Title |
Speakers |
Summary |
Topic Types |
Keynote I :Modelling the Propagation of Worms and Rumours in Networks |
Wanlei Zhou
|
N/A |
|
Keynote II :Advanced Ad Hoc and Mesh Networks Technologies to Facilitate Specialized Disaster-resilient Networks |
Nei Kato
|
N/A |
|
Keynote III :Cloud Computing, Big Data and Scalable Privacy Preservation |
Junjin Chen
|
N/A |
|
TrustCom Session #1: Privacy in Mobile & Wireless Networks |
Fábio Borges
|
N/A |
|
A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data |
Zhou-fu Cai
,
He-xing Yang
,
Wang Shuang
,
Xu Jian
,
Wang-ming Wei
,
Wu-li Na
|
N/A |
|
A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform |
Dengguo Feng
,
Bo Yang
,
Yu Qin
|
N/A |
|
Automated User Profiling in Location-Based Mobile Messaging Applications |
Dengguo Feng
,
Yao Cheng
,
Lingyun Ying
,
Purui Su
,
Chang Xu
,
Yi Yang
|
N/A |
|
PrivateDroid: Private Browsing Mode for Android |
Yuan Tian
,
Su Mon Kywe
,
Christopher Landis
,
Yutong Pei
,
Justin Satterfield
,
Patrick Tague
|
N/A |
|
TTPCookie: Flexible Third-Party Cookie Management for Increasing Online Privacy |
Ashar Javed
,
Christian Merz
,
Joerg Schwenk
|
N/A |
|
TrustCom Session #2: Privacy and Trust in Social Networks |
Ron Poet
|
N/A |
|
Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit |
Mu Yang
,
Yijun Yu
,
Arosha K. Bandara
,
Bashar Nuseibeh
|
N/A |
|
Garbling in Reverse Order |
Valtteri Niemi
,
Tommi Meskanen
,
Noora Nieminen
|
N/A |
|
Private Outsourcing of Polynomial Functions |
Peili Li
,
Haixia Xu
,
Jiaqi Hong
|
N/A |
|
A Machine Learning Based Trust Evaluation Framework for Online Social Networks |
Kang Zhao
,
Li Pan
|
N/A |
|
Multi-dimensions of Developer Trustworthiness Assessment in OSS Community |
Yu Bai
,
Gang Yin
,
Huaimin Wang
|
N/A |
|
TrustCom Paper Session #3: Security Algorithms |
Su Mon Kywe
|
N/A |
|
A Novel Feature Selection Approach for Intrusion Detection Data Classification |
Mohammed A. Ambusaidi
,
Xiangjian He
,
Zhiyuan Tan
,
Priyadarsi Nanda
,
Liang Fu Lu
,
Upasana T. Nagar
|
N/A |
|
An On-Line Anomaly Detection Method Based on a New Stationary Metric - Entropy-Ratio |
Ziyu Wang
,
Jiahai Yang
,
Fuliang Li
|
N/A |
|
Reaching Agreement in Security Policy Negotiation |
Nora Cuppens-boulahia
,
Frédéric Cuppens
,
Yanhuang Li
,
Jean-michel Crom
,
Vincent Frey
|
N/A |
|
Remembrance of Local Information Status for Enforcing Robustness of Policy-Exchanged Strategies for Trust Negotiation |
Darren Mundy
,
Yunxi Zhang
|
N/A |
|
Secure and Privacy-Friendly Public Key Generation and Certification |
Filipe Beato
,
Max Mühlhäuser
,
Fábio Borges
,
Leonardo A. Martucci
|
N/A |
|
TrustCom Paper Session #4: Security Applications |
Mu Yang
|
N/A |
|
A Stateful Mechanism for the Tree-Rule Firewall |
Xiangjian He
,
Zhiyuan Tan
,
Priyadarsi Nanda
,
Thawatchai Chomsiri
|
N/A |
|
CAFS: A Framework for Context-Aware Federated Services |
Ron Poet
,
Md. Sadek Ferdous
|
N/A |
|
Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services |
Yong Ho Hwang
,
Jae Woo Seo
,
Il Joo Kim
|
N/A |
|
High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields |
Shuai Liu
,
Lei Ju
,
Xiaojun Cai
,
Zhiping Jia
,
Zhiyong Zhang
|
N/A |
|
A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks |
Lei Ju
,
Zhiping Jia
,
Chongxian Guo
,
Huaqiang Xu
,
Jihai Xu
|
N/A |
|
TrustCom Paper Session #5: Security Systems |
Weixi Gu
|
N/A |
|
SIMS: A Comprehensive Approach for a Secure Instant Messaging Sifter |
Günter Fahrnberger
|
N/A |
|
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning |
Wenjuan Li
,
Yang Xiang
,
Zhiyuan Tan
,
Weizhi Meng
|
N/A |
|
Ultra High-Speed SM2 ASIC Implementation |
Zhenwei Zhao
,
Guoqiang Bai
|
N/A |
|
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features |
Yipeng Wang
,
Yongzheng Zhang
,
Yu Zhou
,
Jun Xiao
,
Weiyao Lin
|
N/A |
|
A Practically Optimized Implementation of Attribute Based Cryptosystems |
Chunqiang Hu
,
Fan Zhang
,
Tao Xiang
,
Hongjuan Li
,
Xiao Xiao
,
Guilin Huang
|
N/A |
|
TrustCom Paper Session #6: Authentication |
Zhiquan Lv
|
N/A |
|
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment |
Xiangjian He
,
Zhiyuan Tan
,
Priyadarsi Nanda
,
Mian Ahmad Jan
,
Ren Ping Liu
|
N/A |
|
Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs |
Liu Licai
,
Yin Lihua
,
Guo Yunchuan
,
Fang Bingxing
|
N/A |
|
Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems |
Uthpala Subodhani Premarathne
,
Ibrahim Khalil
|
N/A |
|
ToAuth: Towards Automatic Near Field Authentication for Smartphones |
Zheng Yang
,
Weixi Gu
,
Longfei Shangguan
,
Xiaoyu Ji
,
Yiyang Zhao
|
N/A |
|
One Kind of Cross-Domain DAA Scheme from Bilinear Mapping |
Xiaoming Wang
,
Heyou Cheng
,
Ruihua Zhang
|
N/A |
|
TrustCom Paper Session #7: Attack & Defense |
Yu Zhou
|
N/A |
|
Long Term Tracking and Characterization of P2P Botnet |
Dengguo Feng
,
Lingyun Ying
,
Purui Su
,
Yi Yang
,
Jia Yan
|
N/A |
|
A Survey of Security Network Coding toward Various Attacks |
Shixiong Yao
,
Jing Chen
,
Ruiying Du
,
Lan Deng
,
Chiheng Wang
|
N/A |
|
Defensor: Lightweight and Efficient Security-Enhanced Framework for Android |
Yibing Zhongyang
,
Zhi Xin
,
Bing Mao
,
Xuerui Pan
,
Hao Huang
|
N/A |
|
Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited |
Man ho Au
,
Hui Cui
,
Yi Mu
|
N/A |
|
The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack |
Ya Tan
,
Jizeng Wei
,
Wei Guo
|
N/A |
|
TrustCom Paper Session #8: Security and Trust in Cloud Computing (1) |
Liu Licai
|
N/A |
|
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security |
Neeraj Suri
,
Ahmed Taha
,
Ruben Trapero
,
Jesus Luna
|
N/A |
|
Efficiently Attribute-Based Access Control for Mobile Cloud Storage System |
Dengguo Feng
,
Zhiquan Lv
,
Jialin Chi
,
Min Zhang
|
N/A |
|
EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor |
Liang Deng
,
Qingkai Zeng
,
Weiguang Wang
,
Yao Liu
|
N/A |
|
FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing |
Yang Xiang
,
Jing Chen
,
Ruiying Du
,
Lan Deng
,
Yu Zhang
,
Qing Zhou
|
N/A |
|
ONHelp: Components in Building Secure Cloud Based on OpenNebula |
Kao Zhao
,
Hai Jin
,
Deqing Zou
,
Weiqi Dai
|
N/A |
|
TrustCom Paper Session #9: Security and Trust in Cloud Computing (2) |
Muttukrishnan Rajarajan
|
N/A |
|
Proofs of Ownership and Retrievability in Cloud Storage |
Jing Chen
,
Ruiying Du
,
Lan Deng
,
Kun He
,
Minghui Zheng
|
N/A |
|
Temporal Access Control with User Revocation for Cloud Data |
Nihal Balani
,
Sushmita Ruj
|
N/A |
|
Trusted Geolocation-Aware Data Placement in Infrastructure Clouds |
Nicolae Paladi
,
Mudassar Aslam
,
Christian Gehrman
|
N/A |
|
Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation Context |
Yuanlong Cao
,
Jianfeng Guan
,
Changqiao Xu
,
Wei Quan
,
Hongke Zhang
|
N/A |
|
Trust Enhanced Cloud Security for Healthcare Services |
Udaya Tupakula
,
Vijay Varadharajan
|
N/A |
|
TrustCom Paper Session #10: Security in Mobile Networks |
Meng Li
|
N/A |
|
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps |
Julian Schütte
,
Dennis Titze
,
J.m. De Fuentes
|
N/A |
|
Attack Tree Based Android Malware Detection with Hybrid Analysis |
Lei Zhang
,
Shuai Zhao
,
Xiaohong Li
,
Guangquan Xu
,
Zhiyong Feng
|
N/A |
|
Automatically Exploiting Potential Component Leaks in Android Applications |
Alexandre Bartel
,
Jacques Klein
,
Yves Le Traon
,
Li Erran Li
|
N/A |
|
Data-centric Rogue Node Detection in VANETs |
Muttukrishnan Rajarajan
,
Kamran Zaidi
,
Milos Milojevic
,
Veselin Rakocevic
|
N/A |
|
Detect Android Malware Variants Using Component Based Topology Graph |
Yibing Zhongyang
,
Zhi Xin
,
Bing Mao
,
Hao Huang
,
Tong Shen
|
N/A |
|
TrustCom Paper Session #11: Network Security |
Shuai Zhao
|
N/A |
|
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation |
Vijay Laxmi
,
Muttukrishnan Rajarajan
,
Mauro Conti
,
Parvez Faruki
,
Ammar Bharmal
,
M.s. Gaur
|
N/A |
|
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally AnalysedUsing CasperFDR |
Keith Mayes
,
Sarah Abughazalah
,
Kostantinos Markantonakis
|
N/A |
|
Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones |
Yang Zhang
,
Zhihui Han
,
Liang Cheng
,
Shuke Zeng
,
Yi Deng
,
Xiaoshan Sun
|
N/A |
|
TrustCom Paper Session #12: Parallel and Distributed Trust Applications |
Li Erran Li
|
N/A |
|
Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager |
Konstantinos Markantonakis
,
Raja Naeem Akram
,
Damien Sauveron
|
N/A |
|
Design and Analysis of a New Feature-Distributed Malware |
Vijay Varadharajan
,
Byungho Min
|
N/A |
|
On Energy Efficient Scheduling and Load Distribution Based on Renewable Energy for Wireless Mesh Network in Disaster Area |
Meng Li
,
Hiroki Nishiyama
,
Yasunori Owada
,
Kiyoshi Hamaguchi
|
N/A |
|
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs |
Hui Xia
,
Jia Yu
,
Zhi-yong Zhang
,
Xiang-guo Cheng
,
Zhen-kuan Pan
|
N/A |
|
BIBRM: A Bayesian Inference Based Road Message Trust Model in Vehicular Ad Hoc Networks |
Yue Wu
,
Guanghao Wang
|
N/A |
|
TrustCom Paper Session #13: Trust Modeling and Algorithms |
Gu Weixi
|
N/A |
|
Convergence of True Cooperations in Bayesian Reputation Game |
Jooyoung Lee
,
Jae C. Oh
|
N/A |
|
Practical Assessment of Biba Integrity for TCG-Enabled Platforms |
Antonio Lioy
,
Roberto Sassu
,
Gianluca Ramunno
|
N/A |
|
SigmoRep: A Robust Reputation Model for Open Collaborative Environments |
Ahmad A. Kardan
,
Reza Salarmehr
,
Azade Farshad
|
N/A |
|
Towards Robust and Effective Trust Management for Security: A Survey |
Tim Muller
,
Yang Liu
,
Dongxia Wang
,
Jie Zhang
|
N/A |
|
Trust Mechanism for Enforcing Compliance to Secondary Data Use Contracts |
Julita Vassileva Vassileva
,
Zeinab Noorian
,
Johnson Iyilade
,
Mohsen Mohkami
|
N/A |
|
TrustCom Paper Session #14: Trust Applications and Systems |
Jooyoung Lee
|
N/A |
|
An Effective Path Load Balancing Mechanism Based on SDN |
Jun Li
,
Xiangqing Chang
,
Yongmao Ren
,
Zexin Zhang
,
Guodong Wang
|
N/A |
|
Integrity Levels: A New Paradigm for Protecting Computing Systems |
Christipher Jenkins
,
Lyndon Pierson
|
N/A |
|
Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments |
Michael Weiß
,
Sascha Wessel
,
Steffen Wagner
,
Roland Hellman
|
N/A |
|
Overhead-Free In-Place Recovery Scheme for XOR-Based Storage Codes |
Ximing Fu
,
Zhiqing Xiao
,
Shenghao Yang
|
N/A |
|
Untrusted User Detection in Microblogs |
Zidan Yu
,
Huiqun Yu
|
N/A |
|
TrustCom Paper Session #15: Identity Management Systems and Mechanism |
Roberto Sassu
|
N/A |
|
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures |
Goichiro Hanaoka
,
Keita Emura
,
Eiji Okamoto
,
Takashi Nishide
,
Yusuke Sakai
,
Sanami Nakagawa
,
Akihisa Kodate
|
N/A |
|
Anonymous Proxy Signature with Restricted Traceability |
Yi Mu
,
Jiannan Wei
,
Guomin Yang
|
N/A |
|
Efficient Traceable Attribute-Based Signature |
Shenglong Ding
,
Yiming Zhao
,
Yuyang Liu
|
N/A |
|
Computation Integrity Measurement Based on Branch Transfer |
Jianming Fu
,
Yan Lin
,
Xu Zhang
,
Pengwei Li
|
N/A |
|
Emergency Key Rollover in DNSSEC |
Zheng Wang
,
Liyuan Xiao
|
N/A |
|
BDSE Session #1: Social Networking with Big Data |
Chenhui Li
|
N/A |
|
Crowd Sensing of Urban Emergency Events Based on Social Media Big Data |
Hui Zhang
,
Zheng Xu
,
Yunhuai Liu
,
Lin Mei
|
N/A |
|
SocAware: A Middleware for Social Applications in Online Social Networks |
Liang Chen
,
Chengcheng Shao
,
Kan Chen
,
Peidong Zhu
|
N/A |
|
Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain |
Conghuan Ye
,
Zenggang Xiong
,
Yaoming Ding
,
Jiping Li
,
Guangwei Wang
,
Xuemin Zhang
,
Kaibing Zhang
|
N/A |
|
A Proposal for a Reference Architecture for Long-Term Archiving, Preservation, and Retrieval of Big Data |
Phillip Viana
,
Liria Sato
|
N/A |
|
Big Data Analyses for Collective Opinion Elicitation in Social Networks |
Yingxu Wang
,
Victor J. Wiebe
|
N/A |
|
BDSE Session #2: Big Data Processing |
Yingxu Wang
|
N/A |
|
Performance Evaluation of the SSD-Based Swap System for Big Data Processing |
Jaehun Lee
,
Sungmin Park
,
Minsoo Ryu
,
Sooyong Kang
|
N/A |
|
A Study on Recursive Neural Network Based Sentiment Classification of Sina Weibo |
Chen Fu
,
Bai Xue
,
Zhan Shaobin
|
N/A |
|
VALID: A Web Framework for Visual Analytics of Large Streaming Data |
Chenhui Li
,
George Baciu
|
N/A |
|
A High Speed Lossless Compression Algorithm Based on CPU and GPU Hybrid Platform |
Hai Jin
,
Bin Zhou
,
Ran Zheng
|
N/A |
|
Picky Partial Least Squares for Feature Selection from Alzheimer's Data |
Torbjorn Wasterlid
,
Li Bai
|
N/A |
|
BDSE Session #3: Big Data Application |
Jisheng Pei
|
N/A |
|
Improved 2DLDA Algorithm and Its Application in Face Recognition |
Dong Wang
,
Shunfang Wang
|
N/A |
|
The Evaluation of Emulab as an Environment for Bio-Informatics Research |
Kyungwoo Kang
,
Yunhee Kang
,
Sungjin Sul
|
N/A |
|
A Evaluation Method for Web Service with Large Numbers of Historical Records |
Hua Wang
,
Lianyong Qi
,
Jiancheng Ni
,
Xiaona Xia
,
Chao Yan
,
Wanli Huang
|
N/A |
|
BIG DATA: Preconditions to Productivity |
Steve Hallman
,
Jasur Rakhimov
,
Michel Plaisent
,
Prosper Bernard
|
N/A |
|
Data Mining Application of Decision Trees for Student Profiling at the Open University of China |
Wilton W.t. Fok
,
Haohua Chen
,
Jiaqu Yi
,
Sizhe Li
,
H.h. Au Yeung
,
Wang Ying
,
Liu Fang
|
N/A |
|
BDSE Session #4: Big Data & Optimization |
Xinlin Zhang
|
N/A |
|
Towards Policy Retrieval for Provenance Based Access Control Model |
Jisheng Pei
,
Xiaojun Ye
|
N/A |
|
SARAH - Statistical Analysis for Resource Allocation in Hadoop |
Bruce Martin
|
N/A |
|
Privacy Aware Non-linear Support Vector Machine for Multi-source Big Data |
Yunmei Lu
,
Piyaphol Phoungphol
,
Yanqing Zhang
|
N/A |
|
Modeling of Data Provenance on Space and Time Based on OPM |
Kang Jiehua
,
Xu Guoyan
|
N/A |
|
Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs |
Wei Gao
,
Mingzhong Wang
,
Liehuang Zhu
,
Xiaoping Zhang
|
N/A |
|
BDSE Session #5: MapReduce for Big Data |
Parinaz Ameri
|
N/A |
|
Aeromancer: A Workflow Manager for Large-Scale MapReduce-Based Scientific Workflows |
Jing Zhang
,
Nabeel Mohamed
,
Nabanita Maji
,
Nataliya Timoshevskaya
,
Wu-chun Feng
|
N/A |
|
MapReduce for Large-Scale Monitor Data Analyses |
Li Zhang
,
Jianwei Ding
,
Yingbo Liu
,
Jianmin Wang
|
N/A |
|
FedLoop: Looping on Federated MapReduce |
Chun-yu Wang
,
Tzu-li Tai
,
Kuan-chieh Huang
,
Tse-en Liu
,
Jyh-biau Chang
,
Ce-kuen Shieh
|
N/A |
|
In-Map/In-Reduce: Concurrent Job Execution in MapReduce |
Muhammad Idris
,
Shujaat Hussain
,
Sungyoung Lee
|
N/A |
|
BDSE Session #6: Big Data Storage |
Tzu-li Tai
|
N/A |
|
An Improved Image File Storage Method Using Data Deduplication |
Zhou Lei
,
Zhaoxin Li
,
Yu Lei
,
Yanling Bi
,
Luokai Hu
,
Wenfeng Shen
|
N/A |
|
HBaseSpatial: A Scalable Spatial Data Storage Based on HBase |
Ningyu Zhang
,
Guozhou Zheng
,
Huajun Chen
,
Jiaoyan Chen
,
Xi Chen
|
N/A |
|
On the Application and Performance of MongoDB for Climate Satellite Data |
Parinaz Ameri
,
Udo Grabowski
,
Jörg Meyer
,
Achim Streit
|
N/A |
|
Research of Provenance Storage in Cloud Computing Environment |
Zhangxuan Luo
,
Guoyan Xu
|
N/A |
|
Data Interface All-iN-A-Place (DIANA) for Big Data |
Theo Dimitrakos
,
Frank Zhigang Wang
,
Na Helian
,
Sining Wu
,
Yuhui Deng
,
Ling Li
,
Rodric Yates
|
N/A |
|
A Load Balancing Strategy of SDN Controller Based on Distributed Decision |
Yuanhao Zhou
,
Mingfa Zhu
,
Limin Xiao
,
Li Ruan
,
Wenbo Duan
,
Deguo Li
,
Rui Liu
,
Mingming Zhu
|
N/A |
|
Modeling Degrees of Fairness for Collaborations |
Florian Volk
,
Sascha Hauke
,
Max Mühlhäuser
,
Maria Pelevina
,
Sheikh Mahbub Habib
|
N/A |
|
Performance Analysis on M2M Communication Network Based on Stochastic Network Calculus |
Zhou Tao
,
Wang Quan
,
Wang Gao-cai
|
N/A |
|
Mining Specification of Insecure Browser Extension Behavior |
Xiaohong Li
,
Guangquan Xu
,
Zhiyong Feng
,
Hongbin Pei
|
N/A |
|
A Novel Public Key Encryption Scheme for Large Image |
Lingjiao Chen
,
Xinji Chen
,
Zhigang Peng
|
N/A |
|
Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN |
Guorui Li
,
Ying Liu
,
Ying Wang
|
N/A |
|
Attacks on Physically-Embedded Data Encryption for Embedded Devices |
Guoqiang Bai
,
Chaohui Du
|
N/A |
|
Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords |
Ron Poet
,
Hani Moaiteq Aljahdali
|
N/A |
|
Escrow: A Large-Scale Web Vulnerability Assessment Tool |
Ryan K.l. Ko
,
Baden Delamore
|
N/A |
|
Personal Data Access Based on Trust Assessment in Mobile Social Networking |
Zheng Yan
,
Raimo Kantola
,
Xueyun Li
|
N/A |
|
Synthesising End-to-End Security Protocols |
Charles Thevathayan
,
Peter Bertok
,
George Fernandez
|
N/A |
|
A Compact Hardware Implementation of SM3 Hash Function |
Tianyong Ao
,
Zhangqing He
,
Jinli Rao
,
Kui Dai
,
Xuecheng Zou
|
N/A |
|
Detection of Android Malicious Apps Based on the Sensitive Behaviors |
Peng Wang
,
Fan Yang
,
Daiyong Quan
,
Lidong Zhai
|
N/A |
|
Digital Trust - Trusted Computing and Beyond: A Position Paper |
Raja Naeem Akram
,
Ryan K.l. Ko
|
N/A |
|
Identifying P2P Network Activities on Encrypted Traffic |
Xiaolei Wang
,
Jie He
,
Yuexiang Yang
|
N/A |
|
Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart Posters |
Sufian Hameed
,
Bilal Hameed
,
Syed Atyab Hussain
,
Waqas Khalid
|
N/A |
|
Survey of Integrity Detection Methods in Internet of Things |
Chaoliang Li
,
Qin Li
,
Guojun Wang
|
N/A |
|
TEEI - A Mobile Security Infrastructure for TEE Integration |
Hongfeng Chai
,
Zhijun Lu
,
Qingyang Meng
,
Jun Wang
,
Xiubang Zhang
,
Zhijian Zhang
|
N/A |
|
A Semantic Knowledge Base Construction Method for Information Security |
Yuangang Yao
,
Xiaoyu Ma
,
Hui Liu
,
Jin Yi
,
Xianghui Zhao
,
Lin Liu
|
N/A |
|
Adding Privacy to Multicast DNS Service Discovery |
Daniel Kaiser
,
Marcel Waldvogel
|
N/A |
|
Encrypted Program Execution |
Dmytro Zhuravlev
,
Ihor Samoilovych
,
Roman Orlovskyi
,
Ievgen Bondarenko
,
Yaroslav Lavrenyuk
|
N/A |
|
Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy Clustering |
Duo Liu
,
Chung-horng Lung
,
Nabil Seddigh
,
Biswajit Nandy
|
N/A |
|
Unified Model for Data Security - A Position Paper |
Raja Naeem Akram
,
Ryan K.l. Ko
|
N/A |
|
A Secure Authentication Protocol for IP-Based Wireless Sensor Communications Using the Location/ID Split Protocol (LISP) |
Ali Raheem
,
Aboubaker Lasebae
,
Jonathan Loo
|
N/A |
|
Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud |
Quang Do
,
Ben Martini
,
Kim-kwang Raymond Choo
|
N/A |
|
Continuous Certification of Non-repudiation in Cloud Storage Services |
Maria Krotsiani
,
George Spanoudakis
|
N/A |
|
JVM-Based Dynamic Attestation in Cloud Computing |
Zhiying Wang
,
Haihe Ba
,
Jiangchun Ren
,
Huaizhe Zhou
|
N/A |
|
Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept |
Ben Martini
,
Kim-kwang Raymond Choo
|
N/A |
|