SecureComm C

27 papers

YearTitle / Authors
2013(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System.
Mohammed Kaosar, Quazi Mamun, Md. Rafiqul Islam, Xun Yi
2013A Novel Web Tunnel Detection Method Based on Protocol Behaviors.
Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang
2013An Efficient Reconfigurable II-ONB Modular Multiplier.
Miao Li, Liangsheng He, Tongjie Yang, Neng Gao, Zongbin Liu, Qinglong Zhang
2013An e-payment Architecture Ensuring a High Level of Privacy Protection.
Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty, Christophe Rosenberger
2013Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks.
Eirini D. Karapistoli, Anastasios A. Economides
2013Automatic Polymorphic Exploit Generation for Software Vulnerabilities.
Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng
2013Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets.
Xiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu
2013CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones.
Mengjun Xie, Liang Hao, Kenji Yoshigoe, Jiang Bian
2013Clonewise - Detecting Package-Level Clones Using Machine Learning.
Silvio Cesare, Yang Xiang, Jun Zhang
2013Contrasting Permission Patterns between Clean and Malicious Android Applications.
Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Margaret Batten
2013Detection of Android API Call Using Logging Mechanism within Android Framework.
Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai
2013Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation.
Ryan Farley, Xinyuan Wang
2013DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android.
Yousra Aafer, Wenliang Du, Heng Yin
2013Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs.
Quazi Mamun, Md. Rafiqul Islam, Mohammed Kaosar
2013Generic Mediated Encryption.
Ibrahim F. Elashry, Yi Mu, Willy Susilo
2013Integrated Security Architecture for Virtual Machines.
Vijay Varadharajan, Udaya Kiran Tupakula
2013Public-Key Encryption Resilient to Linear Related-Key Attacks.
Hui Cui, Yi Mu, Man Ho Au
2013Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform.
Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan
2013Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege.
Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens
2013Scalable Security Model Generation and Analysis Using k-importance Measures.
Jin B. Hong, Dong Seong Kim
2013Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks.
Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li
2013Securing a Web-Based Anti-counterfeit RFID System.
Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy
2013Security Concerns and Remedy in a Cloud Based E-learning System.
Md. Anwar Hossain Masud, Md. Rafiqul Islam, Jemal H. Abawajy
2013Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers
Tanveer A. Zia, Albert Y. Zomaya, Vijay Varadharajan, Zhuoqing Morley Mao
2013The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems.
Mehari Msgna, Konstantinos Markantonakis, Keith Mayes
2013Unveiling Privacy Setting Breaches in Online Social Networks.
Xin Ruan, Chuan Yue, Haining Wang
2013VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing.
Jun Jiang, Meining Nie, Purui Su, Dengguo Feng