NSS B

37 papers

YearTitle / Authors
2018A Comprehensive Study of Permission Usage on Android.
Yemian Lu, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan, Wei Guo
2018A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.
Xiaoyan Yang, Han Jiang, Mengbo Hou, Zhihua Zheng, Qiuliang Xu, Kim-Kwang Raymond Choo
2018ATPG Binning and SAT-Based Approach to Hardware Trojan Detection for Safety-Critical Systems.
Animesh Basak Chowdhury, Ansuman Banerjee, Bhargab B. Bhattacharya
2018Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs.
Peter Ince, Joseph K. Liu, Peng Zhang
2018An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs.
Jinhui Liu, Yong Yu, Yanqi Zhao, Jianwei Jia, Shijia Wang
2018An OpenvSwitch Extension for SDN Traceback.
Danni Ren, Wenti Jiang, Huakang Li, Guozi Sun
2018Analysis on the Block Reward of Fork After Withholding (FAW).
Junming Ke, Han Jiang, Xiangfu Song, Shengnan Zhao, Hao Wang, Qiuliang Xu
2018Analyzing the Communication Security Between Smartphones and IoT Based on CORAS.
Motalib Hossain Bhuyan, Nur A. Azad, Weizhi Meng, Christian Damsgaard Jensen
2018Android Malware Detection Methods Based on the Combination of Clustering and Classification.
Zhi Xiong, Ting Guo, Qinkun Zhang, Yu Cheng, Kai Xu
2018Anonymous Attribute-Based Conditional Proxy Re-encryption.
Xianping Mao, Xuefeng Li, Xiaochuan Wu, Chuansheng Wang, Junzuo Lai
2018Burn After Reading: Expunging Execution Footprints of Android Apps.
Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu
2018Context-Aware Failure-Oblivious Computing as a Means of Preventing Buffer Overflows.
Manuel Rigger, Daniel Pekarek, Hanspeter Mössenböck
2018Continuous Authentication on Smartphone by Means of Periocular and Virtual Keystroke.
Silvio Barra, Mirko Marras, Gianni Fenu
2018Creating and Managing Realism in the Next-Generation Cyber Range.
Dragos-George Ionica, Florin Pop, Aniello Castiglione
2018DBAF: Dynamic Binary Analysis Framework and Its Applications.
Ting Chen, Youzheng Feng, Xingwei Lin, Zihao Li, Xiaosong Zhang
2018EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control.
Nesrine Kaaniche, Sana Belguith, Giovanni Russello
2018Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi.
Yunfang Chen, Yihong Zhu, Hao Zhou, Wei Chen, Wei Zhang
2018Fast QuadTree-Based Pose Estimation for Security Applications Using Face Biometrics.
Paola Barra, Carmen Bisogni, Michele Nappi, Stefano Ricciardi
2018LA ^3 : A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices.
Wensheng Zhang, Chuang Wang
2018Multi-user Forward Secure Dynamic Searchable Symmetric Encryption.
Qiao Wang, Yu Guo, Hejiao Huang, Xiaohua Jia
2018Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings
Man Ho Au, Siu-Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak
2018Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices.
Dennis Y. W. Liu, Chi Tsiu Tong, Winnie W. M. Lam
2018Position Paper on Blockchain Technology: Smart Contract and Applications.
Weizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow
2018Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT.
Junbin Fang, Yun-Ju Huang, Frankie Li, Jing Li, Xuan Wang, Yang Xiang
2018PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search.
Francisco-Javier Rodrigo-Ginés, Javier Parra-Arnau, Weizhi Meng, Yu Wang
2018Real-Time IoT Device Activity Detection in Edge Networks.
Ibbad Hafeez, Aaron Yi Ding, Markku Antikainen, Sasu Tarkoma
2018Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks.
Yankang Zhao, Xiaobo Ma, Jianfeng Li, Shui Yu, Wei Li
2018SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.
Ahmed Raad Al-Sudani, Wanlei Zhou, Sheng Wen, Ahmed Al-Mansoori
2018Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain.
Fengjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, Ning Ding
2018Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud.
Lili Xia, Zhangjie Fu
2018Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks.
Jiahao Peng, Xiaobo Ma, Jianfeng Li, Lei Xue, Wenjun Hu
2018Towards Security Authentication for IoT Devices with Lattice-Based ZK.
Jie Cai, Han Jiang, Qiuliang Xu, Guangshi Lv, Minghao Zhao, Hao Wang
2018Understanding the Behaviors of BGP-based DDoS Protection Services.
Tony Miu Tung, Chenxu Wang, Jinhe Wang
2018User Relationship Classification of Facebook Messenger Mobile Data using WEKA.
Amber Umair, Priyadarsi Nanda, Xiangjian He, Kim-Kwang Raymond Choo
2018Using Software Visualization for Supporting the Teaching of MapReduce.
Umberto Ferraro Petrillo
2018Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture.
Yu Li, Ivan Frasure, Ademola Ayodeji Ikusan, Junjie Zhang, Rui Dai
2018Walking on the Cloud: Gait Recognition, a Wearable Solution.
Aniello Castiglione, Kim-Kwang Raymond Choo, Maria De Marsico, Alessio Mecca