| 2012 | 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012 Geyong Min, Yulei Wu, Lei (Chris) Liu, Xiaolong Jin, Stephen A. Jarvis, Ahmed Yassin Al-Dubai |
| 2012 | A Block-Based Still Image Coder for Parallel Computing. Yu-Lin Wang, Chia-Te Liao, Alvin Wen-Yu Su |
| 2012 | A Case Based Reasoning Framework for Improving the Trustworthiness of Digital Forensic Investigations. Graeme Horsman, Christopher Laing, Paul Vickers |
| 2012 | A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive Environments. Chi Lin, Guowei Wu, Lin Yao, Zuosong Liu |
| 2012 | A Comprehensive Ontology for Knowledge Representation in the Internet of Things. Wei Wang, Suparna De, Ralf Tönjes, Eike Steffen Reetz, Klaus Moessner |
| 2012 | A Covert Timing Channel Based on Fountain Codes. Rennie Archibald, Dipak Ghosal |
| 2012 | A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. Sadie Creese, Michael Goldsmith, Jason R. C. Nurse, Elizabeth Phillips |
| 2012 | A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication. Wencheng Yang, Jiankun Hu, Song Wang |
| 2012 | A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET. Qiwei Lu, Yan Xiong, Wenchao Huang, Xudong Gong, Fuyou Miao |
| 2012 | A Dynamic Bandwidth Allocation Algorithm for a Multi-sink Wireless Sensor Network Converged with a Passive Optical Network. Zhenfei Wang, Kun Yang, David K. Hunter |
| 2012 | A Dynamic Cache Partitioning Mechanism under Virtualization Environment. Xiaolin Wang, Xiang Wen, Yechen Li, Yingwei Luo, Xiaoming Li, Zhenlin Wang |
| 2012 | A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks. Ramzi Bellazreg, Noureddine Boudriga, Mohamed Hamdi |
| 2012 | A Formally Verified Device Authentication Protocol Using Casper/FDR. Mahdi Aiash, Glenford E. Mapp, Raphael C.-W. Phan, Aboubaker Lasebae, Jonathan Loo |
| 2012 | A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms. Martin Pirker, Daniel Slamanig |
| 2012 | A Generalized Stereotypical Trust Model. Hui Fang, Jie Zhang, Murat Sensoy, Nadia Magnenat-Thalmann |
| 2012 | A HiperLAN/2 Based MAC Protocol for Efficient Vehicle-to-Infrastructure Communication Using Directional Wireless Mesh Backbone. Sandip Chakraborty, Sukumar Nandi |
| 2012 | A Hybrid Authentication and Key Establishment Scheme for WBAN. Wassim Drira, Éric Renault, Djamal Zeghlache |
| 2012 | A Hybrid Key Management Protocol for Wireless Sensor Networks. Musfiq Rahman, Srinivas Sampalli |
| 2012 | A Hybrid MPI/OpenMP Model Based on DDM for Large-Scale Partial Differential Equations. Dandan Li, Xiaohui Ji, Zhangbing Zhou, Qun Wang |
| 2012 | A Hybrid Ontological and Temporal Approach for Composite Activity Modelling. George Okeyo, Liming Chen, Hui Wang, Roy Sterritt |
| 2012 | A Layered Malware Detection Model Using VMM. Lin Chen, Bo Liu, Huaping Hu, Qianbing Zheng |
| 2012 | A Light-Weight Commodity Integrity Detection Algorithm Based on Chinese Remainder Theorem. Chaoliang Li, Guojun Wang |
| 2012 | A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor Networks. Muhammad Bashir Abdullahi, Guojun Wang |
| 2012 | A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example. Stefan Hofbauer, Kristian Beckers, Gerald Quirchmayr, Christoph Sorge |
| 2012 | A Model Driven Infrastructure for Context-Awareness Mobile Assessment Personalization. Ahlem Harchay, Lilia Cheniti-Belcadhi, Rafik Braham |
| 2012 | A Multi-agent Immunologically-inspired Model for Critical Information Infrastructure Protection - An Immunologically-inspired Conceptual Model for Security on the Power Grid. Sheu M. A. Mavee, Elizabeth Marie Ehlers |
| 2012 | A Multi-tunnel VPN Concurrent System for New Generation Network Based on User Space. Yan Shen, Qifei Zhang, Lingdi Ping, Yan-Fei Wang, Wenjuan Li |
| 2012 | A Multivariate Classification Algorithm for Malicious Node Detection in Large-Scale WSNs. Hongjun Dai, Huabo Liu, Zhiping Jia, Tianzhou Chen |
| 2012 | A New Efficient Property-Based Attestation Protocol Based on Elliptic Curves. Xiaobo Chu, Qin Yu |
| 2012 | A Novel Scoring Model to Detect Potential Malicious Web Pages. Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk |
| 2012 | A Novel System for Evaluating Website Using Link Analysis. Xiaoqiang Li, Yun Mi, Yingwei Jin, Heng Qi, Zhiyang Li |
| 2012 | A Practical Network-Based Intrusion Detection and Prevention System. Naruemon Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, Chalermpol Charnsripinyo |
| 2012 | A Privacy Preserving Application Acquisition Protocol. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes |
| 2012 | A Privacy Preserving Scalable Architecture for Collaborative Event Correlation. Hani Qusa, Roberto Baldoni, Roberto Beraldi |
| 2012 | A Quantum TITO Diversity Transmission Scheme with Quantum Teleportation of Non-maximally Entangled Bell State. Jinjing Shi, Ronghua Shi, Ying Guo, Moon Ho Lee |
| 2012 | A Quantum-classical Hybrid Architecture for Security Algorithms Acceleration. Rafael Trapani Possignolo, Cíntia B. Margi |
| 2012 | A Rapid Certification Protocol from Bilinear Pairings for Vehicular Ad Hoc Networks. Xiaojun Li, Liangmin Wang |
| 2012 | A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays. Quang-Anh Tran, Frank Jiang, Jiankun Hu |
| 2012 | A Reception Based Node Selection Protocol for Multi-hop Routing in Vehicular Ad-hoc Networks. Muhammad Bilal, M. O. Hussain, Pauline M. L. Chan |
| 2012 | A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways. Mahmoud Hashem Eiza, Qiang Ni |
| 2012 | A Round Robin Load Balancing and Redundancy Protocol for Network Routers. Sarah Abdallah, Elias Najjar, Ayman I. Kayssi |
| 2012 | A Scalable Anonymity Scheme Based on DHT Distributed Inquiry. Wentao Wang, Yuewu Wang, Jiwu Jing, Zhongwen Zhang |
| 2012 | A Secure Distributed File System Based on Revised Blakley's Secret Sharing Scheme. Su Chen, Yi Chen, Hai Jiang, Laurence Tianruo Yang, Kuan-Ching Li |
| 2012 | A Secure Node Localization Method Based on the Congruity of Time in Wireless Sensor Networks. Yongzhao Zhan, Chunxia Li, Xinsheng Wang, Yuan Zhou, Lu Liu, Hussain Al-Aqrabi |
| 2012 | A Taxonomy of Trust and Reputation System Attacks. David Fraga, Zorana Bankovic, José Manuel Moya |
| 2012 | A Temporalised Belief Logic for Reasoning about Authentication Protocols. Ji Ma, Klaus-Dieter Schewe |
| 2012 | A Text Representation Method Based on Harmonic Series. Xue Chen, Chao Wu |
| 2012 | A Trajectory Model to Deal with Transmission Failures. Francisco Javier Moreno Arboleda, Sebastián Múnera, Luis Munoz |
| 2012 | A Trust Model Based on P2P Trust Models for Secure Global Grids. Damandeep Kaur, Jyotsna Sengupta |
| 2012 | A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks. Joydeep Chandra, Ingo Scholtes, Niloy Ganguly, Frank Schweitzer |
| 2012 | AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs. Longxiang Gao, Ming Li, Tianqing Zhu, Alessio Bonti, Wanlei Zhou, Shui Yu |
| 2012 | AR Teleport: Digital Reconstruction of Historical and Cultural-Heritage Sites Using Mobile Augmented Reality. Jiyoung Kang |
| 2012 | Actualization of a Course Library through Influential Twitter Knowledge. Malinka Ivanova, Tatyana Ivanova |
| 2012 | Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment. Yuxin Meng, Wenjuan Li |
| 2012 | Adaptive Trust Management Mechanism for Cognitive Radio Networks. Qingqi Pei, Lei Li, Hongning Li, Beibei Yuan |
| 2012 | An Active Detection Mechanism for Detecting ICMP Based Attacks. Ferdous A. Barbhuiya, S. Roopa, Ritesh Ratti, Santosh Biswas, Sukumar Nandi |
| 2012 | An Analysis of Peer to Peer Protocols for Massively Multiplayer Online Games. Andrew Jones, Lu Liu, Nick Antonopoulos, Weining Liu |
| 2012 | An Analytical Model on the Propagation of Modern Email Worms. Wei Zhou, Sheng Wen, Yini Wang, Yang Xiang, Wanlei Zhou |
| 2012 | An Ant Colony Optimization Algorithm for Overlay Backbone Multicast Routing in Content Delivery Networks. Gang Liu, Hua Wang, Hong Zhang |
| 2012 | An Architecture for the Enforcement of Privacy and Security Requirements in Internet-Centric Services. Yair Diaz-Tellez, Eliane L. Bodanese, Srijith K. Nair, Theo Dimitrakos |
| 2012 | An Area-Based Approach for Node Replica Detection in Wireless Sensor Networks. Wibhada Naruephiphat, Yusheng Ji, Chalermpol Charnsripinyo |
| 2012 | An Attribute-Based Encryption Scheme Secure against Malicious KGC. Guoyan Zhang, Lei Liu, Yang Liu |
| 2012 | An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETs. Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro |
| 2012 | An Efficient Detecting Communities Algorithm with Self-Adapted Fuzzy C-Means Clustering in Complex Networks. Jianzhi Jin, Yuhua Liu, Laurence Tianruo Yang, Naixue Xiong, Fang Hu |
| 2012 | An Efficient Distributed Transactional Memory System. Xin Peng, Xiaofei Liao, Hai Jin, Xuepeng Fan, Xuping Tu, Linchen Yu |
| 2012 | An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET. Pramod Kumar Singh, Govind Sharma |
| 2012 | An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs. Yu-Chih Wei, Yi-Ming Chen |
| 2012 | An Identity Authentication Mechanism Based on Timing Covert Channel. Yanan Sun, Xiaohong Guan, Ting Liu, Yu Qu |
| 2012 | An Integrated Mobile System for Long-Term Aerobic Activity Monitoring and Support in Daily Life. Attila Reiss, Didier Stricker, Ilias Lamprinos |
| 2012 | An Investigation into the Evolution of Security Usage in Home Wireless Networks. Thomas Stimpson, Lu Liu, Yongzhao Zhan |
| 2012 | An MCL-Based Approach for Spam Profile Detection in Online Social Networks. Faraz Ahmed, Muhammad Abulaish |
| 2012 | An SLA-based Framework for Estimating Trustworthiness of a Cloud. Sudip Chakraborty, Krishnendu Roy |
| 2012 | Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud Security. Syed Naqvi, Arnaud Michot, Michael Van de Borne |
| 2012 | Analysis and Evaluation Framework Based on Spatial Evolutionary Game Theory for Incentive Mechanism in Peer-to-Peer Network. Guanghai Cui, Mingchu Li, Zhen Wang, Linlin Tian, Jianhua Ma |
| 2012 | Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework. Chunhua Su, Guilin Wang, Kouichi Sakurai |
| 2012 | Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers. Huaqun Wang, Yuqing Zhang, Bo Qin |
| 2012 | Analysis and Modeling Experiment Performance Parameters of Routing Protocols in MANETs and VANETs. Subhash Sagar, Nadeem Javaid, Zahoor Ali Khan, J. Saqib, Ayesha Bibi, Safdar Hussain Bouk |
| 2012 | Analysis of SIP-Based Threats Using a VoIP Honeynet System. Dirk Hoffstadt, Alexander Marold, Erwin P. Rathgeb |
| 2012 | Android Malware Detection via a Latent Network Behavior Analysis. Te-En Wei, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee, Horng-Tzer Wang, Dong-Jie Wu |
| 2012 | Anonymity and Transferability for an Electronic Bank Check Scheme. M. Francisca Hinarejos, Josep-Lluís Ferrer-Gomila, Gerard Draper-Gil, Llorenç Huguet i Rotger |
| 2012 | Anonymous Networking Meets Real-World Business Requirements. Mark Vinkovits, Erion Elmasllari, Claudio Pastrone |
| 2012 | AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing. Safwan Mahmud Khan, Kevin W. Hamlen |
| 2012 | Assessing Overhead Cost Associated with Encrypting Swap File. Bushra AlBelooshi, Khaled Salah, T. Marin, Ahmed Bentiba |
| 2012 | Assuring Data Privacy in Cloud Transformations. Tom Kirkham, Django Armstrong, Karim Djemame, Marcelo Corrales, Mariam Kiran, Iheanyi Nwankwo, Ming Jiang, Nikolaus Forgó |
| 2012 | Autonomous Group-Based Authentication Mechanism in Mobile Ad Hoc Networks. Parisa Memarmoshrefi, Omar Alfandi, Ansgar Kellner, Dieter Hogrefe |
| 2012 | BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs. Dingning Yang, Yuqing Zhang, Qixu Liu |
| 2012 | Border Gateway Protocol Anomaly Detection Using Failure Quality Control Method. Muhammad Mujtaba, Priyadarsi Nanda, Xiangjian He |
| 2012 | Building Robust Reputation Systems in the E-commerce Environment. Huiying Duan, Feifei Liu |
| 2012 | CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection. David J. Day, Denys A. Flores, Harjinder Singh Lallie |
| 2012 | Categorising Context and Using Short Term Contextual Information to Obtain Long Term Context. Abhinav Duggal, Manoj Misra, Ramesh Srinivasaraghavan |
| 2012 | Causal Analysis of Student's Characteristics of Note-Taking Activities and Learning Performance during a Fully Online Course. Minoru Nakayama, Kouichi Mutsuura, Hiroh Yamamoto |
| 2012 | Cheater Detection in Vehicular Networks. Dijiang Huang, Sean A. Williams, Swaroop Shere |
| 2012 | Chronological Accommodation of Oculo-motors in Response to Varying Sizes of Visual Stimuli. Minoru Nakayama, Masashi Fujimoto |
| 2012 | Classification of Correlated Internet Traffic Flows. Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou |
| 2012 | Cloud SSDLC: Cloud Security Governance Deployment Framework in Secure System Development Life Cycle. Tien-Cheu Kao, Ching-Hao Mao, Chien-Yu Chang, Kai-Chi Chang |
| 2012 | Clouds Trust Anchors. Imad M. Abbadi |
| 2012 | Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks. Qijun Gu, Wanyu Zang, Meng Yu, Peng Liu |
| 2012 | Collision and Detection Performance with Three Overlap Signal Collisions in Space-Based AIS Reception. Menghui Yang, Yongzhong Zou, Li Fang |
| 2012 | Confidence as a Means to Assess the Accuracy of Trust Values. Rolf Kiefhaber, Gerrit Anders, Florian Siefert, Theo Ungerer, Wolfgang Reif |
| 2012 | Confidentiality as a Service - Usable Security for the Cloud. Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith |
| 2012 | Constructing a Cloud-Based IDS by Merging VMI with FMA. Christopher Harrison, Devin Cook, Robert McGraw, John A. Hamilton Jr. |
| 2012 | Cooperative Trajectory-Based Map Construction. Wei Chang, Jie Wu, Chiu C. Tan |
| 2012 | Cross-Technology Overlay Control Protocol for Resource Management in Converged Networks. Andreas Bontozoglou, Kun Yang, Ken Guild |
| 2012 | DSDV, DYMO, OLSR: Link Duration and Path Stability. Sanjay Kumar, Nadeem Javaid, Zahid Yousuf, Haresh Kumar, Zahoor Ali Khan, Ayesha Bibi |
| 2012 | Data Integration in Presence of Authorization Policies. Mehdi Haddad, Mohand-Said Hacid, Robert Laurini |
| 2012 | Data-centric Dissemination to Mobile Sink Group in Wireless Sensor Networks. Hee-Sook Mo, Hyochan Bang, Cheol Sig Pyo |
| 2012 | Design and Analysis of Multicast-Based Publisher/Subscriber Models over Wireless Platforms for Smart Grid Communications. Sina Fateri, Qiang Ni, Gareth A. Taylor, Sivanantharasa Panchadcharam, Ioana Pisica |
| 2012 | Design and Evaluation of SensorSafe: A Framework for Achieving Behavioral Privacy in Sharing Personal Sensory Information. Haksoo Choi, Supriyo Chakraborty, Mani B. Srivastava |
| 2012 | Design and Evaluation of an Operational Mobility Model over IPv6 (OMIPv6) Based on ID/Locator Split Architecture. Yulei Wu, Jingguo Ge, Junling You, Yuepeng E |
| 2012 | Design and Implementation of Facebook Crawler Based on Interaction Simulation. Zhefeng Xiao, Bo Liu, Huaping Hu, Tian Zhang |
| 2012 | Design of Real Time Multimedia Platform and Protocol to the Internet of Things. Wei Jiang, Limin Meng |
| 2012 | Detecting Imprudence of 'Reliable' Sellers in Online Auction Sites. Xin Liu, Anwitaman Datta, Hui Fang, Jie Zhang |
| 2012 | Detection and Prevention of Data Manipulation from Client Side in Web Applications. Mohammad Ghafari, Hamid Shoja, Mohammad Yosef Amirani |
| 2012 | Determining the Optimal Reporting Strategy in Competitive E-marketplaces. Zeinab Noorian, Jie Zhang, Michael W. Fleming, Stephen Marsh |
| 2012 | Development and Validation of a Virtual Worklog as a Collaboration Tool for the Kelluwen Learning Community. Katherine Inalef, Julio Guerra, Eliana Scheihing |
| 2012 | Development of a Typing Behaviour Recognition Mechanism on Android. Xuan Huang, Geoffrey Lund, Andrew Sapeluk |
| 2012 | Discovering a Large Scale Internet Topology: Complementary and Contrast View. Hao Yin, Heungsun Chang, Fangming Liu, Tongyu Zhan, Ying Zhang, Bo Li |
| 2012 | Distributed Privacy Preserving Classification Based on Local Cluster Identifiers. Nico Schlitter, Jörg Lässig |
| 2012 | Distributed Rerouting for Multiple Sessions in Cognitive Radio Networks. Ying Dai, Jie Wu |
| 2012 | Divide and Conquer: An Efficient Attack on Yahoo! CAPTCHA. Haichang Gao, Wei Wang, Ye Fan |
| 2012 | Domain Name to IP Address Resolution System with Multiple Name Servers Adaptable to MANETs. Younchan Jung, Marnel Peradilla |
| 2012 | Dynamic Optimization on Multi-core Platform. Jiahui Wen, Li Shen, Zhiying Wang |
| 2012 | Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage. Zhiqian Xu, Keith M. Martin |
| 2012 | Effects of IDSs on the WSNs Lifetime: Evidence of the Need of New Approaches. Krishna Doddapaneni, Enver Ever, Orhan Gemikonakli, Leonardo Mostarda, Alfredo Navarra |
| 2012 | Effects of Social Characters in Viral Propagation Seeding Strategies in Online Social Networks. Alessio Bonti, Ming Li, Longxiang Gao, Wen Shi |
| 2012 | Efficient Contextual Transaction Trust Computation in E-commerce Environments. Haibin Zhang, Yan Wang, Xiuzhen Zhang |
| 2012 | Efficient Internet Mapping in the Presence of Network Load Balancers. Mehiar Dabbagh, Naoum Sayegh, Ayman I. Kayssi |
| 2012 | Efficient Missing Tag Detection in a Large RFID System. Cunqing Ma, Jingqiang Lin, Yuewu Wang |
| 2012 | Efficient Privacy Preserving Matchmaking for Mobile Social Networking against Malicious Users. Yong Wang, Ting-Ting Zhang, Hong-Zong Li, Long-Ping He, Jing Peng |
| 2012 | Efficient Searching Mechanism for Trust-Aware Recommender Systems Based on Scale-Freeness of Trust Networks. Weiwei Yuan, Donghai Guan, Lei Shu, Jianwei Niu |
| 2012 | Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation. Yi-Ruei Chen, Wen-Guey Tzeng |
| 2012 | Enabling the IoT Paradigm in E-health Solutions through the VIRTUS Middleware. Marco Bazzani, Davide Conzon, Andrea Scalera, Maurizio A. Spirito, Claudia Irene Trainito |
| 2012 | Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help? Sanat Kumar Bista, Surya Nepal, Cécile Paris |
| 2012 | Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses. Fahd Al-Haidari, Mohammed H. Sqalli, Khaled Salah |
| 2012 | Enhanced Multi-rate Multicast for Optimal User Satisfaction and Efficient Bandwidth Utilization. Khodor Hamandi, Farah Saab, Ayman I. Kayssi |
| 2012 | Enhancing User Identity Privacy in LTE. Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia |
| 2012 | Error Performance Analysis of Opportunistic Relaying System Based on DCSK. Jin Huang, Zhexin Xu, Weikai Xu, Lin Wang |
| 2012 | Evaluating Ubiquitous Sensor Information Sharing on the Internet-of-Things. Stefan Forsström, Patrik Österberg, Theo Kanter |
| 2012 | Evaluating User Community Influence in Online Social Networks. Zhengli Xiong, Wenjun Jiang, Guojun Wang |
| 2012 | Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA. Lingchen Zhang, Luning Xia, Zongbin Liu, Jiwu Jing, Yuan Ma |
| 2012 | Evaluation Criteria for Future Identity Management. Jesse Leskinen |
| 2012 | Evaluation of Trustworthiness of Reviews in the Online Travel Community. Yifang Ku, Hsiao-Hui Li, Fan Wu |
| 2012 | Evaluation of a Fast Symmetric Cryptographic Algorithm Based on the Chaos Theory for Wireless Sensor Networks. Ismail Mansour, Gérard Chalhoub, Bassem Bakhache |
| 2012 | Evolution of Cooperation Based on Reputation on Dynamical Networks. Linlin Tian, Mingchu Li, Weifeng Sun, Xiaowei Zhao, Baohui Wang, Jianhua Ma |
| 2012 | Experimenting with ARM TrustZone - Or: How I Met Friendly Piece of Trusted Hardware. Johannes Winter |
| 2012 | FACIUS: An Easy-to-Deploy SAML-based Approach to Federate Non Web-Based Services. Jens Köhler, Sebastian Labitzke, Michael Simon, Martin Nussbaumer, Hannes Hartenstein |
| 2012 | Fast and Efficient Information Dissemination in Event-Based Wireless Sensor Networks. Sain Saginbekov, Arshad Jhumka |
| 2012 | Feedback as "Shadow of the Present": An Alternative to Reputation Systems for E-marketplaces. Qin Li, Jie Zhang, Keith M. Martin |
| 2012 | File Exchange in Cloud. Rafael Timóteo de Sousa Júnior, Edna Dias Canedo, Robson de Oliveira Albuquerque, Flavio Elias Gomes de Deus |
| 2012 | Flow-Aware Broadcasting Algorithm. Diogo Lima, Hugo Miranda |
| 2012 | Formal Verification of a Key Agreement Protocol for Wireless Sensor Networks. Yue Li, Dehua Chen, Thomas Newe |
| 2012 | Foundations for a Platform to Develop Context-aware Systems by Domain Experts. David Martín, Carlos Lamsfus, Aurkene Alzua, Diego López-de-Ipiña |
| 2012 | Fusion of Opinions under Uncertainty and Conflict - Application to Trust Assessment for Cloud Marketplaces. Sheikh Mahbub Habib, Sebastian Ries, Sascha Hauke, Max Mühlhäuser |
| 2012 | Fuzzy Logic Election of Node for Routing in WSNs. Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar, Omar Alfandi, Dieter Hogrefe |
| 2012 | Gemini: A Handbag for Pervasive Social Communications. Yu Chen, Zheng Yan |
| 2012 | Genetic Algorithm in Resource Provider Selection for Personal Live Content Delivery in User-Provided Platform. Joseph C. H. So, Po-Choi Wong |
| 2012 | Geographic-Based Service Request Scheduling Model for Mobile Cloud Computing. Tianyi Xing, Hongbin Liang, Dijiang Huang, Lin X. Cai |
| 2012 | Ginger: An Access Control Framework for Telematics Applications. David Herges, Naim Asaj, Bastian Könings, Florian Schaub, Michael Weber |
| 2012 | GridPriv: A Smart Metering Architecture Offering k-Anonymity. Mark Stegelmann, Dogan Kesdogan |
| 2012 | HVD-TLS: A Novel Framework of Thread Level Speculation. Fan Xu, Shen Li, Zhiying Wang |
| 2012 | Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks. Huawei Zhao, Jiankun Hu, Jing Qin, Vijay Varadharajan, Haishan Wan |
| 2012 | High Accuracy 3D Indoor Positioning Using Broadband Ultrasonic Signals. Sérgio Ivan Lopes, José Manuel Neto Vieira, Daniel Filipe Albuquerque |
| 2012 | Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks. Miao Xie, Jiankun Hu, Biming Tian |
| 2012 | How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation. Michael Brenner, Henning Perl, Matthew Smith |
| 2012 | How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms. Olive Qing Zhang, Ryan K. L. Ko, Markus Kirchberg, Chun Hui Suen, Peter Jagadpramana, Bu-Sung Lee |
| 2012 | Hybrid Ontology Matching for Solving the Heterogeneous Problem of the IoT. Zhichun Wang, Rongfang Bie, Mingquan Zhou |
| 2012 | Hyper-mutation Based Genetic Algorithms for Dynamic Multicast Routing Problem in Mobile Ad Hoc Networks. Hui Cheng, Shengxiang Yang |
| 2012 | HyperDomain: Enabling Inspection of Malicious VMM's Misbehavior. Wenyin Yang, Li Ma |
| 2012 | ILACF: An Incentive-Based Low-Latency Anonymous Communication Framework. Xin Chen, Qiao-lin Hu, Hao Lu, Ge-Ming Xia, Jun Long |
| 2012 | IRIS: A Novel Method of Direct Trust Computation for Generating Trusted Social Networks. Sana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia |
| 2012 | Image Resizing Based on Geometry Preservation with Seam Carving. Fan Zhou, Ruomei Wang, Yu Liu, Yun Liang |
| 2012 | Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode. Johannes Barnickel, Jian Wang, Ulrike Meyer |
| 2012 | Improving Query for P2P SIP VoIP. Linchen Yu |
| 2012 | Improving the Energy-Efficiency of GPS Based Location Sensing Smartphone Applications. Thomas Olutoyin Oshin, Stefan Poslad, Athen Ma |
| 2012 | Including Metadata into an Ontology Based Pervasive Computing Architecture. Martin Peters, Christopher Brink, Sabine Sachweh |
| 2012 | Inflammation Security: A Decentralised Immune Model for Resource Distribution in Networks. Mark Heydenrych, Elizabeth Marie Ehlers |
| 2012 | Information Security of IPsec-based Mobile VPN: Authentication and Encryption Algorithms Performance. Alexander V. Uskov |
| 2012 | Insider Attacks in Cloud Computing. Adrian J. Duncan, Sadie Creese, Michael Goldsmith |
| 2012 | Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System. Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Ramlan Mahmod, Hanunah Othman |
| 2012 | Interference Free Integration of Pervasive Applications. Christophe Soares, Rui S. Moreira, Ricardo Morla, José Torres, Pedro Miguel Sobral |
| 2012 | Joint Source-Channel Coding Based on P-LDPC Codes for Radiography Images Transmission. Huihui Wu, Jiguang He, Liangliang Xu, Lin Wang |
| 2012 | K-Anonymous Cloaking Algorithm Based on Weighted Adjacency Graph for Preserving Location Privacy. Amina Hossain, Al-Amin Hossain, Sung-Jae Jang, Young-Sung Shin, Jae-Woo Chang |
| 2012 | Knowledge Acquisition and Management Architecture for Mobile and Personal Health Environments Based on the Internet of Things. Antonio J. Jara, Miguel A. Zamora, Antonio Fernandez Gómez-Skarmeta |
| 2012 | Link Stability Evaluation and Stability Based Multicast Routing Protocol in Mobile Ad Hoc Networks. Zhiyong Zhang, Zhiping Jia, Hui Xia |
| 2012 | Locating the Attacker of Wormhole Attack by Using the Honeypot. T. Divya Sai Keerthi, Pallapa Venkataram |
| 2012 | Location Assisted Vertical Handover Algorithm for QoS Optimization in End-to-end Connections. Martin S. Dam, Steffen Christensen, Lars Møller Mikkelsen, Rasmus L. Olsen |
| 2012 | Location-Based Authentication and Authorization Using Smart Phones. Feng Zhang, Aron Kondoro, Sead Muftic |
| 2012 | Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs. Humaira Ehsan, Farrukh Aslam Khan |
| 2012 | Measuring Anonymity by Profiling Probability Distributions. Rajiv Bagai, Nan Jiang |
| 2012 | Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs. Yuanbo Guo, Jianfeng Ma, Chao Wang, Liangmin Wang |
| 2012 | Mechanism Design Based Secure Data Object Replication. Minzhe Guo, Prabir Bhattacharya |
| 2012 | Messing with Android's Permission Model. André Egners, Ulrike Meyer, Björn Marschollek |
| 2012 | Mitigating SPIT with Social Strength. M. Ajmal Azad, Ricardo Morla |
| 2012 | Modeling an Enhanced Tuple Space Based Mobile Middleware in UNITY. Suddhasil De, Sukumar Nandi, Diganta Goswami |
| 2012 | Modelling of Prioritised Vertical Handoff Scheme in Integrated UMTS/WLANs. Zaid Ahmed Said Zabanoot, Geyong Min |
| 2012 | Modelling of Secure Data Transmission over a Multichannel Wireless Network in Alloy. Aliaa M. Alabdali, Lilia Georgieva, Greg Michaelson |
| 2012 | More Choices, More Control: Extending Access Control by Meta-rights Reallocation. Adnan Ahmad, Brian Whitworth, Lech J. Janczewski |
| 2012 | Multiplayer Game Technology to Manage Critical Infrastructure Protection. Laura Pla Beltran, Madjid Merabti, Qi Shi |
| 2012 | Multiple QoT Constrained Social Trust Path Selection in Complex Social Networks. Guanfeng Liu, Yan Wang, Duncan S. Wong |
| 2012 | Network Coding-Based Mutual Anonymity Communication Protocol for Mobile P2P Networks. Zhi-yuan Li, Liangmin Wang, Siguang Chen |
| 2012 | Offline RFID Grouping Proofs with Trusted Timestamps. Cunqing Ma, Jingqiang Lin, Yuewu Wang, Ming Shang |
| 2012 | On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters. Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka |
| 2012 | On Increasing the Computational Efficiency of Long Integer Multiplication on FPGA. Ismail San, Nuray At |
| 2012 | On a Visual Secret Sharing Scheme with High Quality Decryption. Vipin Kumar, Chirag Chetan, Aparajita Ojha |
| 2012 | Optimal Resource Allocation for Multi-layered Video Streaming over Multi-channel Cognitive Radio Networks. Bo Guan, Yifeng He |
| 2012 | Optimal State Management of Data Sharing in Online Social Network (OSN) Services. Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat |
| 2012 | Overhauling of a ASEA Robot IR6 with Open Architecture. Marcelo Henrique Souza Bomfim, R. A. Gontijo, Alexandre Queiroz Bracarense, Eduardo Jose Lima II |
| 2012 | Padati: A Robust Pedestrian Dead Reckoning System on Smartphones. Deepak Pai, Sasi Inguva, Phani Shekhar Mantripragada, Mudit Malpani, Nitin Aggarwal |
| 2012 | Performance Evaluation of Shared Hosting Security Methods. Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan |
| 2012 | Performance Study of Localization Techniques in Wireless Body Area Sensor Networks. Obaid Ur Rehman, Nadeem Javaid, Ayesha Bibi, Zahoor Ali Khan |
| 2012 | Performances of CS-DCSK UWB Communication System in the Presence of Narrow Band Interferers. Zhixiong Chen, Weikai Xu, Jin Huang, Lin Wang |
| 2012 | Practicable Unified Security, Trust and Privacy (STP) Framework for Federated Access Management (FAM). Jamalul-lail Ab Manan, Zubair Ahmad Khattak, Suziah Sulaiman |
| 2012 | Prediction-Based Algorithm for Event Detection in Wireless Sensor Networks. Yongji Yu, Zhiping Jia, Ruihua Zhang |
| 2012 | Privacy Protecting by Multiattribute Clustering in Data-Intensive Service. Qing Zhu, Ning Li |
| 2012 | Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment. Ronald Petrlic |
| 2012 | Privacy-Preserving Statistical Analysis Method for Real-World Data. Jun Ishii, Hiroyuki Maeomichi, Ikuo Yoda |
| 2012 | Provable Data Possession Using Sigma-protocols. Akshaya Mohan, Rajendra S. Katti |
| 2012 | Provably Secure Single Sign-on Scheme in Distributed Systems and Networks. Jiangshan Yu, Guilin Wang, Yi Mu |
| 2012 | Provably Secure Two-Party Explicit Authenticated Key Agreement Protocol. Minghui Zheng, Jing Chen |
| 2012 | Quality Assessment of Video Transmission in Heterogeneous Networks as Applied to Real-Time Telecare. Colin Bailey, Xiao-Hong Peng |
| 2012 | RFID Mutual Authentication and Secret Update Protocol for Low-Cost Tags. Mohamed A. Sharaf |
| 2012 | Radio Frequency Energy Harvesting Characterization: An Experimental Study. Uthman Baroudi, Amin-ud-din Qureshi, Samir Mekid, Abdelhafid Bouhraoua |
| 2012 | Random4: An Application Specific Randomized Encryption Algorithm to Prevent SQL Injection. Srinivas Avireddy, Varalakshmi Perumal, Narayan Gowraj, Ram Srivatsa Kannan, Prashanth Thinakaran, Sundaravadanam Ganapthi, Jashwant Raj Gunasekaran, Sruthi Prabhu |
| 2012 | Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic Analysis. Lei (Chris) Liu, Xiaolong Jin, Geyong Min, Li Xu |
| 2012 | Real-Time Distributed Sensor-Assisted mHealth Applications on the Internet-of-Things. Stefan Forsström, Theo Kanter, Olle Johansson |
| 2012 | RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis. Ismail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Ching-Hao Mao, Te-En Wei, Shyi-Ming Chen |
| 2012 | Reputation Based Security Model for Android Applications. Welderufael Berhane Tesfay, Todd Booth, Karl Andersson |
| 2012 | Reputation Diffusion Simulation for Avoiding Privacy Violation. David Pergament, Armen Aghasaryan, Jean-Gabriel Ganascia |
| 2012 | Research on Cooperative Learning of Digital English Writing in Network Environment. Xiaodong Li, Hong Zhang |
| 2012 | Research on Embedding ECC into RFID Authentication Protocol. Guicheng Shen, Bingwu Liu |
| 2012 | Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlation. Zhijun Wu, Lan Ma, Minghua Wang, Meng Yue, Lu Wang |
| 2012 | Research on Trust Issue of Current Chinese C2C E-commerce: Problems and Solutions. Yu Zhang |
| 2012 | Resources Collaborative Scheduling Model Based on Trust Mechanism in Cloud. Kun Lu, Hua Jiang, Mingchu Li, Sheng Zhao, Jianhua Ma |
| 2012 | Restricted Identification without Group Keys. Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Miroslaw Kutylowski |
| 2012 | Reusable and Extensible Fault Tolerance for RESTful Applications. John Edstrom, Eli Tilevich |
| 2012 | Ring Group Signatures. Liqun Chen |
| 2012 | Robot Navigation Using Brain-Computer Interfaces. Athanasios Vourvopoulos, Fotis Liarokapis |
| 2012 | Robust Biometric Based Key Agreement and Remote Mutual Authentication. Hisham Al-Assam, Sabah Jassim |
| 2012 | Role Based Privacy-Aware Secure Routing in WMNs. Hui Lin, Jia Hu, Atulya Nagar, Li Xu |
| 2012 | SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services. René Hummen, Jan Henrik Ziegeldorf, Tobias Heer, Hanno Wirtz, Klaus Wehrle |
| 2012 | Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing. Qiwei Lu, Yan Xiong, Xudong Gong, Wenchao Huang |
| 2012 | Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid. Mohammad Ashiqur Rahman, Libin Bai, Mohamed Shehab, Ehab Al-Shaer |
| 2012 | Secure Reputation Framework for BitTorrent. Hani Ragab Hassen, Olga Jones, Nikos Galanis |
| 2012 | Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs. Yihong Zang, Johnson P. Thomas, Gheorghita Ghinea, Mathews Thomas, Salaheddin Darwish |
| 2012 | Securing Trusted Execution Environments with PUF Generated Secret Keys. Matthew Areno, Jim Plusquellic |
| 2012 | Security Aspects of Soft Verified Messages Protected by Message Authentication Codes. Natasa Zivic |
| 2012 | Security Attribute Aggregation Models for E-research Collaborations. Richard O. Sinnott, Christopher Bayliss, Gerson Galang, Damien Mannix, Martin Tomko |
| 2012 | Security Issues of a Publicly Accessible Cloud Computing Infrastructure. Gordon Russell, Richard Macfarlane |
| 2012 | Security Server-Based Architecture for Mobile Ad Hoc Networks. Salaheddin Darwish, Simon J. E. Taylor, Gheorghita Ghinea |
| 2012 | Security and Trust Preserving VM Migrations in Public Clouds. Mudassar Aslam, Christian Gehrmann, Mats Björkman |
| 2012 | Self-Protecting Documents for Cloud Storage Security. Manuel Munier, Vincent Lalanne, Magali Ricarde |
| 2012 | Semantic Decision Support Models for Energy Efficiency in Smart-Metered Homes. Yan Tang, Ioana Ciuciu |
| 2012 | Simulatable Oblivious Transfer Protocols Based on Blind Signature. Jing Qin, Jiankun Hu, Huawei Zhao |
| 2012 | Social Network Content Management through Watermarking. Athanasios Zigomitros, Achilleas Papageorgiou, Constantinos Patsakis |
| 2012 | Square-Root Unscented Kalman Filtering Based Localization and Tracking in the Internet of Things. Junqi Guo, Hongyang Zhang, Yunchuan Sun, Rongfang Bie |
| 2012 | Static Detection of Logic Vulnerabilities in Java Web Applications. Ying Kong, Yuqing Zhang, Zhejun Fang, Qixu Liu |
| 2012 | Subversion Impedance in Covert Communication Networks. Timothy Nix, Riccardo Bettati |
| 2012 | Sufficient Encryption with Codewords and Bin-strings of H.264/SVC. Mamoona Naveed Asghar, Mohammad Ghanbari, Martin J. Reed |
| 2012 | TREASURE: Trust Enhanced Security for Cloud Environments. Vijay Varadharajan, Udaya Kiran Tupakula |
| 2012 | TSD: A Flexible Root of Trust for the Cloud. Dexian Chang, Xiaobo Chu, Yu Qin, Dengguo Feng |
| 2012 | Testing Method of Code Redundancy Simplification Based on Program Dependency Graph. Fan Yang, Huanguo Zhang, Fei Yan, Jian Yang |
| 2012 | The Current State of Understanding of the Energy Efficiency of Cloud Computing. Francis Owusu, Colin Pattinson |
| 2012 | The Effectiveness of Intersection Attack Countermeasures for Graphical Passwords. Rosanne English, Ron Poet |
| 2012 | The Impact of Sensor Node Distribution on Routing Protocols Performance: A Comparitive Study. Uthman Baroudi, Anas Al-Roubaiey, Samir Mekid, Abdelhafid Bouhraoua |
| 2012 | The Load Balancing Problem in Extended OTIS-n-Cube Interconnection Networks. Jehad Al-Sadi |
| 2012 | The Multi-layer Imbrication for Data Leakage Prevention from Mobile Devices. Charles Perez, Babiga Birregah, Marc Lemercier |
| 2012 | The Research and Application of a Specific Instruction Processor for SMS4. Zhenzhou Li, Feng Li, Zhiping Jia, Lei Ju, Renhai Chen |
| 2012 | Time- and Frequency-Domain Impulsive Noise Spreader for OFDM Systems. S. Nayyef, Charalampos Tsimenidis, Arafat Al-Dweik, Bayan S. Sharif, Ali Hazmi |
| 2012 | Toward Authenticated and Complete Query Results from Cloud Storages. Fu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen |
| 2012 | Towards Safe and Optimal Network Designs Based on Network Security Requirements. Nihel Ben Youssef Ben Souayeh, Adel Bouhoula |
| 2012 | Towards Semantic-Enhanced Attribute-Based Access Control for Cloud Services. Zahid Iqbal, Josef Noll |
| 2012 | Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. Arshad Jhumka, Matthew Bradbury, Matthew Leeke |
| 2012 | Towards a Formal Verification of a Multi-factor Authentication Protocol Using Automated Theorem Provers. Eduardo dos Santos, Jean Everson Martina, Ricardo Felipe Custódio |
| 2012 | Tracking of Data Leaving the Cloud. Yu Shyang Tan, Ryan K. L. Ko, Peter Jagadpramana, Chun Hui Suen, Markus Kirchberg, Teck Hooi Lim, Bu-Sung Lee, Anurag Singla, Ken Mermoud, Doron Keller, Ha Duc |
| 2012 | Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu |
| 2012 | Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems. Lan Zhou, Vijay Varadharajan, Michael Hitchens |
| 2012 | Trustworthy Infrastructure Services for a Secure and Privacy-Respecting Internet of Things. Dennis Gessner, Alexis Olivereau, Alexander Salinas Segura, Alexandru Serbanati |
| 2012 | U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks. Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda |
| 2012 | Ubiquitous HealthCare in Wireless Body Area Networks. Naveed A. Khan, Nadeem Javaid, Zahoor Ali Khan, M. Jaffar, U. Rafiq, Ayesha Bibi |
| 2012 | Ubiquitous Secure Interactions with Intelligent Artifacts on the Internet-of-Things. Stefan Forsström, Theo Kanter, Patrik Österberg |
| 2012 | Unwanted Traffic Control via Hybrid Trust Management. Zheng Yan, Raimo Kantola, Yue Shen |
| 2012 | User Preferences-Adaptive Dynamic Network Selection Approach in Cooperating Wireless Networks: A Game Theoretic Perspective. Haris Pervaiz, Qiang Ni |
| 2012 | User Satisfaction Based ZFBF Scheduling Algorithm in Multi-user MIMO System. Hailang Cao, Ping Wang, Lei Chen, Fuqiang Liu, Xinhong Wang, Yin Zhu, Huifang Pang |
| 2012 | Using Subjective Logic to Handle Uncertainty and Conflicts. Murat Sensoy, Jeff Z. Pan, Achille Fokoue, Mudhakar Srivatsa, Felipe Meneguzzi |
| 2012 | VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks. Yang Qin, Dijiang Huang, Xinwen Zhang |
| 2012 | VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification. Fei Wang, Xiaofeng Wang, Jinshu Su, Bin Xiao |
| 2012 | Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments. Nicholas Charles Patterson, Michael Hobbs, Jemal H. Abawajy |
| 2012 | Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Email Addresses. Tobias Hahn, Thomas Kunz, Markus Schneider, Sven Vowe |
| 2012 | WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS. Caner Kilinc, Todd Booth, Karl Andersson |
| 2012 | Weighted Flow and Spectral Resource to Enhance QoS for Multi-hop Cognitive Radio Networks. Yean-Fu Wen |
| 2012 | Window Energy Detection for Unmanned Surveillance with PIR Sensor. Sang Gi Hong, Young Bag Moon, Naesoo Kim, Whan Woo Kim |
| 2012 | Wire - A Formal Intermediate Language for Binary Analysis. Silvio Cesare, Yang Xiang |