| 2014 | 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014 |
| 2014 | A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data. Fucai Zhu, Xingyang He, Shuang Wang, Jian Xu, Mingwei Wang, Lina Wu |
| 2014 | A Compact Hardware Implementation of SM3 Hash Function. Tianyong Ao, Zhangqing He, Jinli Rao, Kui Dai, Xuecheng Zou |
| 2014 | A Evaluation Method for Web Service with Large Numbers of Historical Records. Lianyong Qi, Jiancheng Ni, Xiaona Xia, Chao Yan, Hua Wang, Wanli Huang |
| 2014 | A High Speed Lossless Compression Algorithm Based on CPU and GPU Hybrid Platform. Bin Zhou, Hai Jin, Ran Zheng |
| 2014 | A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks. Chongxian Guo, Huaqiang Xu, Lei Ju, Zhiping Jia, Jihai Xu |
| 2014 | A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform. Bo Yang, Dengguo Feng, Yu Qin |
| 2014 | A Load Balancing Strategy of SDN Controller Based on Distributed Decision. Yuanhao Zhou, Mingfa Zhu, Limin Xiao, Li Ruan, Wenbo Duan, Deguo Li, Rui Liu, Mingming Zhu |
| 2014 | A Machine Learning Based Trust Evaluation Framework for Online Social Networks. Kang Zhao, Li Pan |
| 2014 | A Novel Feature Selection Approach for Intrusion Detection Data Classification. Mohammed A. Ambusaidi, Xiangjian He, Zhiyuan Tan, Priyadarsi Nanda, Liang Fu Lu, Upasana T. Nagar |
| 2014 | A Novel Public Key Encryption Scheme for Large Image. Lingjiao Chen, Xinji Chen, Zhigang Peng |
| 2014 | A Practically Optimized Implementation of Attribute Based Cryptosystems. Chunqiang Hu, Fan Zhang, Tao Xiang, Hongjuan Li, Xiao Xiao, Guilin Huang |
| 2014 | A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures. Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai |
| 2014 | A Proposal for a Reference Architecture for Long-Term Archiving, Preservation, and Retrieval of Big Data. Phillip Viana, Liria M. Sato |
| 2014 | A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Zhiyuan Tan, Ren Ping Liu |
| 2014 | A Secure Authentication Protocol for IP-Based Wireless Sensor Communications Using the Location/ID Split Protocol (LISP). Ali Hussein Raheem, Aboubaker Lasebae, Jonathan Loo |
| 2014 | A Semantic Knowledge Base Construction Method for Information Security. Yuangang Yao, Xiaoyu Ma, Hui Liu, Jin Yi, Xianghui Zhao, Lin Liu |
| 2014 | A Stateful Mechanism for the Tree-Rule Firewall. Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan |
| 2014 | A Study on Recursive Neural Network Based Sentiment Classification of Sina Weibo. Chen Fu, Bai Xue, Zhan Shaobin |
| 2014 | A Survey of Security Network Coding toward Various Attacks. Shixiong Yao, Jing Chen, Ruiying Du, Lan Deng, Chiheng Wang |
| 2014 | AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security. Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri |
| 2014 | Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit. Mu Yang, Yijun Yu, Arosha K. Bandara, Bashar Nuseibeh |
| 2014 | Adding Privacy to Multicast DNS Service Discovery. Daniel Kaiser, Marcel Waldvogel |
| 2014 | Aeromancer: A Workflow Manager for Large-Scale MapReduce-Based Scientific Workflows. Mohamed Nabeel, Nabanita Maji, Jing Zhang, Nataliya Timoshevskaya, Wu-chun Feng |
| 2014 | An Effective Path Load Balancing Mechanism Based on SDN. Jun Li, Xiangqing Chang, Yongmao Ren, Zexin Zhang, Guodong Wang |
| 2014 | An Improved Image File Storage Method Using Data Deduplication. Zhou Lei, Zhaoxin Li, Yu Lei, Yanling Bi, Luokai Hu, Wenfeng Shen |
| 2014 | An On-Line Anomaly Detection Method Based on a New Stationary Metric - Entropy-Ratio. Ziyu Wang, Jiahai Yang, Fuliang Li |
| 2014 | Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN. Guorui Li, Ying Liu, Ying Wang |
| 2014 | Anonymous Proxy Signature with Restricted Traceability. Jiannan Wei, Guomin Yang, Yi Mu |
| 2014 | AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps. Julian Schütte, Dennis Titze, José María de Fuentes |
| 2014 | Attack Tree Based Android Malware Detection with Hybrid Analysis. Shuai Zhao, Xiaohong Li, Guangquan Xu, Lei Zhang, Zhiyong Feng |
| 2014 | Attacks on Physically-Embedded Data Encryption for Embedded Devices. Chaohui Du, Guoqiang Bai |
| 2014 | Automated User Profiling in Location-Based Mobile Messaging Applications. Yao Cheng, Chang Xu, Yi Yang, Lingyun Ying, Purui Su, Dengguo Feng |
| 2014 | Automatically Exploiting Potential Component Leaks in Android Applications. Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon |
| 2014 | BIBRM: A Bayesian Inference Based Road Message Trust Model in Vehicular Ad Hoc Networks. Guanghao Wang, Yue Wu |
| 2014 | BIG DATA: Preconditions to Productivity. Steve Hallman, Jasur Rakhimov, Michel Plaisent, Prosper Bernard |
| 2014 | Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs. Licai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang |
| 2014 | Big Data Analyses for Collective Opinion Elicitation in Social Networks. Yingxu Wang, Victor J. Wiebe |
| 2014 | CAFS: A Framework for Context-Aware Federated Services. Md Sadek Ferdous, Ron Poet |
| 2014 | Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords. Hani Moaiteq Aljahdali, Ron Poet |
| 2014 | Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation Context. Yuanlong Cao, Jianfeng Guan, Changqiao Xu, Wei Quan, Hongke Zhang |
| 2014 | Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager. Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron |
| 2014 | Computation Integrity Measurement Based on Branch Transfer. Jianming Fu, Yan Lin, Xu Zhang, Pengwei Li |
| 2014 | Continuous Certification of Non-repudiation in Cloud Storage Services. Maria Krotsiani, George Spanoudakis |
| 2014 | Convergence of True Cooperations in Bayesian Reputation Game. Jooyoung Lee, Jae C. Oh |
| 2014 | Crowd Sensing of Urban Emergency Events Based on Social Media Big Data. Zheng Xu, Hui Zhang, Yunhuai Liu, Lin Mei |
| 2014 | Data Interface All-iN-A-Place (DIANA) for Big Data. Frank Zhigang Wang, Theo Dimitrakos, Na Helian, Sining Wu, Yuhui Deng, Ling Li, Rodric Yates |
| 2014 | Data Mining Application of Decision Trees for Student Profiling at the Open University of China. Wilton W. T. Fok, Haohua Chen, Jiaqu Yi, Sizhe Li, H. H. Au Yeung, Wang Ying, Liu Fang |
| 2014 | Data-centric Rogue Node Detection in VANETs. Kamran Zaidi, Milos Milojevic, Veselin Rakocevic, Muttukrishnan Rajarajan |
| 2014 | Defensor: Lightweight and Efficient Security-Enhanced Framework for Android. Xuerui Pan, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang |
| 2014 | Design and Analysis of a New Feature-Distributed Malware. Byungho Min, Vijay Varadharajan |
| 2014 | Detect Android Malware Variants Using Component Based Topology Graph. Tong Shen, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang |
| 2014 | Detection of Android Malicious Apps Based on the Sensitive Behaviors. Daiyong Quan, Lidong Zhai, Fan Yang, Peng Wang |
| 2014 | Digital Trust - Trusted Computing and Beyond: A Position Paper. Raja Naeem Akram, Ryan K. L. Ko |
| 2014 | Efficient Traceable Attribute-Based Signature. Shenglong Ding, Yiming Zhao, Yuyang Liu |
| 2014 | Efficiently Attribute-Based Access Control for Mobile Cloud Storage System. Zhiquan Lv, Jialin Chi, Min Zhang, Dengguo Feng |
| 2014 | Emergency Key Rollover in DNSSEC. Zheng Wang, Liyuan Xiao |
| 2014 | Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services. Yong Ho Hwang, Jae Woo Seo, Il Joo Kim |
| 2014 | Encrypted Program Execution. Dmytro Zhuravlev, Ihor Samoilovych, Roman Orlovskyi, Ievgen V. Bondarenko, Yaroslav Lavrenyuk |
| 2014 | Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud. Quang Do, Ben Martini, Kim-Kwang Raymond Choo |
| 2014 | EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor. Liang Deng, Qingkai Zeng, Weiguang Wang, Yao Liu |
| 2014 | Escrow: A Large-Scale Web Vulnerability Assessment Tool. Baden Delamore, Ryan K. L. Ko |
| 2014 | Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation. Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan |
| 2014 | FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. Yu Zhang, Jing Chen, Ruiying Du, Lan Deng, Yang Xiang, Qing Zhou |
| 2014 | FedLoop: Looping on Federated MapReduce. Chunyu Wang, Tzu-Li Tai, Kuan-Chieh Huang, Tse-En Liu, Jyh-Biau Chang, Ce-Kuen Shieh |
| 2014 | Garbling in Reverse Order. Tommi Meskanen, Valtteri Niemi, Noora Nieminen |
| 2014 | HBaseSpatial: A Scalable Spatial Data Storage Based on HBase. Ningyu Zhang, Guozhou Zheng, Huajun Chen, Jiaoyan Chen, Xi Chen |
| 2014 | High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields. Shuai Liu, Lei Ju, Xiaojun Cai, Zhiping Jia, Zhiyong Zhang |
| 2014 | Identifying P2P Network Activities on Encrypted Traffic. Xiaolei Wang, Jie He, Yuexiang Yang |
| 2014 | Improved 2DLDA Algorithm and Its Application in Face Recognition. Dong Wang, Shunfang Wang |
| 2014 | In-Map/In-Reduce: Concurrent Job Execution in MapReduce. Muhammad Idris, Shujaat Hussain, Sungyoung Lee |
| 2014 | Integrity Levels: A New Paradigm for Protecting Computing Systems. Christipher Jenkins, Lyndon Pierson |
| 2014 | Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments. Michael Weiß, Steffen Wagner, Roland Hellman, Sascha Wessel |
| 2014 | JVM-Based Dynamic Attestation in Cloud Computing. Haihe Ba, Zhiying Wang, Jiangchun Ren, Huaizhe Zhou |
| 2014 | Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart Posters. Sufian Hameed, Bilal Hameed, Syed Atyab Hussain, Waqas Khalid |
| 2014 | Long Term Tracking and Characterization of P2P Botnet. Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Dengguo Feng |
| 2014 | MapReduce for Large-Scale Monitor Data Analyses. Jianwei Ding, Yingbo Liu, Li Zhang, Jianmin Wang |
| 2014 | Mining Specification of Insecure Browser Extension Behavior. Hongbin Pei, Xiaohong Li, Guangquan Xu, Zhiyong Feng |
| 2014 | Modeling Degrees of Fairness for Collaborations. Florian Volk, Maria Pelevina, Sheikh Mahbub Habib, Sascha Hauke, Max Mühlhäuser |
| 2014 | Modeling of Data Provenance on Space and Time Based on OPM. Jiehua Kang, Guoyan Xu |
| 2014 | Multi-dimensions of Developer Trustworthiness Assessment in OSS Community. Yu Bai, Gang Yin, Huaimin Wang |
| 2014 | Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems. Uthpala Subodhani Premarathne, Ibrahim Khalil |
| 2014 | Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy Clustering. Duo Liu, Chung-Horng Lung, Nabil Seddigh, Biswajit Nandy |
| 2014 | ONHelp: Components in Building Secure Cloud Based on OpenNebula. Kao Zhao, Hai Jin, Deqing Zou, Weiqi Dai |
| 2014 | On Energy Efficient Scheduling and Load Distribution Based on Renewable Energy for Wireless Mesh Network in Disaster Area. Meng Li, Hiroki Nishiyama, Yasunori Owada, Kiyoshi Hamaguchi |
| 2014 | On the Application and Performance of MongoDB for Climate Satellite Data. Parinaz Ameri, Udo Grabowski, Jörg Meyer, Achim Streit |
| 2014 | One Kind of Cross-Domain DAA Scheme from Bilinear Mapping. Xiaoming Wang, Heyou Cheng, Ruihua Zhang |
| 2014 | Overhead-Free In-Place Recovery Scheme for XOR-Based Storage Codes. Ximing Fu, Zhiqing Xiao, Shenghao Yang |
| 2014 | Performance Analysis on M2M Communication Network Based on Stochastic Network Calculus. Tao Zhou, Quan Wang, Gao-Cai Wang |
| 2014 | Performance Evaluation of the SSD-Based Swap System for Big Data Processing. Jaehun Lee, Sungmin Park, Minsoo Ryu, Sooyong Kang |
| 2014 | Personal Data Access Based on Trust Assessment in Mobile Social Networking. Zheng Yan, Xueyun Li, Raimo Kantola |
| 2014 | Practical Assessment of Biba Integrity for TCG-Enabled Platforms. Roberto Sassu, Gianluca Ramunno, Antonio Lioy |
| 2014 | Privacy Aware Non-linear Support Vector Machine for Multi-source Big Data. Yunmei Lu, Piyaphol Phoungphol, Yanqing Zhang |
| 2014 | Private Outsourcing of Polynomial Functions. Peili Li, Haixia Xu, Jiaqi Hong |
| 2014 | PrivateDroid: Private Browsing Mode for Android. Su Mon Kywe, Christopher B. Landis, Yutong Pei, Justin Satterfield, Yuan Tian, Patrick Tague |
| 2014 | Proofs of Ownership and Retrievability in Cloud Storage. Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng |
| 2014 | Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited. Hui Cui, Yi Mu, Man Ho Au |
| 2014 | Reaching Agreement in Security Policy Negotiation. Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey |
| 2014 | Remembrance of Local Information Status for Enforcing Robustness of Policy-Exchanged Strategies for Trust Negotiation. Yunxi Zhang, Darren Mundy |
| 2014 | Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept. Ben Martini, Kim-Kwang Raymond Choo |
| 2014 | Research of Provenance Storage in Cloud Computing Environment. Zhangxuan Luo, Guoyan Xu |
| 2014 | SARAH - Statistical Analysis for Resource Allocation in Hadoop. Bruce Martin |
| 2014 | SIMS: A Comprehensive Approach for a Secure Instant Messaging Sifter. Günter Fahrnberger |
| 2014 | Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR. Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes |
| 2014 | Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain. Conghuan Ye, Zenggang Xiong, Yaoming Ding, Jiping Li, Guangwei Wang, Xuemin Zhang, Kaibing Zhang |
| 2014 | Secure and Privacy-Friendly Public Key Generation and Certification. Fábio Borges, Leonardo A. Martucci, Filipe Beato, Max Mühlhäuser |
| 2014 | SigmoRep: A Robust Reputation Model for Open Collaborative Environments. Ahmad A. Kardan, Reza Salarmehr, Azade Farshad |
| 2014 | SocAware: A Middleware for Social Applications in Online Social Networks. Liang Chen, Kan Chen, Chengcheng Shao, Peidong Zhu |
| 2014 | Survey of Integrity Detection Methods in Internet of Things. Chaoliang Li, Qin Li, Guojun Wang |
| 2014 | Synthesising End-to-End Security Protocols. Charles Thevathayan, Peter Bertók, George Fernandez |
| 2014 | Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones. Zhihui Han, Liang Cheng, Yang Zhang, Shuke Zeng, Yi Deng, Xiaoshan Sun |
| 2014 | TEEI - A Mobile Security Infrastructure for TEE Integration. Hongfeng Chai, Zhijun Lu, Qingyang Meng, Jun Wang, Xiubang Zhang, Zhijian Zhang |
| 2014 | TTPCookie: Flexible Third-Party Cookie Management for Increasing Online Privacy. Ashar Javed, Christian Merz, Jörg Schwenk |
| 2014 | Temporal Access Control with User Revocation for Cloud Data. Nihal Balani, Sushmita Ruj |
| 2014 | The Evaluation of Emulab as an Environment for Bio-Informatics Research. Kyungwoo Kang, Yunhee Kang, Sungjin Sul |
| 2014 | The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack. Ya Tan, Jizeng Wei, Wei Guo |
| 2014 | Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs. Wei Gao, Mingzhong Wang, Liehuang Zhu, Xiaoping Zhang |
| 2014 | ToAuth: Towards Automatic Near Field Authentication for Smartphones. Weixi Gu, Zheng Yang, Longfei Shangguan, Xiaoyu Ji, Yiyang Zhao |
| 2014 | Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. Wenjuan Li, Weizhi Meng, Zhiyuan Tan, Yang Xiang |
| 2014 | Towards Policy Retrieval for Provenance Based Access Control Model. Jisheng Pei, Xiaojun Ye |
| 2014 | Towards Robust and Effective Trust Management for Security: A Survey. Dongxia Wang, Tim Muller, Yang Liu, Jie Zhang |
| 2014 | Trust Enhanced Cloud Security for Healthcare Services. Udaya Kiran Tupakula, Vijay Varadharajan |
| 2014 | Trust Mechanism for Enforcing Compliance to Secondary Data Use Contracts. Zeinab Noorian, Johnson Iyilade, Mohsen Mohkami, Julita Vassileva |
| 2014 | Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs. Hui Xia, Jia Yu, Zhiyong Zhang, Xiangguo Cheng, Zhenkuan Pan |
| 2014 | Trusted Geolocation-Aware Data Placement in Infrastructure Clouds. Nicolae Paladi, Mudassar Aslam, Christian Gehrmann |
| 2014 | Ultra High-Speed SM2 ASIC Implementation. Zhenwei Zhao, Guoqiang Bai |
| 2014 | Unified Model for Data Security - A Position Paper. Raja Naeem Akram, Ryan K. L. Ko |
| 2014 | Untrusted User Detection in Microblogs. Zidan Yu, Huiqun Yu |
| 2014 | VALID: A Web Framework for Visual Analytics of Large Streaming Data. Chenhui Li, George Baciu |
| 2014 | Visual Similarity Based Anti-phishing with the Combination of Local and Global Features. Yu Zhou, Yongzheng Zhang, Jun Xiao, Yipeng Wang, Weiyao Lin |
| 2014 | vPatcher: VMI-Based Transparent Data Patching to Secure Software in the Cloud. Hao Zhang, Lei Zhao, Lai Xu, Lina Wang, Deming Wu |