


default search action
13th TrustCom 2014: Beijing, China
- 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-6513-7

Privacy in Mobile & Wireless Networks
- Fucai Zhu, Xingyang He, Shuang Wang, Jian Xu, Mingwei Wang, Lina Wu:

A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data. 1-8 - Bo Yang, Dengguo Feng, Yu Qin:

A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform. 9-17 - Yao Cheng, Chang Xu, Yi Yang, Lingyun Ying, Purui Su, Dengguo Feng:

Automated User Profiling in Location-Based Mobile Messaging Applications. 18-26 - Su Mon Kywe, Christopher B. Landis

, Yutong Pei, Justin Satterfield, Yuan Tian, Patrick Tague
:
PrivateDroid: Private Browsing Mode for Android. 27-36 - Ashar Javed, Christian Merz

, Jörg Schwenk:
TTPCookie: Flexible Third-Party Cookie Management for Increasing Online Privacy. 37-44
Privacy and Trust in Social Networks
- Mu Yang, Yijun Yu

, Arosha K. Bandara
, Bashar Nuseibeh
:
Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit. 45-52 - Tommi Meskanen, Valtteri Niemi, Noora Nieminen:

Garbling in Reverse Order. 53-60 - Peili Li, Haixia Xu, Jiaqi Hong:

Private Outsourcing of Polynomial Functions. 61-68 - Kang Zhao, Li Pan:

A Machine Learning Based Trust Evaluation Framework for Online Social Networks. 69-74 - Yu Bai, Gang Yin, Huaimin Wang:

Multi-dimensions of Developer Trustworthiness Assessment in OSS Community. 75-81
Security Algorithms
- Mohammed A. Ambusaidi, Xiangjian He

, Zhiyuan Tan
, Priyadarsi Nanda, Liang Fu Lu, Upasana T. Nagar:
A Novel Feature Selection Approach for Intrusion Detection Data Classification. 82-89 - Ziyu Wang, Jiahai Yang, Fuliang Li:

An On-Line Anomaly Detection Method Based on a New Stationary Metric - Entropy-Ratio. 90-97 - Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey:

Reaching Agreement in Security Policy Negotiation. 98-105 - Yunxi Zhang

, Darren Mundy:
Remembrance of Local Information Status for Enforcing Robustness of Policy-Exchanged Strategies for Trust Negotiation. 106-113 - Fábio Borges

, Leonardo A. Martucci, Filipe Beato, Max Mühlhäuser
:
Secure and Privacy-Friendly Public Key Generation and Certification. 114-121
Security Applications
- Thawatchai Chomsiri

, Xiangjian He
, Priyadarsi Nanda, Zhiyuan Tan
:
A Stateful Mechanism for the Tree-Rule Firewall. 122-129 - Md. Sadek Ferdous

, Ron Poet:
CAFS: A Framework for Context-Aware Federated Services. 130-139 - Yong Ho Hwang, Jae Woo Seo, Il Joo Kim:

Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services. 140-147 - Shuai Liu, Lei Ju, Xiaojun Cai, Zhiping Jia, Zhiyong Zhang:

High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields. 148-155 - Chongxian Guo, Huaqiang Xu, Lei Ju, Zhiping Jia, Jihai Xu:

A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks. 156-163
Security Systems
- Günter Fahrnberger

:
SIMS: A Comprehensive Approach for a Secure Instant Messaging Sifter. 164-173 - Wenjuan Li

, Weizhi Meng
, Zhiyuan Tan
, Yang Xiang
:
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. 174-181 - Zhenwei Zhao, Guoqiang Bai:

Ultra High-Speed SM2 ASIC Implementation. 182-188 - Yu Zhou

, Yongzheng Zhang, Jun Xiao, Yipeng Wang, Weiyao Lin
:
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features. 189-196 - Chunqiang Hu, Fan Zhang, Tao Xiang, Hongjuan Li

, Xiao Xiao, Guilin Huang:
A Practically Optimized Implementation of Attribute Based Cryptosystems. 197-204
Authentication
- Mian Ahmad Jan

, Priyadarsi Nanda, Xiangjian He
, Zhiyuan Tan
, Ren Ping Liu:
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. 205-211 - Licai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang:

Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs. 212-220 - Uthpala Subodhani Premarathne, Ibrahim Khalil

:
Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems. 221-228 - Weixi Gu, Zheng Yang, Longfei Shangguan, Xiaoyu Ji, Yiyang Zhao:

ToAuth: Towards Automatic Near Field Authentication for Smartphones. 229-236 - Xiaoming Wang, Heyou Cheng, Ruihua Zhang:

One Kind of Cross-Domain DAA Scheme from Bilinear Mapping. 237-243
Attack & Defense
- Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Dengguo Feng:

Long Term Tracking and Characterization of P2P Botnet. 244-251 - Shixiong Yao

, Jing Chen, Ruiying Du, Lan Deng, Chiheng Wang:
A Survey of Security Network Coding toward Various Attacks. 252-259 - Xuerui Pan, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang:

Defensor: Lightweight and Efficient Security-Enhanced Framework for Android. 260-267 - Hui Cui

, Yi Mu, Man Ho Au
:
Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited. 268-275 - Ya Tan, Jizeng Wei, Wei Guo:

The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack. 276-283
Security and Trust in Cloud Computing (1)
- Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri

:
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security. 284-291 - Zhiquan Lv, Jialin Chi, Min Zhang

, Dengguo Feng:
Efficiently Attribute-Based Access Control for Mobile Cloud Storage System. 292-299 - Liang Deng, Qingkai Zeng, Weiguang Wang, Yao Liu:

EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor. 300-309 - Yu Zhang, Jing Chen, Ruiying Du, Lan Deng, Yang Xiang

, Qing Zhou:
FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. 310-319 - Kao Zhao, Hai Jin, Deqing Zou, Weiqi Dai:

ONHelp: Components in Building Secure Cloud Based on OpenNebula. 320-327
Security and Trust in Cloud Computing (2)
- Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng:

Proofs of Ownership and Retrievability in Cloud Storage. 328-335 - Nihal Balani, Sushmita Ruj:

Temporal Access Control with User Revocation for Cloud Data. 336-343 - Udaya Kiran Tupakula, Vijay Varadharajan

:
Trust Enhanced Cloud Security for Healthcare Services. 344-351 - Nicolae Paladi, Mudassar Aslam

, Christian Gehrmann:
Trusted Geolocation-Aware Data Placement in Infrastructure Clouds. 352-360 - Yuanlong Cao

, Jianfeng Guan, Changqiao Xu, Wei Quan, Hongke Zhang:
Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation Context. 361-369
Security in Mobile Networks
- Julian Schütte

, Dennis Titze, José María de Fuentes
:
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps. 370-379 - Shuai Zhao, Xiaohong Li, Guangquan Xu, Lei Zhang, Zhiyong Feng:

Attack Tree Based Android Malware Detection with Hybrid Analysis. 380-387 - Li Li, Alexandre Bartel, Jacques Klein

, Yves Le Traon
:
Automatically Exploiting Potential Component Leaks in Android Applications. 388-397 - Kamran Zaidi, Milos Milojevic, Veselin Rakocevic, Muttukrishnan Rajarajan:

Data-centric Rogue Node Detection in VANETs. 398-405 - Tong Shen, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang:

Detect Android Malware Variants Using Component Based Topology Graph. 406-413
Network Security
- Parvez Faruki, Ammar Bharmal, Vijay Laxmi

, Manoj Singh Gaur, Mauro Conti
, Muttukrishnan Rajarajan:
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation. 414-421 - Sarah Abughazalah, Konstantinos Markantonakis

, Keith Mayes:
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR. 422-431 - Zhihui Han, Liang Cheng, Yang Zhang, Shuke Zeng, Yi Deng, Xiaoshan Sun:

Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones. 432-439 - Charles Thevathayan, Peter Bertók

, George Fernandez:
Synthesising End-to-End Security Protocols. 440-447
Parallel and Distributed Trust Applications
- Raja Naeem Akram

, Konstantinos Markantonakis
, Damien Sauveron:
Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager. 448-456 - Byungho Min, Vijay Varadharajan

:
Design and Analysis of a New Feature-Distributed Malware. 457-464 - Meng Li, Hiroki Nishiyama

, Yasunori Owada, Kiyoshi Hamaguchi:
On Energy Efficient Scheduling and Load Distribution Based on Renewable Energy for Wireless Mesh Network in Disaster Area. 465-472 - Hui Xia, Jia Yu, Zhiyong Zhang, Xiangguo Cheng, Zhenkuan Pan:

Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs. 473-480 - Guanghao Wang, Yue Wu:

BIBRM: A Bayesian Inference Based Road Message Trust Model in Vehicular Ad Hoc Networks. 481-486
Trust Modeling and Algorithms
- JooYoung Lee

, Jae C. Oh
:
Convergence of True Cooperations in Bayesian Reputation Game. 487-494 - Roberto Sassu, Gianluca Ramunno, Antonio Lioy

:
Practical Assessment of Biba Integrity for TCG-Enabled Platforms. 495-504 - Ahmad A. Kardan, Reza Salarmehr, Azade Farshad

:
SigmoRep: A Robust Reputation Model for Open Collaborative Environments. 505-510 - Dongxia Wang, Tim Muller, Yang Liu

, Jie Zhang:
Towards Robust and Effective Trust Management for Security: A Survey. 511-518 - Zeinab Noorian, Johnson Iyilade, Mohsen Mohkami, Julita Vassileva

:
Trust Mechanism for Enforcing Compliance to Secondary Data Use Contracts. 519-526
Trust Applications and Systems
- Jun Li, Xiangqing Chang, Yongmao Ren

, Zexin Zhang, Guodong Wang:
An Effective Path Load Balancing Mechanism Based on SDN. 527-533 - Christipher Jenkins, Lyndon Pierson:

Integrity Levels: A New Paradigm for Protecting Computing Systems. 534-543 - Michael Weiß

, Steffen Wagner, Roland Hellman, Sascha Wessel:
Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments. 544-551 - Ximing Fu

, Zhiqing Xiao, Shenghao Yang:
Overhead-Free In-Place Recovery Scheme for XOR-Based Storage Codes. 552-557 - Zidan Yu, Huiqun Yu:

Untrusted User Detection in Microblogs. 558-564
Identity Management Systems and Mechanism
- Sanami Nakagawa, Keita Emura

, Goichiro Hanaoka
, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai
:
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures. 565-574 - Jiannan Wei, Guomin Yang

, Yi Mu:
Anonymous Proxy Signature with Restricted Traceability. 575-581 - Shenglong Ding, Yiming Zhao, Yuyang Liu:

Efficient Traceable Attribute-Based Signature. 582-589 - Jianming Fu, Yan Lin, Xu Zhang, Pengwei Li:

Computation Integrity Measurement Based on Branch Transfer. 590-597 - Zheng Wang, Liyuan Xiao:

Emergency Key Rollover in DNSSEC. 598-604
Social Networking with Big Data
- Zheng Xu, Hui Zhang, Yunhuai Liu, Lin Mei:

Crowd Sensing of Urban Emergency Events Based on Social Media Big Data. 605-610 - Liang Chen, Kan Chen, Chengcheng Shao

, Peidong Zhu:
SocAware: A Middleware for Social Applications in Online Social Networks. 611-615 - Conghuan Ye

, Zenggang Xiong, Yaoming Ding, Jiping Li, Guangwei Wang, Xuemin Zhang, Kaibing Zhang:
Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain. 616-621 - Phillip Viana, Liria M. Sato

:
A Proposal for a Reference Architecture for Long-Term Archiving, Preservation, and Retrieval of Big Data. 622-629 - Yingxu Wang, Victor J. Wiebe:

Big Data Analyses for Collective Opinion Elicitation in Social Networks. 630-637
Big Data Storage
- Zhou Lei, Zhaoxin Li, Yu Lei, Yanling Bi, Luokai Hu, Wenfeng Shen:

An Improved Image File Storage Method Using Data Deduplication. 638-643 - Ningyu Zhang, Guozhou Zheng, Huajun Chen, Jiaoyan Chen, Xi Chen:

HBaseSpatial: A Scalable Spatial Data Storage Based on HBase. 644-651 - Parinaz Ameri, Udo Grabowski, Jörg Meyer

, Achim Streit
:
On the Application and Performance of MongoDB for Climate Satellite Data. 652-659 - Zhangxuan Luo, Guoyan Xu:

Research of Provenance Storage in Cloud Computing Environment. 660-664 - Frank Zhigang Wang, Theo Dimitrakos

, Na Helian
, Sining Wu, Yuhui Deng, Ling Li, Rodric Yates:
Data Interface All-iN-A-Place (DIANA) for Big Data. 665-672
Big Data Processing
- Jaehun Lee, Sungmin Park, Minsoo Ryu, Sooyong Kang:

Performance Evaluation of the SSD-Based Swap System for Big Data Processing. 673-680 - Chen Fu, Bai Xue, Zhan Shaobin:

A Study on Recursive Neural Network Based Sentiment Classification of Sina Weibo. 681-685 - Chenhui Li, George Baciu

:
VALID: A Web Framework for Visual Analytics of Large Streaming Data. 686-692 - Bin Zhou, Hai Jin, Ran Zheng:

A High Speed Lossless Compression Algorithm Based on CPU and GPU Hybrid Platform. 693-698
Big Data Application
- Dong Wang, Shunfang Wang

:
Improved 2DLDA Algorithm and Its Application in Face Recognition. 707-713 - Kyungwoo Kang, Yunhee Kang

, Sungjin Sul:
The Evaluation of Emulab as an Environment for Bio-Informatics Research. 714-720 - Lianyong Qi

, Jiancheng Ni, Xiaona Xia, Chao Yan, Hua Wang, Wanli Huang:
A Evaluation Method for Web Service with Large Numbers of Historical Records. 721-726 - Steve Hallman, Jasur Rakhimov, Michel Plaisent, Prosper Bernard:

BIG DATA: Preconditions to Productivity. 727-731 - Wilton W. T. Fok, Haohua Chen, Jiaqu Yi, Sizhe Li, H. H. Au Yeung, Wang Ying, Liu Fang:

Data Mining Application of Decision Trees for Student Profiling at the Open University of China. 732-738
MapReduce for Big Data
- Mohamed Nabeel, Nabanita Maji, Jing Zhang, Nataliya Timoshevskaya, Wu-chun Feng:

Aeromancer: A Workflow Manager for Large-Scale MapReduce-Based Scientific Workflows. 739-746 - Jianwei Ding, Yingbo Liu, Li Zhang, Jianmin Wang

:
MapReduce for Large-Scale Monitor Data Analyses. 747-754 - Chunyu Wang

, Tzu-Li Tai, Kuan-Chieh Huang, Tse-En Liu, Jyh-Biau Chang, Ce-Kuen Shieh:
FedLoop: Looping on Federated MapReduce. 755-762 - Muhammad Idris

, Shujaat Hussain
, Sungyoung Lee:
In-Map/In-Reduce: Concurrent Job Execution in MapReduce. 763-768
Big Data & Optimization
- Jisheng Pei, Xiaojun Ye:

Towards Policy Retrieval for Provenance Based Access Control Model. 769-776 - Bruce Martin:

SARAH - Statistical Analysis for Resource Allocation in Hadoop. 777-782 - Yunmei Lu, Piyaphol Phoungphol, Yanqing Zhang:

Privacy Aware Non-linear Support Vector Machine for Multi-source Big Data. 783-789 - Jiehua Kang, Guoyan Xu:

Modeling of Data Provenance on Space and Time Based on OPM. 790-794 - Wei Gao, Mingzhong Wang

, Liehuang Zhu, Xiaoping Zhang:
Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs. 795-802
Future Internet and Network Security
- Yuangang Yao, Xiaoyu Ma, Hui Liu, Jin Yi, Xianghui Zhao, Lin Liu:

A Semantic Knowledge Base Construction Method for Information Security. 803-808 - Daniel Kaiser, Marcel Waldvogel:

Adding Privacy to Multicast DNS Service Discovery. 809-816 - Dmytro Zhuravlev, Ihor Samoilovych

, Roman Orlovskyi, Ievgen V. Bondarenko
, Yaroslav Lavrenyuk
:
Encrypted Program Execution. 817-822 - Duo Liu, Chung-Horng Lung, Nabil Seddigh, Biswajit Nandy:

Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy Clustering. 823-830 - Raja Naeem Akram

, Ryan K. L. Ko
:
Unified Model for Data Security - A Position Paper. 831-839 - Ali Hussein Raheem, Aboubaker Lasebae, Jonathan Loo

:
A Secure Authentication Protocol for IP-Based Wireless Sensor Communications Using the Location/ID Split Protocol (LISP). 840-845
Network Optimization and Performance Evaluation
- Tianyong Ao, Zhangqing He, Jinli Rao, Kui Dai, Xuecheng Zou:

A Compact Hardware Implementation of SM3 Hash Function. 846-850 - Yuanhao Zhou, Mingfa Zhu, Limin Xiao, Li Ruan, Wenbo Duan, Deguo Li, Rui Liu, Mingming Zhu:

A Load Balancing Strategy of SDN Controller Based on Distributed Decision. 851-856 - Florian Volk, Maria Pelevina, Sheikh Mahbub Habib

, Sascha Hauke, Max Mühlhäuser
:
Modeling Degrees of Fairness for Collaborations. 857-864 - Tao Zhou, Quan Wang, Gao-Cai Wang:

Performance Analysis on M2M Communication Network Based on Stochastic Network Calculus. 865-870 - Hongbin Pei, Xiaohong Li, Guangquan Xu, Zhiyong Feng:

Mining Specification of Insecure Browser Extension Behavior. 871-876
Security, Privacy, and Anonymity in Internet of Things
- Daiyong Quan, Lidong Zhai, Fan Yang

, Peng Wang:
Detection of Android Malicious Apps Based on the Sensitive Behaviors. 877-883 - Raja Naeem Akram

, Ryan K. L. Ko
:
Digital Trust - Trusted Computing and Beyond: A Position Paper. 884-892 - Xiaolei Wang, Jie He, Yuexiang Yang:

Identifying P2P Network Activities on Encrypted Traffic. 893-899 - Sufian Hameed

, Bilal Hameed, Syed Atyab Hussain, Waqas Khalid:
Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart Posters. 900-905 - Chaoliang Li, Qin Li, Guojun Wang:

Survey of Integrity Detection Methods in Internet of Things. 906-913 - Hongfeng Chai, Zhijun Lu, Qingyang Meng, Jun Wang, Xiubang Zhang, Zhijian Zhang:

TEEI - A Mobile Security Infrastructure for TEE Integration. 914-920
Cloud Computing
- Maria Krotsiani, George Spanoudakis:

Continuous Certification of Non-repudiation in Cloud Storage Services. 921-928 - Haihe Ba, Zhiying Wang, Jiangchun Ren, Huaizhe Zhou:

JVM-Based Dynamic Attestation in Cloud Computing. 929-934 - Ben Martini, Kim-Kwang Raymond Choo

:
Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept. 935-942 - Hao Zhang, Lei Zhao, Lai Xu, Lina Wang, Deming Wu:

vPatcher: VMI-Based Transparent Data Patching to Secure Software in the Cloud. 943-948 - Quang Do, Ben Martini, Kim-Kwang Raymond Choo

:
Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud. 949-954
UbiSafe Computing
- Lingjiao Chen, Xinji Chen, Zhigang Peng:

A Novel Public Key Encryption Scheme for Large Image. 955-960 - Guorui Li, Ying Liu, Ying Wang:

Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN. 961-966 - Chaohui Du, Guoqiang Bai:

Attacks on Physically-Embedded Data Encryption for Embedded Devices. 967-972 - Hani Moaiteq Aljahdali, Ron Poet:

Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords. 973-982 - Baden Delamore, Ryan K. L. Ko

:
Escrow: A Large-Scale Web Vulnerability Assessment Tool. 983-988 - Zheng Yan

, Xueyun Li, Raimo Kantola:
Personal Data Access Based on Trust Assessment in Mobile Social Networking. 989-994

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














