TrustCom B

292 papers

YearTitle / Authors
201211th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012
Geyong Min, Yulei Wu, Lei (Chris) Liu, Xiaolong Jin, Stephen A. Jarvis, Ahmed Yassin Al-Dubai
2012A Block-Based Still Image Coder for Parallel Computing.
Yu-Lin Wang, Chia-Te Liao, Alvin Wen-Yu Su
2012A Case Based Reasoning Framework for Improving the Trustworthiness of Digital Forensic Investigations.
Graeme Horsman, Christopher Laing, Paul Vickers
2012A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive Environments.
Chi Lin, Guowei Wu, Lin Yao, Zuosong Liu
2012A Comprehensive Ontology for Knowledge Representation in the Internet of Things.
Wei Wang, Suparna De, Ralf Tönjes, Eike Steffen Reetz, Klaus Moessner
2012A Covert Timing Channel Based on Fountain Codes.
Rennie Archibald, Dipak Ghosal
2012A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks.
Sadie Creese, Michael Goldsmith, Jason R. C. Nurse, Elizabeth Phillips
2012A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication.
Wencheng Yang, Jiankun Hu, Song Wang
2012A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET.
Qiwei Lu, Yan Xiong, Wenchao Huang, Xudong Gong, Fuyou Miao
2012A Dynamic Bandwidth Allocation Algorithm for a Multi-sink Wireless Sensor Network Converged with a Passive Optical Network.
Zhenfei Wang, Kun Yang, David K. Hunter
2012A Dynamic Cache Partitioning Mechanism under Virtualization Environment.
Xiaolin Wang, Xiang Wen, Yechen Li, Yingwei Luo, Xiaoming Li, Zhenlin Wang
2012A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks.
Ramzi Bellazreg, Noureddine Boudriga, Mohamed Hamdi
2012A Formally Verified Device Authentication Protocol Using Casper/FDR.
Mahdi Aiash, Glenford E. Mapp, Raphael C.-W. Phan, Aboubaker Lasebae, Jonathan Loo
2012A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms.
Martin Pirker, Daniel Slamanig
2012A Generalized Stereotypical Trust Model.
Hui Fang, Jie Zhang, Murat Sensoy, Nadia Magnenat-Thalmann
2012A HiperLAN/2 Based MAC Protocol for Efficient Vehicle-to-Infrastructure Communication Using Directional Wireless Mesh Backbone.
Sandip Chakraborty, Sukumar Nandi
2012A Hybrid Authentication and Key Establishment Scheme for WBAN.
Wassim Drira, Éric Renault, Djamal Zeghlache
2012A Hybrid Key Management Protocol for Wireless Sensor Networks.
Musfiq Rahman, Srinivas Sampalli
2012A Hybrid MPI/OpenMP Model Based on DDM for Large-Scale Partial Differential Equations.
Dandan Li, Xiaohui Ji, Zhangbing Zhou, Qun Wang
2012A Hybrid Ontological and Temporal Approach for Composite Activity Modelling.
George Okeyo, Liming Chen, Hui Wang, Roy Sterritt
2012A Layered Malware Detection Model Using VMM.
Lin Chen, Bo Liu, Huaping Hu, Qianbing Zheng
2012A Light-Weight Commodity Integrity Detection Algorithm Based on Chinese Remainder Theorem.
Chaoliang Li, Guojun Wang
2012A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor Networks.
Muhammad Bashir Abdullahi, Guojun Wang
2012A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example.
Stefan Hofbauer, Kristian Beckers, Gerald Quirchmayr, Christoph Sorge
2012A Model Driven Infrastructure for Context-Awareness Mobile Assessment Personalization.
Ahlem Harchay, Lilia Cheniti-Belcadhi, Rafik Braham
2012A Multi-agent Immunologically-inspired Model for Critical Information Infrastructure Protection - An Immunologically-inspired Conceptual Model for Security on the Power Grid.
Sheu M. A. Mavee, Elizabeth Marie Ehlers
2012A Multi-tunnel VPN Concurrent System for New Generation Network Based on User Space.
Yan Shen, Qifei Zhang, Lingdi Ping, Yan-Fei Wang, Wenjuan Li
2012A Multivariate Classification Algorithm for Malicious Node Detection in Large-Scale WSNs.
Hongjun Dai, Huabo Liu, Zhiping Jia, Tianzhou Chen
2012A New Efficient Property-Based Attestation Protocol Based on Elliptic Curves.
Xiaobo Chu, Qin Yu
2012A Novel Scoring Model to Detect Potential Malicious Web Pages.
Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk
2012A Novel System for Evaluating Website Using Link Analysis.
Xiaoqiang Li, Yun Mi, Yingwei Jin, Heng Qi, Zhiyang Li
2012A Practical Network-Based Intrusion Detection and Prevention System.
Naruemon Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, Chalermpol Charnsripinyo
2012A Privacy Preserving Application Acquisition Protocol.
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
2012A Privacy Preserving Scalable Architecture for Collaborative Event Correlation.
Hani Qusa, Roberto Baldoni, Roberto Beraldi
2012A Quantum TITO Diversity Transmission Scheme with Quantum Teleportation of Non-maximally Entangled Bell State.
Jinjing Shi, Ronghua Shi, Ying Guo, Moon Ho Lee
2012A Quantum-classical Hybrid Architecture for Security Algorithms Acceleration.
Rafael Trapani Possignolo, Cíntia B. Margi
2012A Rapid Certification Protocol from Bilinear Pairings for Vehicular Ad Hoc Networks.
Xiaojun Li, Liangmin Wang
2012A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays.
Quang-Anh Tran, Frank Jiang, Jiankun Hu
2012A Reception Based Node Selection Protocol for Multi-hop Routing in Vehicular Ad-hoc Networks.
Muhammad Bilal, M. O. Hussain, Pauline M. L. Chan
2012A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways.
Mahmoud Hashem Eiza, Qiang Ni
2012A Round Robin Load Balancing and Redundancy Protocol for Network Routers.
Sarah Abdallah, Elias Najjar, Ayman I. Kayssi
2012A Scalable Anonymity Scheme Based on DHT Distributed Inquiry.
Wentao Wang, Yuewu Wang, Jiwu Jing, Zhongwen Zhang
2012A Secure Distributed File System Based on Revised Blakley's Secret Sharing Scheme.
Su Chen, Yi Chen, Hai Jiang, Laurence Tianruo Yang, Kuan-Ching Li
2012A Secure Node Localization Method Based on the Congruity of Time in Wireless Sensor Networks.
Yongzhao Zhan, Chunxia Li, Xinsheng Wang, Yuan Zhou, Lu Liu, Hussain Al-Aqrabi
2012A Taxonomy of Trust and Reputation System Attacks.
David Fraga, Zorana Bankovic, José Manuel Moya
2012A Temporalised Belief Logic for Reasoning about Authentication Protocols.
Ji Ma, Klaus-Dieter Schewe
2012A Text Representation Method Based on Harmonic Series.
Xue Chen, Chao Wu
2012A Trajectory Model to Deal with Transmission Failures.
Francisco Javier Moreno Arboleda, Sebastián Múnera, Luis Munoz
2012A Trust Model Based on P2P Trust Models for Secure Global Grids.
Damandeep Kaur, Jyotsna Sengupta
2012A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks.
Joydeep Chandra, Ingo Scholtes, Niloy Ganguly, Frank Schweitzer
2012AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs.
Longxiang Gao, Ming Li, Tianqing Zhu, Alessio Bonti, Wanlei Zhou, Shui Yu
2012AR Teleport: Digital Reconstruction of Historical and Cultural-Heritage Sites Using Mobile Augmented Reality.
Jiyoung Kang
2012Actualization of a Course Library through Influential Twitter Knowledge.
Malinka Ivanova, Tatyana Ivanova
2012Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment.
Yuxin Meng, Wenjuan Li
2012Adaptive Trust Management Mechanism for Cognitive Radio Networks.
Qingqi Pei, Lei Li, Hongning Li, Beibei Yuan
2012An Active Detection Mechanism for Detecting ICMP Based Attacks.
Ferdous A. Barbhuiya, S. Roopa, Ritesh Ratti, Santosh Biswas, Sukumar Nandi
2012An Analysis of Peer to Peer Protocols for Massively Multiplayer Online Games.
Andrew Jones, Lu Liu, Nick Antonopoulos, Weining Liu
2012An Analytical Model on the Propagation of Modern Email Worms.
Wei Zhou, Sheng Wen, Yini Wang, Yang Xiang, Wanlei Zhou
2012An Ant Colony Optimization Algorithm for Overlay Backbone Multicast Routing in Content Delivery Networks.
Gang Liu, Hua Wang, Hong Zhang
2012An Architecture for the Enforcement of Privacy and Security Requirements in Internet-Centric Services.
Yair Diaz-Tellez, Eliane L. Bodanese, Srijith K. Nair, Theo Dimitrakos
2012An Area-Based Approach for Node Replica Detection in Wireless Sensor Networks.
Wibhada Naruephiphat, Yusheng Ji, Chalermpol Charnsripinyo
2012An Attribute-Based Encryption Scheme Secure against Malicious KGC.
Guoyan Zhang, Lei Liu, Yang Liu
2012An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETs.
Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro
2012An Efficient Detecting Communities Algorithm with Self-Adapted Fuzzy C-Means Clustering in Complex Networks.
Jianzhi Jin, Yuhua Liu, Laurence Tianruo Yang, Naixue Xiong, Fang Hu
2012An Efficient Distributed Transactional Memory System.
Xin Peng, Xiaofei Liao, Hai Jin, Xuepeng Fan, Xuping Tu, Linchen Yu
2012An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET.
Pramod Kumar Singh, Govind Sharma
2012An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs.
Yu-Chih Wei, Yi-Ming Chen
2012An Identity Authentication Mechanism Based on Timing Covert Channel.
Yanan Sun, Xiaohong Guan, Ting Liu, Yu Qu
2012An Integrated Mobile System for Long-Term Aerobic Activity Monitoring and Support in Daily Life.
Attila Reiss, Didier Stricker, Ilias Lamprinos
2012An Investigation into the Evolution of Security Usage in Home Wireless Networks.
Thomas Stimpson, Lu Liu, Yongzhao Zhan
2012An MCL-Based Approach for Spam Profile Detection in Online Social Networks.
Faraz Ahmed, Muhammad Abulaish
2012An SLA-based Framework for Estimating Trustworthiness of a Cloud.
Sudip Chakraborty, Krishnendu Roy
2012Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud Security.
Syed Naqvi, Arnaud Michot, Michael Van de Borne
2012Analysis and Evaluation Framework Based on Spatial Evolutionary Game Theory for Incentive Mechanism in Peer-to-Peer Network.
Guanghai Cui, Mingchu Li, Zhen Wang, Linlin Tian, Jianhua Ma
2012Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework.
Chunhua Su, Guilin Wang, Kouichi Sakurai
2012Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers.
Huaqun Wang, Yuqing Zhang, Bo Qin
2012Analysis and Modeling Experiment Performance Parameters of Routing Protocols in MANETs and VANETs.
Subhash Sagar, Nadeem Javaid, Zahoor Ali Khan, J. Saqib, Ayesha Bibi, Safdar Hussain Bouk
2012Analysis of SIP-Based Threats Using a VoIP Honeynet System.
Dirk Hoffstadt, Alexander Marold, Erwin P. Rathgeb
2012Android Malware Detection via a Latent Network Behavior Analysis.
Te-En Wei, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee, Horng-Tzer Wang, Dong-Jie Wu
2012Anonymity and Transferability for an Electronic Bank Check Scheme.
M. Francisca Hinarejos, Josep-Lluís Ferrer-Gomila, Gerard Draper-Gil, Llorenç Huguet i Rotger
2012Anonymous Networking Meets Real-World Business Requirements.
Mark Vinkovits, Erion Elmasllari, Claudio Pastrone
2012AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing.
Safwan Mahmud Khan, Kevin W. Hamlen
2012Assessing Overhead Cost Associated with Encrypting Swap File.
Bushra AlBelooshi, Khaled Salah, T. Marin, Ahmed Bentiba
2012Assuring Data Privacy in Cloud Transformations.
Tom Kirkham, Django Armstrong, Karim Djemame, Marcelo Corrales, Mariam Kiran, Iheanyi Nwankwo, Ming Jiang, Nikolaus Forgó
2012Autonomous Group-Based Authentication Mechanism in Mobile Ad Hoc Networks.
Parisa Memarmoshrefi, Omar Alfandi, Ansgar Kellner, Dieter Hogrefe
2012BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs.
Dingning Yang, Yuqing Zhang, Qixu Liu
2012Border Gateway Protocol Anomaly Detection Using Failure Quality Control Method.
Muhammad Mujtaba, Priyadarsi Nanda, Xiangjian He
2012Building Robust Reputation Systems in the E-commerce Environment.
Huiying Duan, Feifei Liu
2012CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection.
David J. Day, Denys A. Flores, Harjinder Singh Lallie
2012Categorising Context and Using Short Term Contextual Information to Obtain Long Term Context.
Abhinav Duggal, Manoj Misra, Ramesh Srinivasaraghavan
2012Causal Analysis of Student's Characteristics of Note-Taking Activities and Learning Performance during a Fully Online Course.
Minoru Nakayama, Kouichi Mutsuura, Hiroh Yamamoto
2012Cheater Detection in Vehicular Networks.
Dijiang Huang, Sean A. Williams, Swaroop Shere
2012Chronological Accommodation of Oculo-motors in Response to Varying Sizes of Visual Stimuli.
Minoru Nakayama, Masashi Fujimoto
2012Classification of Correlated Internet Traffic Flows.
Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou
2012Cloud SSDLC: Cloud Security Governance Deployment Framework in Secure System Development Life Cycle.
Tien-Cheu Kao, Ching-Hao Mao, Chien-Yu Chang, Kai-Chi Chang
2012Clouds Trust Anchors.
Imad M. Abbadi
2012Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks.
Qijun Gu, Wanyu Zang, Meng Yu, Peng Liu
2012Collision and Detection Performance with Three Overlap Signal Collisions in Space-Based AIS Reception.
Menghui Yang, Yongzhong Zou, Li Fang
2012Confidence as a Means to Assess the Accuracy of Trust Values.
Rolf Kiefhaber, Gerrit Anders, Florian Siefert, Theo Ungerer, Wolfgang Reif
2012Confidentiality as a Service - Usable Security for the Cloud.
Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith
2012Constructing a Cloud-Based IDS by Merging VMI with FMA.
Christopher Harrison, Devin Cook, Robert McGraw, John A. Hamilton Jr.
2012Cooperative Trajectory-Based Map Construction.
Wei Chang, Jie Wu, Chiu C. Tan
2012Cross-Technology Overlay Control Protocol for Resource Management in Converged Networks.
Andreas Bontozoglou, Kun Yang, Ken Guild
2012DSDV, DYMO, OLSR: Link Duration and Path Stability.
Sanjay Kumar, Nadeem Javaid, Zahid Yousuf, Haresh Kumar, Zahoor Ali Khan, Ayesha Bibi
2012Data Integration in Presence of Authorization Policies.
Mehdi Haddad, Mohand-Said Hacid, Robert Laurini
2012Data-centric Dissemination to Mobile Sink Group in Wireless Sensor Networks.
Hee-Sook Mo, Hyochan Bang, Cheol Sig Pyo
2012Design and Analysis of Multicast-Based Publisher/Subscriber Models over Wireless Platforms for Smart Grid Communications.
Sina Fateri, Qiang Ni, Gareth A. Taylor, Sivanantharasa Panchadcharam, Ioana Pisica
2012Design and Evaluation of SensorSafe: A Framework for Achieving Behavioral Privacy in Sharing Personal Sensory Information.
Haksoo Choi, Supriyo Chakraborty, Mani B. Srivastava
2012Design and Evaluation of an Operational Mobility Model over IPv6 (OMIPv6) Based on ID/Locator Split Architecture.
Yulei Wu, Jingguo Ge, Junling You, Yuepeng E
2012Design and Implementation of Facebook Crawler Based on Interaction Simulation.
Zhefeng Xiao, Bo Liu, Huaping Hu, Tian Zhang
2012Design of Real Time Multimedia Platform and Protocol to the Internet of Things.
Wei Jiang, Limin Meng
2012Detecting Imprudence of 'Reliable' Sellers in Online Auction Sites.
Xin Liu, Anwitaman Datta, Hui Fang, Jie Zhang
2012Detection and Prevention of Data Manipulation from Client Side in Web Applications.
Mohammad Ghafari, Hamid Shoja, Mohammad Yosef Amirani
2012Determining the Optimal Reporting Strategy in Competitive E-marketplaces.
Zeinab Noorian, Jie Zhang, Michael W. Fleming, Stephen Marsh
2012Development and Validation of a Virtual Worklog as a Collaboration Tool for the Kelluwen Learning Community.
Katherine Inalef, Julio Guerra, Eliana Scheihing
2012Development of a Typing Behaviour Recognition Mechanism on Android.
Xuan Huang, Geoffrey Lund, Andrew Sapeluk
2012Discovering a Large Scale Internet Topology: Complementary and Contrast View.
Hao Yin, Heungsun Chang, Fangming Liu, Tongyu Zhan, Ying Zhang, Bo Li
2012Distributed Privacy Preserving Classification Based on Local Cluster Identifiers.
Nico Schlitter, Jörg Lässig
2012Distributed Rerouting for Multiple Sessions in Cognitive Radio Networks.
Ying Dai, Jie Wu
2012Divide and Conquer: An Efficient Attack on Yahoo! CAPTCHA.
Haichang Gao, Wei Wang, Ye Fan
2012Domain Name to IP Address Resolution System with Multiple Name Servers Adaptable to MANETs.
Younchan Jung, Marnel Peradilla
2012Dynamic Optimization on Multi-core Platform.
Jiahui Wen, Li Shen, Zhiying Wang
2012Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage.
Zhiqian Xu, Keith M. Martin
2012Effects of IDSs on the WSNs Lifetime: Evidence of the Need of New Approaches.
Krishna Doddapaneni, Enver Ever, Orhan Gemikonakli, Leonardo Mostarda, Alfredo Navarra
2012Effects of Social Characters in Viral Propagation Seeding Strategies in Online Social Networks.
Alessio Bonti, Ming Li, Longxiang Gao, Wen Shi
2012Efficient Contextual Transaction Trust Computation in E-commerce Environments.
Haibin Zhang, Yan Wang, Xiuzhen Zhang
2012Efficient Internet Mapping in the Presence of Network Load Balancers.
Mehiar Dabbagh, Naoum Sayegh, Ayman I. Kayssi
2012Efficient Missing Tag Detection in a Large RFID System.
Cunqing Ma, Jingqiang Lin, Yuewu Wang
2012Efficient Privacy Preserving Matchmaking for Mobile Social Networking against Malicious Users.
Yong Wang, Ting-Ting Zhang, Hong-Zong Li, Long-Ping He, Jing Peng
2012Efficient Searching Mechanism for Trust-Aware Recommender Systems Based on Scale-Freeness of Trust Networks.
Weiwei Yuan, Donghai Guan, Lei Shu, Jianwei Niu
2012Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation.
Yi-Ruei Chen, Wen-Guey Tzeng
2012Enabling the IoT Paradigm in E-health Solutions through the VIRTUS Middleware.
Marco Bazzani, Davide Conzon, Andrea Scalera, Maurizio A. Spirito, Claudia Irene Trainito
2012Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help?
Sanat Kumar Bista, Surya Nepal, Cécile Paris
2012Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses.
Fahd Al-Haidari, Mohammed H. Sqalli, Khaled Salah
2012Enhanced Multi-rate Multicast for Optimal User Satisfaction and Efficient Bandwidth Utilization.
Khodor Hamandi, Farah Saab, Ayman I. Kayssi
2012Enhancing User Identity Privacy in LTE.
Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia
2012Error Performance Analysis of Opportunistic Relaying System Based on DCSK.
Jin Huang, Zhexin Xu, Weikai Xu, Lin Wang
2012Evaluating Ubiquitous Sensor Information Sharing on the Internet-of-Things.
Stefan Forsström, Patrik Österberg, Theo Kanter
2012Evaluating User Community Influence in Online Social Networks.
Zhengli Xiong, Wenjun Jiang, Guojun Wang
2012Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA.
Lingchen Zhang, Luning Xia, Zongbin Liu, Jiwu Jing, Yuan Ma
2012Evaluation Criteria for Future Identity Management.
Jesse Leskinen
2012Evaluation of Trustworthiness of Reviews in the Online Travel Community.
Yifang Ku, Hsiao-Hui Li, Fan Wu
2012Evaluation of a Fast Symmetric Cryptographic Algorithm Based on the Chaos Theory for Wireless Sensor Networks.
Ismail Mansour, Gérard Chalhoub, Bassem Bakhache
2012Evolution of Cooperation Based on Reputation on Dynamical Networks.
Linlin Tian, Mingchu Li, Weifeng Sun, Xiaowei Zhao, Baohui Wang, Jianhua Ma
2012Experimenting with ARM TrustZone - Or: How I Met Friendly Piece of Trusted Hardware.
Johannes Winter
2012FACIUS: An Easy-to-Deploy SAML-based Approach to Federate Non Web-Based Services.
Jens Köhler, Sebastian Labitzke, Michael Simon, Martin Nussbaumer, Hannes Hartenstein
2012Fast and Efficient Information Dissemination in Event-Based Wireless Sensor Networks.
Sain Saginbekov, Arshad Jhumka
2012Feedback as "Shadow of the Present": An Alternative to Reputation Systems for E-marketplaces.
Qin Li, Jie Zhang, Keith M. Martin
2012File Exchange in Cloud.
Rafael Timóteo de Sousa Júnior, Edna Dias Canedo, Robson de Oliveira Albuquerque, Flavio Elias Gomes de Deus
2012Flow-Aware Broadcasting Algorithm.
Diogo Lima, Hugo Miranda
2012Formal Verification of a Key Agreement Protocol for Wireless Sensor Networks.
Yue Li, Dehua Chen, Thomas Newe
2012Foundations for a Platform to Develop Context-aware Systems by Domain Experts.
David Martín, Carlos Lamsfus, Aurkene Alzua, Diego López-de-Ipiña
2012Fusion of Opinions under Uncertainty and Conflict - Application to Trust Assessment for Cloud Marketplaces.
Sheikh Mahbub Habib, Sebastian Ries, Sascha Hauke, Max Mühlhäuser
2012Fuzzy Logic Election of Node for Routing in WSNs.
Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar, Omar Alfandi, Dieter Hogrefe
2012Gemini: A Handbag for Pervasive Social Communications.
Yu Chen, Zheng Yan
2012Genetic Algorithm in Resource Provider Selection for Personal Live Content Delivery in User-Provided Platform.
Joseph C. H. So, Po-Choi Wong
2012Geographic-Based Service Request Scheduling Model for Mobile Cloud Computing.
Tianyi Xing, Hongbin Liang, Dijiang Huang, Lin X. Cai
2012Ginger: An Access Control Framework for Telematics Applications.
David Herges, Naim Asaj, Bastian Könings, Florian Schaub, Michael Weber
2012GridPriv: A Smart Metering Architecture Offering k-Anonymity.
Mark Stegelmann, Dogan Kesdogan
2012HVD-TLS: A Novel Framework of Thread Level Speculation.
Fan Xu, Shen Li, Zhiying Wang
2012Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks.
Huawei Zhao, Jiankun Hu, Jing Qin, Vijay Varadharajan, Haishan Wan
2012High Accuracy 3D Indoor Positioning Using Broadband Ultrasonic Signals.
Sérgio Ivan Lopes, José Manuel Neto Vieira, Daniel Filipe Albuquerque
2012Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks.
Miao Xie, Jiankun Hu, Biming Tian
2012How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation.
Michael Brenner, Henning Perl, Matthew Smith
2012How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms.
Olive Qing Zhang, Ryan K. L. Ko, Markus Kirchberg, Chun Hui Suen, Peter Jagadpramana, Bu-Sung Lee
2012Hybrid Ontology Matching for Solving the Heterogeneous Problem of the IoT.
Zhichun Wang, Rongfang Bie, Mingquan Zhou
2012Hyper-mutation Based Genetic Algorithms for Dynamic Multicast Routing Problem in Mobile Ad Hoc Networks.
Hui Cheng, Shengxiang Yang
2012HyperDomain: Enabling Inspection of Malicious VMM's Misbehavior.
Wenyin Yang, Li Ma
2012ILACF: An Incentive-Based Low-Latency Anonymous Communication Framework.
Xin Chen, Qiao-lin Hu, Hao Lu, Ge-Ming Xia, Jun Long
2012IRIS: A Novel Method of Direct Trust Computation for Generating Trusted Social Networks.
Sana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia
2012Image Resizing Based on Geometry Preservation with Seam Carving.
Fan Zhou, Ruomei Wang, Yu Liu, Yun Liang
2012Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode.
Johannes Barnickel, Jian Wang, Ulrike Meyer
2012Improving Query for P2P SIP VoIP.
Linchen Yu
2012Improving the Energy-Efficiency of GPS Based Location Sensing Smartphone Applications.
Thomas Olutoyin Oshin, Stefan Poslad, Athen Ma
2012Including Metadata into an Ontology Based Pervasive Computing Architecture.
Martin Peters, Christopher Brink, Sabine Sachweh
2012Inflammation Security: A Decentralised Immune Model for Resource Distribution in Networks.
Mark Heydenrych, Elizabeth Marie Ehlers
2012Information Security of IPsec-based Mobile VPN: Authentication and Encryption Algorithms Performance.
Alexander V. Uskov
2012Insider Attacks in Cloud Computing.
Adrian J. Duncan, Sadie Creese, Michael Goldsmith
2012Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System.
Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Ramlan Mahmod, Hanunah Othman
2012Interference Free Integration of Pervasive Applications.
Christophe Soares, Rui S. Moreira, Ricardo Morla, José Torres, Pedro Miguel Sobral
2012Joint Source-Channel Coding Based on P-LDPC Codes for Radiography Images Transmission.
Huihui Wu, Jiguang He, Liangliang Xu, Lin Wang
2012K-Anonymous Cloaking Algorithm Based on Weighted Adjacency Graph for Preserving Location Privacy.
Amina Hossain, Al-Amin Hossain, Sung-Jae Jang, Young-Sung Shin, Jae-Woo Chang
2012Knowledge Acquisition and Management Architecture for Mobile and Personal Health Environments Based on the Internet of Things.
Antonio J. Jara, Miguel A. Zamora, Antonio Fernandez Gómez-Skarmeta
2012Link Stability Evaluation and Stability Based Multicast Routing Protocol in Mobile Ad Hoc Networks.
Zhiyong Zhang, Zhiping Jia, Hui Xia
2012Locating the Attacker of Wormhole Attack by Using the Honeypot.
T. Divya Sai Keerthi, Pallapa Venkataram
2012Location Assisted Vertical Handover Algorithm for QoS Optimization in End-to-end Connections.
Martin S. Dam, Steffen Christensen, Lars Møller Mikkelsen, Rasmus L. Olsen
2012Location-Based Authentication and Authorization Using Smart Phones.
Feng Zhang, Aron Kondoro, Sead Muftic
2012Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs.
Humaira Ehsan, Farrukh Aslam Khan
2012Measuring Anonymity by Profiling Probability Distributions.
Rajiv Bagai, Nan Jiang
2012Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs.
Yuanbo Guo, Jianfeng Ma, Chao Wang, Liangmin Wang
2012Mechanism Design Based Secure Data Object Replication.
Minzhe Guo, Prabir Bhattacharya
2012Messing with Android's Permission Model.
André Egners, Ulrike Meyer, Björn Marschollek
2012Mitigating SPIT with Social Strength.
M. Ajmal Azad, Ricardo Morla
2012Modeling an Enhanced Tuple Space Based Mobile Middleware in UNITY.
Suddhasil De, Sukumar Nandi, Diganta Goswami
2012Modelling of Prioritised Vertical Handoff Scheme in Integrated UMTS/WLANs.
Zaid Ahmed Said Zabanoot, Geyong Min
2012Modelling of Secure Data Transmission over a Multichannel Wireless Network in Alloy.
Aliaa M. Alabdali, Lilia Georgieva, Greg Michaelson
2012More Choices, More Control: Extending Access Control by Meta-rights Reallocation.
Adnan Ahmad, Brian Whitworth, Lech J. Janczewski
2012Multiplayer Game Technology to Manage Critical Infrastructure Protection.
Laura Pla Beltran, Madjid Merabti, Qi Shi
2012Multiple QoT Constrained Social Trust Path Selection in Complex Social Networks.
Guanfeng Liu, Yan Wang, Duncan S. Wong
2012Network Coding-Based Mutual Anonymity Communication Protocol for Mobile P2P Networks.
Zhi-yuan Li, Liangmin Wang, Siguang Chen
2012Offline RFID Grouping Proofs with Trusted Timestamps.
Cunqing Ma, Jingqiang Lin, Yuewu Wang, Ming Shang
2012On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters.
Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka
2012On Increasing the Computational Efficiency of Long Integer Multiplication on FPGA.
Ismail San, Nuray At
2012On a Visual Secret Sharing Scheme with High Quality Decryption.
Vipin Kumar, Chirag Chetan, Aparajita Ojha
2012Optimal Resource Allocation for Multi-layered Video Streaming over Multi-channel Cognitive Radio Networks.
Bo Guan, Yifeng He
2012Optimal State Management of Data Sharing in Online Social Network (OSN) Services.
Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat
2012Overhauling of a ASEA Robot IR6 with Open Architecture.
Marcelo Henrique Souza Bomfim, R. A. Gontijo, Alexandre Queiroz Bracarense, Eduardo Jose Lima II
2012Padati: A Robust Pedestrian Dead Reckoning System on Smartphones.
Deepak Pai, Sasi Inguva, Phani Shekhar Mantripragada, Mudit Malpani, Nitin Aggarwal
2012Performance Evaluation of Shared Hosting Security Methods.
Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan
2012Performance Study of Localization Techniques in Wireless Body Area Sensor Networks.
Obaid Ur Rehman, Nadeem Javaid, Ayesha Bibi, Zahoor Ali Khan
2012Performances of CS-DCSK UWB Communication System in the Presence of Narrow Band Interferers.
Zhixiong Chen, Weikai Xu, Jin Huang, Lin Wang
2012Practicable Unified Security, Trust and Privacy (STP) Framework for Federated Access Management (FAM).
Jamalul-lail Ab Manan, Zubair Ahmad Khattak, Suziah Sulaiman
2012Prediction-Based Algorithm for Event Detection in Wireless Sensor Networks.
Yongji Yu, Zhiping Jia, Ruihua Zhang
2012Privacy Protecting by Multiattribute Clustering in Data-Intensive Service.
Qing Zhu, Ning Li
2012Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment.
Ronald Petrlic
2012Privacy-Preserving Statistical Analysis Method for Real-World Data.
Jun Ishii, Hiroyuki Maeomichi, Ikuo Yoda
2012Provable Data Possession Using Sigma-protocols.
Akshaya Mohan, Rajendra S. Katti
2012Provably Secure Single Sign-on Scheme in Distributed Systems and Networks.
Jiangshan Yu, Guilin Wang, Yi Mu
2012Provably Secure Two-Party Explicit Authenticated Key Agreement Protocol.
Minghui Zheng, Jing Chen
2012Quality Assessment of Video Transmission in Heterogeneous Networks as Applied to Real-Time Telecare.
Colin Bailey, Xiao-Hong Peng
2012RFID Mutual Authentication and Secret Update Protocol for Low-Cost Tags.
Mohamed A. Sharaf
2012Radio Frequency Energy Harvesting Characterization: An Experimental Study.
Uthman Baroudi, Amin-ud-din Qureshi, Samir Mekid, Abdelhafid Bouhraoua
2012Random4: An Application Specific Randomized Encryption Algorithm to Prevent SQL Injection.
Srinivas Avireddy, Varalakshmi Perumal, Narayan Gowraj, Ram Srivatsa Kannan, Prashanth Thinakaran, Sundaravadanam Ganapthi, Jashwant Raj Gunasekaran, Sruthi Prabhu
2012Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic Analysis.
Lei (Chris) Liu, Xiaolong Jin, Geyong Min, Li Xu
2012Real-Time Distributed Sensor-Assisted mHealth Applications on the Internet-of-Things.
Stefan Forsström, Theo Kanter, Olle Johansson
2012RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis.
Ismail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Ching-Hao Mao, Te-En Wei, Shyi-Ming Chen
2012Reputation Based Security Model for Android Applications.
Welderufael Berhane Tesfay, Todd Booth, Karl Andersson
2012Reputation Diffusion Simulation for Avoiding Privacy Violation.
David Pergament, Armen Aghasaryan, Jean-Gabriel Ganascia
2012Research on Cooperative Learning of Digital English Writing in Network Environment.
Xiaodong Li, Hong Zhang
2012Research on Embedding ECC into RFID Authentication Protocol.
Guicheng Shen, Bingwu Liu
2012Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlation.
Zhijun Wu, Lan Ma, Minghua Wang, Meng Yue, Lu Wang
2012Research on Trust Issue of Current Chinese C2C E-commerce: Problems and Solutions.
Yu Zhang
2012Resources Collaborative Scheduling Model Based on Trust Mechanism in Cloud.
Kun Lu, Hua Jiang, Mingchu Li, Sheng Zhao, Jianhua Ma
2012Restricted Identification without Group Keys.
Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Miroslaw Kutylowski
2012Reusable and Extensible Fault Tolerance for RESTful Applications.
John Edstrom, Eli Tilevich
2012Ring Group Signatures.
Liqun Chen
2012Robot Navigation Using Brain-Computer Interfaces.
Athanasios Vourvopoulos, Fotis Liarokapis
2012Robust Biometric Based Key Agreement and Remote Mutual Authentication.
Hisham Al-Assam, Sabah Jassim
2012Role Based Privacy-Aware Secure Routing in WMNs.
Hui Lin, Jia Hu, Atulya Nagar, Li Xu
2012SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services.
René Hummen, Jan Henrik Ziegeldorf, Tobias Heer, Hanno Wirtz, Klaus Wehrle
2012Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing.
Qiwei Lu, Yan Xiong, Xudong Gong, Wenchao Huang
2012Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid.
Mohammad Ashiqur Rahman, Libin Bai, Mohamed Shehab, Ehab Al-Shaer
2012Secure Reputation Framework for BitTorrent.
Hani Ragab Hassen, Olga Jones, Nikos Galanis
2012Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs.
Yihong Zang, Johnson P. Thomas, Gheorghita Ghinea, Mathews Thomas, Salaheddin Darwish
2012Securing Trusted Execution Environments with PUF Generated Secret Keys.
Matthew Areno, Jim Plusquellic
2012Security Aspects of Soft Verified Messages Protected by Message Authentication Codes.
Natasa Zivic
2012Security Attribute Aggregation Models for E-research Collaborations.
Richard O. Sinnott, Christopher Bayliss, Gerson Galang, Damien Mannix, Martin Tomko
2012Security Issues of a Publicly Accessible Cloud Computing Infrastructure.
Gordon Russell, Richard Macfarlane
2012Security Server-Based Architecture for Mobile Ad Hoc Networks.
Salaheddin Darwish, Simon J. E. Taylor, Gheorghita Ghinea
2012Security and Trust Preserving VM Migrations in Public Clouds.
Mudassar Aslam, Christian Gehrmann, Mats Björkman
2012Self-Protecting Documents for Cloud Storage Security.
Manuel Munier, Vincent Lalanne, Magali Ricarde
2012Semantic Decision Support Models for Energy Efficiency in Smart-Metered Homes.
Yan Tang, Ioana Ciuciu
2012Simulatable Oblivious Transfer Protocols Based on Blind Signature.
Jing Qin, Jiankun Hu, Huawei Zhao
2012Social Network Content Management through Watermarking.
Athanasios Zigomitros, Achilleas Papageorgiou, Constantinos Patsakis
2012Square-Root Unscented Kalman Filtering Based Localization and Tracking in the Internet of Things.
Junqi Guo, Hongyang Zhang, Yunchuan Sun, Rongfang Bie
2012Static Detection of Logic Vulnerabilities in Java Web Applications.
Ying Kong, Yuqing Zhang, Zhejun Fang, Qixu Liu
2012Subversion Impedance in Covert Communication Networks.
Timothy Nix, Riccardo Bettati
2012Sufficient Encryption with Codewords and Bin-strings of H.264/SVC.
Mamoona Naveed Asghar, Mohammad Ghanbari, Martin J. Reed
2012TREASURE: Trust Enhanced Security for Cloud Environments.
Vijay Varadharajan, Udaya Kiran Tupakula
2012TSD: A Flexible Root of Trust for the Cloud.
Dexian Chang, Xiaobo Chu, Yu Qin, Dengguo Feng
2012Testing Method of Code Redundancy Simplification Based on Program Dependency Graph.
Fan Yang, Huanguo Zhang, Fei Yan, Jian Yang
2012The Current State of Understanding of the Energy Efficiency of Cloud Computing.
Francis Owusu, Colin Pattinson
2012The Effectiveness of Intersection Attack Countermeasures for Graphical Passwords.
Rosanne English, Ron Poet
2012The Impact of Sensor Node Distribution on Routing Protocols Performance: A Comparitive Study.
Uthman Baroudi, Anas Al-Roubaiey, Samir Mekid, Abdelhafid Bouhraoua
2012The Load Balancing Problem in Extended OTIS-n-Cube Interconnection Networks.
Jehad Al-Sadi
2012The Multi-layer Imbrication for Data Leakage Prevention from Mobile Devices.
Charles Perez, Babiga Birregah, Marc Lemercier
2012The Research and Application of a Specific Instruction Processor for SMS4.
Zhenzhou Li, Feng Li, Zhiping Jia, Lei Ju, Renhai Chen
2012Time- and Frequency-Domain Impulsive Noise Spreader for OFDM Systems.
S. Nayyef, Charalampos Tsimenidis, Arafat Al-Dweik, Bayan S. Sharif, Ali Hazmi
2012Toward Authenticated and Complete Query Results from Cloud Storages.
Fu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen
2012Towards Safe and Optimal Network Designs Based on Network Security Requirements.
Nihel Ben Youssef Ben Souayeh, Adel Bouhoula
2012Towards Semantic-Enhanced Attribute-Based Access Control for Cloud Services.
Zahid Iqbal, Josef Noll
2012Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources.
Arshad Jhumka, Matthew Bradbury, Matthew Leeke
2012Towards a Formal Verification of a Multi-factor Authentication Protocol Using Automated Theorem Provers.
Eduardo dos Santos, Jean Everson Martina, Ricardo Felipe Custódio
2012Tracking of Data Leaving the Cloud.
Yu Shyang Tan, Ryan K. L. Ko, Peter Jagadpramana, Chun Hui Suen, Markus Kirchberg, Teck Hooi Lim, Bu-Sung Lee, Anurag Singla, Ken Mermoud, Doron Keller, Ha Duc
2012Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection.
Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu
2012Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems.
Lan Zhou, Vijay Varadharajan, Michael Hitchens
2012Trustworthy Infrastructure Services for a Secure and Privacy-Respecting Internet of Things.
Dennis Gessner, Alexis Olivereau, Alexander Salinas Segura, Alexandru Serbanati
2012U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks.
Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda
2012Ubiquitous HealthCare in Wireless Body Area Networks.
Naveed A. Khan, Nadeem Javaid, Zahoor Ali Khan, M. Jaffar, U. Rafiq, Ayesha Bibi
2012Ubiquitous Secure Interactions with Intelligent Artifacts on the Internet-of-Things.
Stefan Forsström, Theo Kanter, Patrik Österberg
2012Unwanted Traffic Control via Hybrid Trust Management.
Zheng Yan, Raimo Kantola, Yue Shen
2012User Preferences-Adaptive Dynamic Network Selection Approach in Cooperating Wireless Networks: A Game Theoretic Perspective.
Haris Pervaiz, Qiang Ni
2012User Satisfaction Based ZFBF Scheduling Algorithm in Multi-user MIMO System.
Hailang Cao, Ping Wang, Lei Chen, Fuqiang Liu, Xinhong Wang, Yin Zhu, Huifang Pang
2012Using Subjective Logic to Handle Uncertainty and Conflicts.
Murat Sensoy, Jeff Z. Pan, Achille Fokoue, Mudhakar Srivatsa, Felipe Meneguzzi
2012VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks.
Yang Qin, Dijiang Huang, Xinwen Zhang
2012VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification.
Fei Wang, Xiaofeng Wang, Jinshu Su, Bin Xiao
2012Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments.
Nicholas Charles Patterson, Michael Hobbs, Jemal H. Abawajy
2012Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Email Addresses.
Tobias Hahn, Thomas Kunz, Markus Schneider, Sven Vowe
2012WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS.
Caner Kilinc, Todd Booth, Karl Andersson
2012Weighted Flow and Spectral Resource to Enhance QoS for Multi-hop Cognitive Radio Networks.
Yean-Fu Wen
2012Window Energy Detection for Unmanned Surveillance with PIR Sensor.
Sang Gi Hong, Young Bag Moon, Naesoo Kim, Whan Woo Kim
2012Wire - A Formal Intermediate Language for Binary Analysis.
Silvio Cesare, Yang Xiang