SecureComm C

50 papers

YearTitle / Authors
2017Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings
Robert H. Deng, Jian Weng, Kui Ren, Vinod Yegneswaran
2016A Behavioral Biometrics Based Approach to Online Gender Classification.
Nicolas Van Balen, Christopher T. Ball, Haining Wang
2016A Multi-layer Model to Detect Spam Email at Client Side.
Simi Kamini Bajaj
2016A Multi-protocol Security Framework to Support Internet of Things.
Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy
2016A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem.
Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan
2016A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite Field.
Hailiang Fu, Guoqiang Bai, Xingjun Wu
2016Access Control Management for Secure Cloud Storage.
Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati
2016Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem.
Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu
2016AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management.
Zhengyang Qu, Guanyu Guo, Zhengyue Shao, Vaibhav Rastogi, Yan Chen, Hao Chen, Wangjun Hong
2016Architecture Support for Controllable VMI on Untrusted Cloud.
Jiangyong Shi, Yuexiang Yang
2016Attribute-Based Encryption with Granular Revocation.
Hui Cui, Robert H. Deng, Xuhua Ding, Yingjiu Li
2016Attribution of Economic Denial of Sustainability Attacks in Public Clouds.
Mohammad Karami, Songqing Chen
2016BinDNN: Resilient Function Matching Using Deep Learning.
Nathaniel Lageman, Eric D. Kilmer, Robert J. Walls, Patrick D. McDaniel
2016Biometric Authentication Using Facial Recognition.
Mozammel Chowdhury, Junbin Gao, Rafiqul Islam
2016Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications.
Jianbing Ni, Kuan Zhang, Xiaodong Lin, Yong Yu, Xuemin (Sherman) Shen
2016Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling.
Yongfeng Li, Jinbin Ouyang, Shanqing Guo, Bing Mao
2016DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware.
Zhiqiang Li, Lichao Sun, Qiben Yan, Witawas Srisa-an, Zhenxiang Chen
2016Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection.
Ivan Homoliak, Martin Teknos, Maros Barabas, Petr Hanácek
2016Exploiting Android System Services Through Bypassing Service Helpers.
Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li, Purui Su
2016Extracting More Entropy for TRNGs Based on Coherent Sampling.
Jing Yang, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing
2016FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs.
Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Lingchen Zhang
2016Faulty Node Repair and Dynamically Spawned Black Hole Search.
Wei Shi, Mengfei Peng, Jean-Pierre Corriveau, William Lee Croft
2016GreatEatlon: Fast, Static Detection of Mobile Ransomware.
Chengyu Zheng, Nicola Dellarocca, Niccolò Andronio, Stefano Zanero, Federico Maggi
2016H-Binder: A Hardened Binder Framework on Android Systems.
Dong Shen, Zhangkai Zhang, Xuhua Ding, Zhoujun Li, Robert H. Deng
2016IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data Leakage.
Tianjun Wu, Yuexiang Yang
2016Impact of Environment on Branch Transfer of Software.
Jianming Fu, Yan Lin, Xu Zhang
2016Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications.
Sang-Yoon Chang, Shaoying Cai, Hwajeong Seo, Yih-Chun Hu
2016Modeling User Browsing Activity for Application Layer DDoS Attack Detection.
TungNgai Miu, Chenxu Wang, Daniel Xiapu Luo, Jinhe Wang
2016POSTER: A Framework for IoT Reprogramming.
Nian Xue, Lulu Liang, Jie Zhang, Xin Huang
2016POSTER: A Novel Wavelet Denoising Method Based on Robust Principal Component Analysis in Side Channel Attacks.
Juan Ai, Zhu Wang, Xinping Zhou, Changhai Ou
2016POSTER: Location Privacy Using Homomorphic Encryption.
Peizhao Hu, Siyu Zhu
2016POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis.
Fei Peng, Le Qin, Min Long
2016POSTER: Security Analysis of Personal Unmanned Aerial Vehicles.
Peng Chen, Hao Chen
2016Parallel and Dynamic Structured Encryption.
Russell W. F. Lai, Sherman S. M. Chow
2016Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy.
Fidel Ikundi, Rafiqul Islam, Peter White
2016Privacy Preserving Data Classification Using Inner Product Encryption.
Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey
2016Privacy-Preserving Multi-pattern Matching.
Tao Zhang, Xiuhua Wang, Sherman S. M. Chow
2016SDNGuardian: Secure Your REST NBIs with API-Grained Permission Checking System.
Kailei Ren, Qiang Wei, Zehui Wu, Qingxian Wang
2016SQLite Forensic Analysis Based on WAL.
Yao Liu, Ming Xu, Jian Xu, Ning Zheng, Xiaodong Lin
2016SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy.
Qian Wang, Xiao Lu, Yan Zhang, Zhibo Wang, Zhan Qin, Kui Ren
2016Secure IoT Using Weighted Signed Graphs.
Pinaki Sarkar, Morshed Uddin Chowdhury
2016Secure Keyboards Against Motion Based Keystroke Inference Attack.
Shaoyong Du, Yue Gao, Jingyu Hua, Sheng Zhong
2016Security Analysis of Vendor Customized Code in Firmware of Embedded Device.
Muqing Liu, Yuanyuan Zhang, Juanru Li, Junliang Shu, Dawu Gu
2016TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated Environment.
Yanhong He, Xianyi Zheng, Ziyuan Zhu, Gang Shi
2016Tinder Me Softly - How Safe Are You Really on Tinder?
Mark J. Carman, Kim-Kwang Raymond Choo
2016Tokenisation Blacklisting Using Linkable Group Signatures.
Assad Umar, Iakovos Gurulian, Keith Mayes, Konstantinos Markantonakis
2016TruSDN: Bootstrapping Trust in Cloud Network Infrastructure.
Nicolae Paladi, Christian Gehrmann
2016Unique on the Road: Re-identification of Vehicular Location-Based Metadata.
Zheng Xiao, Cheng Wang, Weili Han, Changjun Jiang
2016Website Forensic Investigation to Identify Evidence and Impact of Compromise.
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto
2016ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments.
Lorena González-Manzano, José María de Fuentes, Kim-Kwang Raymond Choo