real Nodes for
                  Wireless Sensor Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {572--581},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.74},
  doi          = {10.1109/TRUSTCOM.2011.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiongNZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuHYZ11,
  author       = {Chuncong Xu and
                  Xiaomeng Huang and
                  Guangwen Yang and
                  Yang Zhou},
  title        = {A Two-Layered Replica Management Method},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1431--1436},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.196},
  doi          = {10.1109/TRUSTCOM.2011.196},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuHYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YamBSI11,
  author       = {Chew{-}Yean Yam and
                  Adrian Baldwin and
                  Simon Shiu and
                  Christos Ioannidis},
  title        = {Migration to Cloud as Real Option: Investment Decision under Uncertainty},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {940--949},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.130},
  doi          = {10.1109/TRUSTCOM.2011.130},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YamBSI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanKS11,
  author       = {Zheng Yan and
                  Raimo Kantola and
                  Yue Shen},
  title        = {Unwanted Traffic Control via Global Trust Management},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {647--654},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.83},
  doi          = {10.1109/TRUSTCOM.2011.83},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanKZ11,
  author       = {Zheng Yan and
                  Raimo Kantola and
                  Peng Zhang},
  title        = {A Research Model for Human-Computer Trust Interaction},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {274--281},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.37},
  doi          = {10.1109/TRUSTCOM.2011.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanKZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanKZ11a,
  author       = {Zheng Yan and
                  Raimo Kantola and
                  Peng Zhang},
  title        = {Theoretical Issues in the Study of Trust in Human-Computer Interaction},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {853--856},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.114},
  doi          = {10.1109/TRUSTCOM.2011.114},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanKZ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanQ11,
  author       = {Dong Yan and
                  Wang Qi},
  title        = {The Role of Trust in Social Life},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {889--892},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.120},
  doi          = {10.1109/TRUSTCOM.2011.120},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanXL11,
  author       = {Xinqing Yan and
                  Yan Xu and
                  Bin Li},
  title        = {A Biased Modified Binary Query Tree Protocol for {RFID} Tag Collision
                  Resolution},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1715--1720},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.239},
  doi          = {10.1109/TRUSTCOM.2011.239},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanXL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangCWH11,
  author       = {Qifan Yang and
                  Jianping Cai and
                  Jianzhong Wu and
                  Meimei Huo},
  title        = {Course Improvements to 'the Principle of Computer Organization' Based
                  on the Goal of Disciplinary Education: Taking the Examples of the
                  Computing Science Faculty of Zhejiang University City College},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1319--1322},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.180},
  doi          = {10.1109/TRUSTCOM.2011.180},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangCWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YinDJ11,
  author       = {Hongfei Yin and
                  Hongjun Dai and
                  Zhiping Jia},
  title        = {Verification-Based Multi-backup Firmware Architecture, an Assurance
                  of Trusted Boot Process for the Embedded Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1188--1195},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.160},
  doi          = {10.1109/TRUSTCOM.2011.160},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YinDJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YinM11,
  author       = {Xunru Yin and
                  Wenping Ma},
  title        = {Gray Map and Quantum Codes over the Ring F{\_}2+uF{\_}2+u2F{\_}2},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {897--899},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.122},
  doi          = {10.1109/TRUSTCOM.2011.122},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YinM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YinZXYHFQ11,
  author       = {Xiaojing Yin and
                  Yongxin Zhu and
                  Liang Xia and
                  Jingwei Ye and
                  Tian Huang and
                  Yuzhuo Fu and
                  Meikang Qiu},
  title        = {Efficient Implementation of Thermal-Aware Scheduler on a Quad-core
                  Processor},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1076--1082},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.147},
  doi          = {10.1109/TRUSTCOM.2011.147},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YinZXYHFQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuMA11,
  author       = {Haibo Yu and
                  Tsunenori Mine and
                  Makoto Amamiya},
  title        = {Towards User Intent Based Searching},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1400--1407},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.191},
  doi          = {10.1109/TRUSTCOM.2011.191},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuW11,
  author       = {Kun{-}Ming Yu and
                  Shu{-}Hao Wu},
  title        = {An Efficient Load Balancing Multi-core Frequent Patterns Mining Algorithm},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1408--1412},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.192},
  doi          = {10.1109/TRUSTCOM.2011.192},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuZ11,
  author       = {Aimin Yu and
                  Shijun Zhao},
  title        = {Enhancing Flexibility of TCG's {TNC} through Layered Property Attestation},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {751--756},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.98},
  doi          = {10.1109/TRUSTCOM.2011.98},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuZWY11,
  author       = {Rongwei Yu and
                  Lei Zhao and
                  Lina Wang and
                  Xiaodan Yin},
  title        = {Statistical Fault Localization via Semi-dynamic Program Slicing},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {695--700},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.89},
  doi          = {10.1109/TRUSTCOM.2011.89},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuZWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YunSW11,
  author       = {Buyoung Yun and
                  Kang G. Shin and
                  Shige Wang},
  title        = {Thermal-Aware Scheduling of Critical Applications Using Job Migration
                  and Power-Gating on Multi-core Chips},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1083--1090},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.148},
  doi          = {10.1109/TRUSTCOM.2011.148},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YunSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZabanootM11,
  author       = {Zaid Ahmed Zabanoot and
                  Geyong Min},
  title        = {Performance Design and Analysis of Handoff in Hierarchical Wireless
                  Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1708--1714},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.238},
  doi          = {10.1109/TRUSTCOM.2011.238},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZabanootM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZengYCQ11,
  author       = {Feng Zeng and
                  Lan Yao and
                  Zhigang Chen and
                  Huamei Qi},
  title        = {A Distributed and Shortest-Path-Based Algorithm for Maximum Cover
                  Sets Problem in Wireless Sensor Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1224--1228},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.165},
  doi          = {10.1109/TRUSTCOM.2011.165},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZengYCQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangFNZ11,
  author       = {Lizi Zhang and
                  Hui Fang and
                  Wee Keong Ng and
                  Jie Zhang},
  title        = {IntRank: Interaction Ranking-Based Trustworthy Friend Recommendation},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {266--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.36},
  doi          = {10.1109/TRUSTCOM.2011.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangFNZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangJL11,
  author       = {Nan Zhang and
                  Jiwu Jing and
                  Peng Liu},
  title        = {{CLOUD} {SHREDDER:} Removing the Laptop On-road Data Disclosure Threat
                  in the Cloud Computing Era},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1592--1599},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.221},
  doi          = {10.1109/TRUSTCOM.2011.221},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangJL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangS11,
  author       = {Jun Zhang and
                  Renjun Shao},
  title        = {Object-Level Data Model for Keyword Search over Relational Databases},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1361--1366},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.185},
  doi          = {10.1109/TRUSTCOM.2011.185},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangSY11,
  author       = {Peng Zhang and
                  Hanlin Sun and
                  Zheng Yan},
  title        = {Building up Trusted Identity Management in Mobile Heterogeneous Environment},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {873--877},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.117},
  doi          = {10.1109/TRUSTCOM.2011.117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangTZZ11,
  author       = {Yikui Zhang and
                  Yunfen Tian and
                  Liwei Zhu and
                  Haoxiang Zuo},
  title        = {Teaching Method Practicing on Embedded Software Engineering Curriculum},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1323--1327},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.181},
  doi          = {10.1109/TRUSTCOM.2011.181},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangTZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangW11,
  author       = {Zhongke Zhang and
                  Yun Wang},
  title        = {An Iterative Multi-path Routing Protocol in Wireless Ad Hoc Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1630--1637},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.226},
  doi          = {10.1109/TRUSTCOM.2011.226},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangYWW11,
  author       = {Lei Zhang and
                  Shui Yu and
                  Di Wu and
                  Paul A. Watters},
  title        = {A Survey on Latest Botnet Attack and Defense},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {53--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.11},
  doi          = {10.1109/TRUSTCOM.2011.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangYWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangYX11,
  author       = {Xiaohua Zhang and
                  Yuto Yoshida and
                  Ning Xie},
  title        = {Anisotropic Band-Pass Trilateral Filter for Creating Artistic Painting
                  from Real Image},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1457--1463},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.200},
  doi          = {10.1109/TRUSTCOM.2011.200},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangYX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZC11,
  author       = {Yunlong Zhang and
                  Jingyu Zhou and
                  Jia Cheng},
  title        = {Preference-Based Top-K Influential Nodes Mining in Social Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1512--1518},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.209},
  doi          = {10.1109/TRUSTCOM.2011.209},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZH11,
  author       = {Lingjie Zhang and
                  Ying Zhao and
                  Kaixi Hou},
  title        = {The Research of Levenberg-Marquardt Algorithm in Curve Fittings on
                  Multiple GPUs},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1355--1360},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.255},
  doi          = {10.1109/TRUSTCOM.2011.255},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZW11,
  author       = {Yanhua Zhang and
                  Chunhong Zhang and
                  Gang Wang},
  title        = {Exploit TIVs to Find Faster Paths},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1779--1782},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.248},
  doi          = {10.1109/TRUSTCOM.2011.248},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhengXW11,
  author       = {Jin Zheng and
                  Xinlin Xu and
                  Guojun Wang},
  title        = {Energy Efficient Data Aggregation Scheduling in Wireless Sensor Networks},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1662--1667},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.230},
  doi          = {10.1109/TRUSTCOM.2011.230},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhengXW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouBFCMM11,
  author       = {Miao Zhou and
                  Santiago Bock and
                  Alexandre Peixoto Ferreira and
                  Bruce R. Childers and
                  Rami G. Melhem and
                  Daniel Moss{\'{e}}},
  title        = {Real-Time Scheduling for Phase Change Main Memory Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {991--998},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.136},
  doi          = {10.1109/TRUSTCOM.2011.136},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouBFCMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouMSAY11,
  author       = {Miao Zhou and
                  Yi Mu and
                  Willy Susilo and
                  Man Ho Au and
                  Jun Yan},
  title        = {Privacy-Preserved Access Control for Cloud Computing},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {83--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.14},
  doi          = {10.1109/TRUSTCOM.2011.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouMSAY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZouMRW11,
  author       = {Youjiao Zou and
                  Wenping Ma and
                  Zhanjun Ran and
                  Shangping Wang},
  title        = {A New Multivariate Hash Function with {HAIFA} Construction},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {884--888},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.119},
  doi          = {10.1109/TRUSTCOM.2011.119},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZouMRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZuoL11,
  author       = {Yanjun Zuo and
                  Suhas Lande},
  title        = {A Logical Framework of Proof-Carrying Survivability},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {472--481},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.61},
  doi          = {10.1109/TRUSTCOM.2011.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZuoL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2011,
  title        = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6120120/proceeding},
  isbn         = {978-1-4577-2135-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics