


default search action
11th TrustCom 2012: Liverpool, United Kingdom
- Geyong Min, Yulei Wu, Lei (Chris) Liu, Xiaolong Jin, Stephen A. Jarvis, Ahmed Yassin Al-Dubai:

11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2172-3
TrustCom-2012: The 11th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications
Attack and Defense
- Rosanne English

, Ron Poet:
The Effectiveness of Intersection Attack Countermeasures for Graphical Passwords. 1-8 - Haichang Gao, Wei Wang, Ye Fan:

Divide and Conquer: An Efficient Attack on Yahoo! CAPTCHA. 9-16 - Johannes Barnickel, Jian Wang, Ulrike Meyer:

Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode. 17-24 - Zhijun Wu, Lan Ma, Minghua Wang, Meng Yue, Lu Wang:

Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlation. 25-32 - Zhiyuan Tan

, Aruna Jamdagni, Xiangjian He
, Priyadarsi Nanda, Ren Ping Liu:
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. 33-40 - David Fraga, Zorana Bankovic, José Manuel Moya

:
A Taxonomy of Trust and Reputation System Attacks. 41-50 - Ferdous A. Barbhuiya, S. Roopa, Ritesh Ratti, Santosh Biswas, Sukumar Nandi

:
An Active Detection Mechanism for Detecting ICMP Based Attacks. 51-58
Authentication, Authorization, and Accounting
- Hisham Al-Assam, Sabah Jassim:

Robust Biometric Based Key Agreement and Remote Mutual Authentication. 59-65 - Wencheng Yang, Jiankun Hu

, Song Wang
:
A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication. 66-70 - Mohamed A. Sharaf:

RFID Mutual Authentication and Secret Update Protocol for Low-Cost Tags. 71-77 - Wassim Drira, Éric Renault, Djamal Zeghlache

:
A Hybrid Authentication and Key Establishment Scheme for WBAN. 78-83 - Eduardo dos Santos, Jean Everson Martina

, Ricardo Felipe Custódio:
Towards a Formal Verification of a Multi-factor Authentication Protocol Using Automated Theorem Provers. 84-91 - Mehdi Haddad, Mohand-Said Hacid, Robert Laurini:

Data Integration in Presence of Authorization Policies. 92-99
Trust and Cloud Computing
- Qiwei Lu, Yan Xiong, Xudong Gong, Wenchao Huang:

Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing. 100-108 - Sheikh Mahbub Habib

, Sebastian Ries, Sascha Hauke, Max Mühlhäuser
:
Fusion of Opinions under Uncertainty and Conflict - Application to Trust Assessment for Cloud Marketplaces. 109-118 - Dexian Chang, XiaoBo Chu, Yu Qin, Dengguo Feng:

TSD: A Flexible Root of Trust for the Cloud. 119-126 - Imad M. Abbadi:

Clouds Trust Anchors. 127-136 - Yu Shyang Tan

, Ryan K. L. Ko
, Peter Jagadpramana, Chun Hui Suen, Markus Kirchberg, Teck Hooi Lim, Bu-Sung Lee
, Anurag Singla, Ken Mermoud, Doron Keller, Ha Duc:
Tracking of Data Leaving the Cloud. 137-144 - Vijay Varadharajan

, Udaya Kiran Tupakula:
TREASURE: Trust Enhanced Security for Cloud Environments. 145-152 - Sascha Fahl, Marian Harbach

, Thomas Muders, Matthew Smith:
Confidentiality as a Service - Usable Security for the Cloud. 153-162 - Christopher Harrison, Devin Cook, Robert McGraw, John A. Hamilton Jr.:

Constructing a Cloud-Based IDS by Merging VMI with FMA. 163-169 - Safwan Mahmud Khan, Kevin W. Hamlen:

AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing. 170-176
Detection Scheme (1)
- Nicholas Charles Patterson

, Michael Hobbs
, Jemal H. Abawajy:
Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments. 177-184 - Cunqing Ma, Jingqiang Lin, Yuewu Wang:

Efficient Missing Tag Detection in a Large RFID System. 185-192 - Dijiang Huang

, Sean A. Williams, Swaroop Shere:
Cheater Detection in Vehicular Networks. 193-200 - Quang-Anh Tran, Frank Jiang, Jiankun Hu

:
A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays. 201-208 - Naruemon Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, Chalermpol Charnsripinyo:

A Practical Network-Based Intrusion Detection and Prevention System. 209-214 - Fei Wang, Xiaofeng Wang, Jinshu Su

, Bin Xiao
:
VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification. 215-222
Detection Scheme (2)
- Yuxin Meng

, Wenjuan Li
:
Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment. 223-230 - Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández

, Pedro Garcia-Teodoro:
An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETs. 231-238 - Hongjun Dai, Huabo Liu, Zhiping Jia, Tianzhou Chen:

A Multivariate Classification Algorithm for Malicious Node Detection in Large-Scale WSNs. 239-245 - Xin Liu, Anwitaman Datta

, Hui Fang, Jie Zhang:
Detecting Imprudence of 'Reliable' Sellers in Online Auction Sites. 246-253 - Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:

A Novel Scoring Model to Detect Potential Malicious Web Pages. 254-263 - Lei (Chris) Liu, Xiaolong Jin, Geyong Min, Li Xu:

Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic Analysis. 264-270
Parallel and Distributed Systems
- Jiangshan Yu

, Guilin Wang, Yi Mu:
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks. 271-278 - Mohammad Ashiqur Rahman

, Libin Bai, Mohamed Shehab
, Ehab Al-Shaer:
Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid. 279-286 - Guanghai Cui, Mingchu Li, Zhen Wang, Linlin Tian, Jianhua Ma:

Analysis and Evaluation Framework Based on Spatial Evolutionary Game Theory for Incentive Mechanism in Peer-to-Peer Network. 287-294 - Yi-Ruei Chen, Wen-Guey Tzeng:

Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation. 295-302 - Yuanbo Guo, Jianfeng Ma, Chao Wang, Liangmin Wang:

Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs. 303-309 - Su Chen, Yi Chen, Hai Jiang, Laurence Tianruo Yang, Kuan-Ching Li

:
A Secure Distributed File System Based on Revised Blakley's Secret Sharing Scheme. 310-317
E-commerce and E-government
- Haibin Zhang, Yan Wang

, Xiuzhen Zhang:
Efficient Contextual Transaction Trust Computation in E-commerce Environments. 318-325 - Huiying Duan, Feifei Liu:

Building Robust Reputation Systems in the E-commerce Environment. 326-333 - Qin Li, Jie Zhang, Keith M. Martin:

Feedback as "Shadow of the Present": An Alternative to Reputation Systems for E-marketplaces. 334-341 - Richard O. Sinnott

, Christopher Bayliss, Gerson Galang, Damien Mannix, Martin Tomko
:
Security Attribute Aggregation Models for E-research Collaborations. 342-349 - Zeinab Noorian, Jie Zhang, Michael W. Fleming, Stephen Marsh:

Determining the Optimal Reporting Strategy in Competitive E-marketplaces. 350-357
Privacy (1)
- Amina Hossain, Al-Amin Hossain, Sung-Jae Jang, Young-Sung Shin, Jae-Woo Chang:

K-Anonymous Cloaking Algorithm Based on Weighted Adjacency Graph for Preserving Location Privacy. 358-365 - Rajiv Bagai, Nan Jiang:

Measuring Anonymity by Profiling Probability Distributions. 366-374 - Michael Brenner, Henning Perl, Matthew Smith:

How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation. 375-382 - Raja Naeem Akram, Konstantinos Markantonakis

, Keith Mayes:
A Privacy Preserving Application Acquisition Protocol. 383-392 - Yu-Chih Wei, Yi-Ming Chen:

An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs. 393-400 - David Pergament, Armen Aghasaryan, Jean-Gabriel Ganascia:

Reputation Diffusion Simulation for Avoiding Privacy Violation. 401-408 - Liqun Chen

:
Ring Group Signatures. 409-418 - Mark Stegelmann, Dogan Kesdogan:

GridPriv: A Smart Metering Architecture Offering k-Anonymity. 419-426
Privacy (2)
- M. Francisca Hinarejos

, Josep Lluís Ferrer-Gomila
, Gerard Draper-Gil, Llorenç Huguet i Rotger:
Anonymity and Transferability for an Electronic Bank Check Scheme. 427-435 - Lingchen Zhang, Luning Xia, Zongbin Liu, Jiwu Jing, Yuan Ma:

Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA. 436-442 - Mamoona Naveed Asghar

, Mohammad Ghanbari
, Martin J. Reed:
Sufficient Encryption with Codewords and Bin-strings of H.264/SVC. 443-450 - Mark Vinkovits, Erion Elmasllari, Claudio Pastrone:

Anonymous Networking Meets Real-World Business Requirements. 451-457 - Timothy Nix, Riccardo Bettati:

Subversion Impedance in Covert Communication Networks. 458-465 - Jing Qin

, Jiankun Hu
, Huawei Zhao:
Simulatable Oblivious Transfer Protocols Based on Blind Signature. 466-473 - David Herges, Naim Asaj, Bastian Könings, Florian Schaub

, Michael Weber:
Ginger: An Access Control Framework for Telematics Applications. 474-481 - Marcelo Henrique Souza Bomfim, R. A. Gontijo, Alexandre Queiroz Bracarense, Eduardo Jose Lima II

:
Overhauling of a ASEA Robot IR6 with Open Architecture. 482-489
Network Security (1)
- Jun Zhang

, Chao Chen, Yang Xiang
, Wanlei Zhou
:
Classification of Correlated Internet Traffic Flows. 490-496 - Wei Chang, Jie Wu, Chiu C. Tan:

Cooperative Trajectory-Based Map Construction. 497-504 - André Egners, Ulrike Meyer, Björn Marschollek:

Messing with Android's Permission Model. 505-514 - Silvio Cesare, Yang Xiang

:
Wire - A Formal Intermediate Language for Binary Analysis. 515-524 - René Hummen, Jan Henrik Ziegeldorf, Tobias Heer, Hanno Wirtz, Klaus Wehrle

:
SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services. 525-532 - Wei Zhou, Sheng Wen

, Yini Wang, Yang Xiang
, Wanlei Zhou
:
An Analytical Model on the Propagation of Modern Email Worms. 533-540
Network Security (2)
- Dirk Hoffstadt, Alexander Marold, Erwin P. Rathgeb:

Analysis of SIP-Based Threats Using a VoIP Honeynet System. 541-548 - Laura Pla Beltran, Madjid Merabti, Qi Shi

:
Multiplayer Game Technology to Manage Critical Infrastructure Protection. 549-556 - Jens Köhler, Sebastian Labitzke, Michael Simon, Martin Nussbaumer

, Hannes Hartenstein:
FACIUS: An Easy-to-Deploy SAML-based Approach to Federate Non Web-Based Services. 557-564 - Akshaya Mohan, Rajendra S. Katti:

Provable Data Possession Using Sigma-protocols. 565-572 - Nihel Ben Youssef Ben Souayeh, Adel Bouhoula

:
Towards Safe and Optimal Network Designs Based on Network Security Requirements. 573-579 - Minzhe Guo, Prabir Bhattacharya:

Mechanism Design Based Secure Data Object Replication. 580-587 - Wenyin Yang, Li Ma:

HyperDomain: Enabling Inspection of Malicious VMM's Misbehavior. 588-595 - Fan Zhou, Ruomei Wang, Yu Liu, Yun Liang:

Image Resizing Based on Geometry Preservation with Seam Carving. 596-601
Social Networks
- Faraz Ahmed, Muhammad Abulaish

:
An MCL-Based Approach for Spam Profile Detection in Online Social Networks. 602-608 - Yong Wang, Ting-Ting Zhang, Hong-Zong Li, Long-Ping He, Jing Peng:

Efficient Privacy Preserving Matchmaking for Mobile Social Networking against Malicious Users. 609-615 - Sana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia

:
IRIS: A Novel Method of Direct Trust Computation for Generating Trusted Social Networks. 616-623 - Guanfeng Liu

, Yan Wang
, Duncan S. Wong:
Multiple QoT Constrained Social Trust Path Selection in Complex Social Networks. 624-631 - Alessio Bonti

, Ming Li, Longxiang Gao, Wen Shi:
Effects of Social Characters in Viral Propagation Seeding Strategies in Online Social Networks. 632-639 - Zhengli Xiong, Wenjun Jiang, Guojun Wang:

Evaluating User Community Influence in Online Social Networks. 640-647 - Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat:

Optimal State Management of Data Sharing in Online Social Network (OSN) Services. 648-655
Trust Model and Applications (1)
- Qiwei Lu, Yan Xiong, Wenchao Huang, Xudong Gong, Fuyou Miao:

A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET. 656-665 - Zheng Yan

, Raimo Kantola, Yue Shen:
Unwanted Traffic Control via Hybrid Trust Management. 666-673 - Cunqing Ma, Jingqiang Lin, Yuewu Wang, Ming Shang:

Offline RFID Grouping Proofs with Trusted Timestamps. 674-681 - Graeme Horsman, Christopher Laing

, Paul Vickers
:
A Case Based Reasoning Framework for Improving the Trustworthiness of Digital Forensic Investigations. 682-689 - Rolf Kiefhaber, Gerrit Anders, Florian Siefert, Theo Ungerer, Wolfgang Reif

:
Confidence as a Means to Assess the Accuracy of Trust Values. 690-697
Trust Model and Applications (2)
- Hui Fang, Jie Zhang, Murat Sensoy

, Nadia Magnenat-Thalmann
:
A Generalized Stereotypical Trust Model. 698-705 - Huawei Zhao, Jiankun Hu

, Jing Qin
, Vijay Varadharajan
, Haishan Wan:
Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks. 706-713 - Lan Zhou, Vijay Varadharajan

, Michael Hitchens
:
Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems. 714-721 - Joydeep Chandra, Ingo Scholtes

, Niloy Ganguly
, Frank Schweitzer
:
A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks. 722-729 - XiaoBo Chu, Qin Yu:

A New Efficient Property-Based Attestation Protocol Based on Elliptic Curves. 730-736 - John Edstrom, Eli Tilevich

:
Reusable and Extensible Fault Tolerance for RESTful Applications. 737-744
Mobile and Wireless Communications
- Wibhada Naruephiphat, Yusheng Ji, Chalermpol Charnsripinyo:

An Area-Based Approach for Node Replica Detection in Wireless Sensor Networks. 745-750 - Miao Xie, Jiankun Hu

, Biming Tian:
Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks. 751-759 - Arshad Jhumka, Matthew Bradbury

, Matthew Leeke:
Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. 760-768 - Musfiq Rahman, Srinivas Sampalli:

A Hybrid Key Management Protocol for Wireless Sensor Networks. 769-776 - Yihong Zang, Johnson P. Thomas, Gheorghita Ghinea

, Mathews Thomas, Salaheddin Darwish
:
Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs. 777-784 - Aliaa M. Alabdali, Lilia Georgieva, Greg Michaelson:

Modelling of Secure Data Transmission over a Multichannel Wireless Network in Alloy. 785-792 - Qijun Gu, Wanyu Zang, Meng Yu, Peng Liu:

Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks. 793-800
TrustID-2012: The Second IEEE International Symposium on Trust and Identity in Mobile Internet, Computing, and Communications
- Jesse Leskinen:

Evaluation Criteria for Future Identity Management. 801-806 - Jun Ishii, Hiroyuki Maeomichi, Ikuo Yoda:

Privacy-Preserving Statistical Analysis Method for Real-World Data. 807-812 - Charles Perez, Babiga Birregah

, Marc Lemercier:
The Multi-layer Imbrication for Data Leakage Prevention from Mobile Devices. 813-819 - Yu Chen, Zheng Yan

:
Gemini: A Handbag for Pervasive Social Communications. 820-825 - Qingqi Pei, Lei Li, Hongning Li, Beibei Yuan:

Adaptive Trust Management Mechanism for Cognitive Radio Networks. 826-831 - Yanan Sun, Xiaohong Guan, Ting Liu, Yu Qu

:
An Identity Authentication Mechanism Based on Timing Covert Channel. 832-836
TSCloud-2012: The Second IEEE International Symposium on Trust and Security in Cloud Computing
- Hani Qusa, Roberto Baldoni, Roberto Beraldi:

A Privacy Preserving Scalable Architecture for Collaborative Event Correlation. 837-843 - Zhiqian Xu, Keith M. Martin:

Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage. 844-849 - Tobias Hahn, Thomas Kunz, Markus Schneider, Sven Vowe:

Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Email Addresses. 850-856 - Adrian J. Duncan, Sadie Creese, Michael Goldsmith:

Insider Attacks in Cloud Computing. 857-862 - Kun Lu, Hua Jiang, Mingchu Li, Sheng Zhao, Jianhua Ma:

Resources Collaborative Scheduling Model Based on Trust Mechanism in Cloud. 863-868 - Mudassar Aslam, Christian Gehrmann, Mats Björkman:

Security and Trust Preserving VM Migrations in Public Clouds. 869-876
MWNS-2012: The Third International Symposium on Mobile and Wireless Network Security
- Caner Kilinc, Todd Booth

, Karl Andersson
:
WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS. 877-883 - Yongzhao Zhan, Chunxia Li, Xinsheng Wang, Yuan Zhou, Lu Liu

, Hussain Al-Aqrabi
:
A Secure Node Localization Method Based on the Congruity of Time in Wireless Sensor Networks. 884-889 - Xiaojun Li, Liangmin Wang:

A Rapid Certification Protocol from Bilinear Pairings for Vehicular Ad Hoc Networks. 890-895 - Welderufael Berhane Tesfay, Todd Booth

, Karl Andersson
:
Reputation Based Security Model for Android Applications. 896-901 - Pramod Kumar Singh, Govind Sharma:

An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET. 902-906 - Krishna Doddapaneni, Enver Ever

, Orhan Gemikonakli
, Leonardo Mostarda, Alfredo Navarra
:
Effects of IDSs on the WSNs Lifetime: Evidence of the Need of New Approaches. 907-912 - Ismail Mansour, Gérard Chalhoub, Bassem Bakhache:

Evaluation of a Fast Symmetric Cryptographic Algorithm Based on the Chaos Theory for Wireless Sensor Networks. 913-919 - Thomas Stimpson, Lu Liu

, Yongzhao Zhan:
An Investigation into the Evolution of Security Usage in Home Wireless Networks. 920-925 - Salaheddin Darwish

, Simon J. E. Taylor
, Gheorghita Ghinea
:
Security Server-Based Architecture for Mobile Ad Hoc Networks. 926-930 - David J. Day, Denys A. Flores

, Harjinder Singh Lallie
:
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection. 931-936
UbiSafe-2012: The Fourth IEEE International Symposium on UbiSafe Computing
- Sudip Chakraborty, Krishnendu Roy:

An SLA-based Framework for Estimating Trustworthiness of a Cloud. 937-942 - Chi Lin, Guowei Wu, Lin Yao, Zuosong Liu:

A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive Environments. 943-948 - Hiten Choudhury

, Basav Roychoudhury
, Dilip Kr. Saikia:
Enhancing User Identity Privacy in LTE. 949-957 - Ronald Petrlic:

Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment. 958-963
ACS-2012: The Second IEEE International Symposium on Anonymity and Communication Systems
- Xin Chen, Qiao-lin Hu, Hao Lu, Ge-Ming Xia, Jun Long:

ILACF: An Incentive-Based Low-Latency Anonymous Communication Framework. 964-969 - Rennie Archibald, Dipak Ghosal:

A Covert Timing Channel Based on Fountain Codes. 970-977 - Muhammad Bashir Abdullahi

, Guojun Wang:
A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor Networks. 978-985 - Zhi-yuan Li, Liangmin Wang, Siguang Chen:

Network Coding-Based Mutual Anonymity Communication Protocol for Mobile P2P Networks. 986-991 - Stefan Hofbauer

, Kristian Beckers, Gerald Quirchmayr, Christoph Sorge:
A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example. 992-997
SPIoT-2012: The Second IEEE International Symposium on Security and Privacy in Internet of Things
- Dennis Gessner, Alexis Olivereau, Alexander Salinas Segura

, Alexandru Serbanati:
Trustworthy Infrastructure Services for a Secure and Privacy-Respecting Internet of Things. 998-1003 - Haksoo Choi, Supriyo Chakraborty, Mani B. Srivastava

:
Design and Evaluation of SensorSafe: A Framework for Achieving Behavioral Privacy in Sharing Personal Sensory Information. 1004-1011 - Chunhua Su, Guilin Wang, Kouichi Sakurai:

Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework. 1012-1017 - Chaoliang Li, Guojun Wang:

A Light-Weight Commodity Integrity Detection Algorithm Based on Chinese Remainder Theorem. 1018-1023 - Yair Diaz-Tellez, Eliane L. Bodanese, Srijith K. Nair, Theo Dimitrakos

:
An Architecture for the Enforcement of Privacy and Security Requirements in Internet-Centric Services. 1024-1031
SQC-2012: The Second IEEE International Symposium on Security and Quantum Communications
- Rafael Trapani Possignolo, Cíntia B. Margi

:
A Quantum-classical Hybrid Architecture for Security Algorithms Acceleration. 1032-1037 - Jinjing Shi, Ronghua Shi, Ying Guo, Moon Ho Lee:

A Quantum TITO Diversity Transmission Scheme with Quantum Teleportation of Non-maximally Entangled Bell State. 1038-1041 - Alexander V. Uskov:

Information Security of IPsec-based Mobile VPN: Authentication and Encryption Algorithms Performance. 1042-1048 - Mark Heydenrych, Elizabeth Marie Ehlers:

Inflammation Security: A Decentralised Immune Model for Resource Distribution in Networks. 1049-1056
SOWN-2012: The Second International Workshop on Security and Optimization for Wireless Networks
- Huaqun Wang, Yuqing Zhang, Bo Qin:

Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers. 1057-1062 - Tom Kirkham, Django Armstrong, Karim Djemame

, Marcelo Corrales
, Mariam Kiran, Iheanyi Nwankwo, Ming Jiang, Nikolaus Forgó
:
Assuring Data Privacy in Cloud Transformations. 1063-1069 - Dingning Yang, Yuqing Zhang, Qixu Liu:

BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs. 1070-1076 - Ramzi Bellazreg, Noureddine Boudriga, Mohamed Hamdi:

A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks. 1077-1082 - Ying Kong, Yuqing Zhang, Zhejun Fang, Qixu Liu:

Static Detection of Logic Vulnerabilities in Java Web Applications. 1083-1088 - Sheu M. A. Mavee, Elizabeth Marie Ehlers:

A Multi-agent Immunologically-inspired Model for Critical Information Infrastructure Protection - An Immunologically-inspired Conceptual Model for Security on the Power Grid. 1089-1096
eGSSN-2012: 2012 International Workshop on Trust, Security, and Privacy in e-Government, e-Systems, and Social Networking
- Parisa Memarmoshrefi, Omar Alfandi

, Ansgar Kellner, Dieter Hogrefe:
Autonomous Group-Based Authentication Mechanism in Mobile Ad Hoc Networks. 1097-1102 - Damandeep Kaur, Jyotsna Sengupta:

A Trust Model Based on P2P Trust Models for Secure Global Grids. 1103-1108 - Zhefeng Xiao, Bo Liu, Huaping Hu, Tian Zhang:

Design and Implementation of Facebook Crawler Based on Interaction Simulation. 1109-1112 - Adnan Ahmad

, Brian Whitworth, Lech J. Janczewski
:
More Choices, More Control: Extending Access Control by Meta-rights Reallocation. 1113-1118 - Bushra AlBelooshi, Khaled Salah

, T. Marin, Ahmed Bentiba:
Assessing Overhead Cost Associated with Encrypting Swap File. 1119-1123 - Sadie Creese, Michael Goldsmith, Jason R. C. Nurse, Elizabeth Phillips

:
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. 1124-1131
ISSR-2012: The Fourth IEEE International Workshop on Security in e-Science and e-Research
- Mohammad Ghafari, Hamid Shoja, Mohammad Yosef Amirani:

Detection and Prevention of Data Manipulation from Client Side in Web Applications. 1132-1136 - Syed Naqvi, Arnaud Michot, Michael Van de Borne:

Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud Security. 1137-1142 - Tien-Cheu Kao, Ching-Hao Mao, Chien-Yu Chang, Kai-Chi Chang:

Cloud SSDLC: Cloud Security Governance Deployment Framework in Secure System Development Life Cycle. 1143-1148
ANSEC-2012: The First International Workshop on Anonymity and Security Aspects of Embedded Systems
- Ismail San

, Nuray At:
On Increasing the Computational Efficiency of Long Integer Multiplication on FPGA. 1149-1154 - Martin Pirker

, Daniel Slamanig
:
A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms. 1155-1160 - Johannes Winter:

Experimenting with ARM TrustZone - Or: How I Met Friendly Piece of Trusted Hardware. 1161-1166
TSIS-2012: The 2012 International Symposium on Advances in Trusted and Secure Information Systems
Attack, Defense, and Key Management
- Fahd Al-Haidari, Mohammed H. Sqalli, Khaled Salah

:
Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses. 1167-1174 - T. Divya Sai Keerthi

, Pallapa Venkataram:
Locating the Attacker of Wormhole Attack by Using the Honeypot. 1175-1180 - Humaira Ehsan

, Farrukh Aslam Khan:
Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs. 1181-1187 - Matthew Areno, Jim Plusquellic:

Securing Trusted Execution Environments with PUF Generated Secret Keys. 1188-1193 - Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak

, Miroslaw Kutylowski:
Restricted Identification without Group Keys. 1194-1199 - Vipin Kumar, Chirag Chetan, Aparajita Ojha:

On a Visual Secret Sharing Scheme with High Quality Decryption. 1200-1203
Trust and Cloud Computing
- Fu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen:

Toward Authenticated and Complete Query Results from Cloud Storages. 1204-1209 - Gordon Russell

, Richard Macfarlane:
Security Issues of a Publicly Accessible Cloud Computing Infrastructure. 1210-1216 - Rafael Timóteo de Sousa Júnior

, Edna Dias Canedo
, Robson de Oliveira Albuquerque
, Flavio Elias Gomes de Deus
:
File Exchange in Cloud. 1217-1222 - Zahid Iqbal, Josef Noll:

Towards Semantic-Enhanced Attribute-Based Access Control for Cloud Services. 1223-1230 - Manuel Munier, Vincent Lalanne, Magali Ricarde:

Self-Protecting Documents for Cloud Storage Security. 1231-1238
Detection Scheme
- Muhammad Mujtaba, Priyadarsi Nanda, Xiangjian He

:
Border Gateway Protocol Anomaly Detection Using Failure Quality Control Method. 1239-1244 - Longxiang Gao, Ming Li, Tianqing Zhu, Alessio Bonti

, Wanlei Zhou
, Shui Yu
:
AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs. 1245-1250 - Te-En Wei, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee, Horng-Tzer Wang, Dong-Jie Wu:

Android Malware Detection via a Latent Network Behavior Analysis. 1251-1258 - Lin Chen, Bo Liu, Huaping Hu, Qianbing Zheng:

A Layered Malware Detection Model Using VMM. 1259-1264
Privacy
- Nico Schlitter, Jörg Lässig:

Distributed Privacy Preserving Classification Based on Local Cluster Identifiers. 1265-1272 - Qing Zhu, Ning Li:

Privacy Protecting by Multiattribute Clustering in Data-Intensive Service. 1273-1278 - Shaik Sahil Babu, Arnab Raha

, Mrinal Kanti Naskar, Omar Alfandi
, Dieter Hogrefe:
Fuzzy Logic Election of Node for Routing in WSNs. 1279-1284 - Feng Zhang, Aron Kondoro, Sead Muftic:

Location-Based Authentication and Authorization Using Smart Phones. 1285-1292 - Mahdi Aiash

, Glenford E. Mapp, Raphael C.-W. Phan
, Aboubaker Lasebae, Jonathan Loo
:
A Formally Verified Device Authentication Protocol Using Casper/FDR. 1293-1298 - Minghui Zheng, Jing Chen:

Provably Secure Two-Party Explicit Authenticated Key Agreement Protocol. 1299-1303
Network Security (1)
- Mohd Anuar Mat Isa

, Habibah Hashim, Jamalul-lail Ab Manan, Ramlan Mahmod, Hanunah Othman:
Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System. 1304-1309 - Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan:

Performance Evaluation of Shared Hosting Security Methods. 1310-1315 - Natasa Zivic:

Security Aspects of Soft Verified Messages Protected by Message Authentication Codes. 1316-1322 - Murat Sensoy

, Jeff Z. Pan, Achille Fokoue, Mudhakar Srivatsa, Felipe Meneguzzi
:
Using Subjective Logic to Handle Uncertainty and Conflicts. 1323-1326 - Srinivas Avireddy, Varalakshmi Perumal, Narayan Gowraj, Ram Srivatsa Kannan, Prashanth Thinakaran

, Sundaravadanam Ganapthi, Jashwant Raj Gunasekaran, Sruthi Prabhu:
Random4: An Application Specific Randomized Encryption Algorithm to Prevent SQL Injection. 1327-1333 - Yan Shen, Qifei Zhang, Lingdi Ping, Yan-Fei Wang, Wenjuan Li:

A Multi-tunnel VPN Concurrent System for New Generation Network Based on User Space. 1334-1341 - Xuan Huang, Geoffrey Lund, Andrew Sapeluk:

Development of a Typing Behaviour Recognition Mechanism on Android. 1342-1347
Network Security (2)
- Younchan Jung

, Marnel Peradilla
:
Domain Name to IP Address Resolution System with Multiple Name Servers Adaptable to MANETs. 1348-1357 - Wentao Wang, Yuewu Wang, Jiwu Jing, Zhongwen Zhang:

A Scalable Anonymity Scheme Based on DHT Distributed Inquiry. 1358-1363 - Hani Ragab Hassen, Olga Jones, Nikos Galanis:

Secure Reputation Framework for BitTorrent. 1364-1369 - Ismail Adel Al-Taharwa

, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Ching-Hao Mao, Te-En Wei, Shyi-Ming Chen:
RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis. 1370-1375 - Guoyan Zhang, Lei Liu, Yang Liu:

An Attribute-Based Encryption Scheme Secure against Malicious KGC. 1376-1380
Social Networks
- Athanasios Zigomitros

, Achilleas Papageorgiou, Constantinos Patsakis
:
Social Network Content Management through Watermarking. 1381-1386 - Lorena González-Manzano, Ana Isabel González-Tablas Ferreres

, José María de Fuentes
, Arturo Ribagorda:
U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks. 1387-1392 - M. Ajmal Azad

, Ricardo Morla
:
Mitigating SPIT with Social Strength. 1393-1398 - Linlin Tian, Mingchu Li, Weifeng Sun, Xiaowei Zhao, Baohui Wang, Jianhua Ma:

Evolution of Cooperation Based on Reputation on Dynamical Networks. 1399-1404 - Sanat Kumar Bista, Surya Nepal

, Cécile Paris:
Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help? 1405-1410
Trust Model and Applications
- Jamalul-lail Ab Manan, Zubair Ahmad Khattak

, Suziah Sulaiman:
Practicable Unified Security, Trust and Privacy (STP) Framework for Federated Access Management (FAM). 1411-1416 - Yifang Ku, Hsiao-Hui Li, Fan Wu:

Evaluation of Trustworthiness of Reviews in the Online Travel Community. 1417-1422 - Yu Zhang:

Research on Trust Issue of Current Chinese C2C E-commerce: Problems and Solutions. 1423-1428 - Olive Qing Zhang, Ryan K. L. Ko

, Markus Kirchberg, Chun Hui Suen, Peter Jagadpramana, Bu-Sung Lee
:
How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms. 1429-1437
IUCC-2012: The 11th IEEE International Conference on Ubiquitous Computing and Communications
Trust Model and Applications
- Yang Qin, Dijiang Huang

, Xinwen Zhang:
VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks. 1438-1445 - Tianyi Xing, Hongbin Liang, Dijiang Huang

, Lin X. Cai:
Geographic-Based Service Request Scheduling Model for Mobile Cloud Computing. 1446-1453 - Stefan Forsström, Patrik Österberg, Theo Kanter:

Evaluating Ubiquitous Sensor Information Sharing on the Internet-of-Things. 1454-1460 - Yu-Lin Wang, Chia-Te Liao, Alvin Wen-Yu Su:

A Block-Based Still Image Coder for Parallel Computing. 1461-1468
Optical and Broadband Networks
- Jehad Al-Sadi:

The Load Balancing Problem in Extended OTIS-n-Cube Interconnection Networks. 1469-1474 - Zhixiong Chen, Weikai Xu, Jin Huang, Lin Wang:

Performances of CS-DCSK UWB Communication System in the Presence of Narrow Band Interferers. 1475-1480 - Khodor Hamandi, Farah Saab, Ayman I. Kayssi:

Enhanced Multi-rate Multicast for Optimal User Satisfaction and Efficient Bandwidth Utilization. 1481-1485 - Hailang Cao, Ping Wang, Lei Chen, Fuqiang Liu, Xinhong Wang, Yin Zhu, Huifang Pang:

User Satisfaction Based ZFBF Scheduling Algorithm in Multi-user MIMO System. 1486-1490 - Hao Yin, Heungsun Chang, Fangming Liu, Tongyu Zhan, Ying Zhang, Bo Li:

Discovering a Large Scale Internet Topology: Complementary and Contrast View. 1491-1498
Pervasive Computing
- Christophe Soares

, Rui S. Moreira
, Ricardo Morla
, José Torres
, Pedro Miguel Sobral
:
Interference Free Integration of Pervasive Applications. 1499-1506 - Martin Peters, Christopher Brink, Sabine Sachweh:

Including Metadata into an Ontology Based Pervasive Computing Architecture. 1507-1512 - Minoru Nakayama, Masashi Fujimoto:

Chronological Accommodation of Oculo-motors in Response to Varying Sizes of Visual Stimuli. 1513-1519 - Stefan Forsström, Theo Kanter, Patrik Österberg:

Ubiquitous Secure Interactions with Intelligent Artifacts on the Internet-of-Things. 1520-1524 - Bo Guan, Yifeng He:

Optimal Resource Allocation for Multi-layered Video Streaming over Multi-channel Cognitive Radio Networks. 1525-1528 - Ying Dai, Jie Wu:

Distributed Rerouting for Multiple Sessions in Cognitive Radio Networks. 1529-1536
Sensor Networks
- Yue Li, Dehua Chen, Thomas Newe

:
Formal Verification of a Key Agreement Protocol for Wireless Sensor Networks. 1537-1542 - Sang Gi Hong, Young Bag Moon, Naesoo Kim, Whan Woo Kim

:
Window Energy Detection for Unmanned Surveillance with PIR Sensor. 1543-1547 - Zhenfei Wang, Kun Yang, David K. Hunter:

A Dynamic Bandwidth Allocation Algorithm for a Multi-sink Wireless Sensor Network Converged with a Passive Optical Network. 1548-1554 - Sain Saginbekov

, Arshad Jhumka:
Fast and Efficient Information Dissemination in Event-Based Wireless Sensor Networks. 1555-1561 - Hee-Sook Mo, Hyochan Bang, Cheol Sig Pyo:

Data-centric Dissemination to Mobile Sink Group in Wireless Sensor Networks. 1562-1569
Ad Hoc Networks
- Zhiyong Zhang, Zhiping Jia, Hui Xia:

Link Stability Evaluation and Stability Based Multicast Routing Protocol in Mobile Ad Hoc Networks. 1570-1577 - Mahmoud Hashem Eiza

, Qiang Ni
:
A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways. 1578-1585 - Hui Cheng, Shengxiang Yang

:
Hyper-mutation Based Genetic Algorithms for Dynamic Multicast Routing Problem in Mobile Ad Hoc Networks. 1586-1592 - Muhammad Bilal, M. O. Hussain, Pauline M. L. Chan

:
A Reception Based Node Selection Protocol for Multi-hop Routing in Vehicular Ad-hoc Networks. 1593-1600 - Diogo Lima

, Hugo Miranda
:
Flow-Aware Broadcasting Algorithm. 1601-1608
Wireless and Mobile Networks
- Haris Pervaiz

, Qiang Ni
:
User Preferences-Adaptive Dynamic Network Selection Approach in Cooperating Wireless Networks: A Game Theoretic Perspective. 1609-1616 - Sina Fateri, Qiang Ni

, Gareth A. Taylor
, Sivanantharasa Panchadcharam, Ioana Pisica
:
Design and Analysis of Multicast-Based Publisher/Subscriber Models over Wireless Platforms for Smart Grid Communications. 1617-1623 - Sandip Chakraborty, Sukumar Nandi

:
A HiperLAN/2 Based MAC Protocol for Efficient Vehicle-to-Infrastructure Communication Using Directional Wireless Mesh Backbone. 1624-1631 - Martin S. Dam, Steffen Christensen, Lars Møller Mikkelsen, Rasmus L. Olesen:

Location Assisted Vertical Handover Algorithm for QoS Optimization in End-to-end Connections. 1632-1640 - Menghui Yang, Yongzhong Zou, Li Fang:

Collision and Detection Performance with Three Overlap Signal Collisions in Space-Based AIS Reception. 1641-1648 - Jin Huang, Zhexin Xu, Weikai Xu, Lin Wang:

Error Performance Analysis of Opportunistic Relaying System Based on DCSK. 1649-1653 - Zaid Ahmed Said Zabanoot, Geyong Min:

Modelling of Prioritised Vertical Handoff Scheme in Integrated UMTS/WLANs. 1654-1660
Mobility Management
- Yulei Wu, Jingguo Ge, Junling You, Yuepeng E:

Design and Evaluation of an Operational Mobility Model over IPv6 (OMIPv6) Based on ID/Locator Split Architecture. 1661-1665 - Jiyoung Kang

:
AR Teleport: Digital Reconstruction of Historical and Cultural-Heritage Sites Using Mobile Augmented Reality. 1666-1675 - Ahlem Harchay

, Lilia Cheniti-Belcadhi, Rafik Braham:
A Model Driven Infrastructure for Context-Awareness Mobile Assessment Personalization. 1676-1683 - Suddhasil De

, Sukumar Nandi
, Diganta Goswami:
Modeling an Enhanced Tuple Space Based Mobile Middleware in UNITY. 1684-1691 - Francisco Javier Moreno Arboleda, Sebastián Múnera, Luis Munoz:

A Trajectory Model to Deal with Transmission Failures. 1692-1697 - Thomas Olutoyin Oshin, Stefan Poslad

, Athen Ma:
Improving the Energy-Efficiency of GPS Based Location Sensing Smartphone Applications. 1698-1705 - Mehiar Dabbagh, Naoum Sayegh, Ayman I. Kayssi:

Efficient Internet Mapping in the Presence of Network Load Balancers. 1706-1713
Network Protocols
- Uthman Baroudi

, Anas Al-Roubaiey
, Samir Mekid
, Abdelhafid Bouhraoua:
The Impact of Sensor Node Distribution on Routing Protocols Performance: A Comparitive Study. 1714-1720 - Ji Ma, Klaus-Dieter Schewe:

A Temporalised Belief Logic for Reasoning about Authentication Protocols. 1721-1728 - Andreas Bontozoglou, Kun Yang, Ken Guild:

Cross-Technology Overlay Control Protocol for Resource Management in Converged Networks. 1729-1734 - Linchen Yu:

Improving Query for P2P SIP VoIP. 1735-1740 - Sarah Abdallah, Elias Najjar, Ayman I. Kayssi:

A Round Robin Load Balancing and Redundancy Protocol for Network Routers. 1741-1747
Smart Home and Ambient Intelligence
- Joseph C. H. So

, Po-Choi Wong:
Genetic Algorithm in Resource Provider Selection for Personal Live Content Delivery in User-Provided Platform. 1748-1754 - Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka:

On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters. 1755-1762 - George Okeyo

, Liming Chen
, Hui Wang
, Roy Sterritt
:
A Hybrid Ontological and Temporal Approach for Composite Activity Modelling. 1763-1770 - Abhinav Duggal, Manoj Misra, Ramesh Srinivasaraghavan:

Categorising Context and Using Short Term Contextual Information to Obtain Long Term Context. 1771-1776 - Yan Tang, Ioana Ciuciu:

Semantic Decision Support Models for Energy Efficiency in Smart-Metered Homes. 1777-1784 - Athanasios Vourvopoulos

, Fotis Liarokapis
:
Robot Navigation Using Brain-Computer Interfaces. 1785-1792
KAMIoT-2012: International Workshop on Knowledge Acquisition and Management in the Internet of Things
- Wei Wang, Suparna De

, Ralf Tönjes, Eike Steffen Reetz, Klaus Moessner
:
A Comprehensive Ontology for Knowledge Representation in the Internet of Things. 1793-1798 - Zhichun Wang, Rongfang Bie, Mingquan Zhou:

Hybrid Ontology Matching for Solving the Heterogeneous Problem of the IoT. 1799-1804 - Wei Jiang, Limin Meng:

Design of Real Time Multimedia Platform and Protocol to the Internet of Things. 1805-1810 - Antonio J. Jara, Miguel A. Zamora, Antonio Fernandez Gómez-Skarmeta:

Knowledge Acquisition and Management Architecture for Mobile and Personal Health Environments Based on the Internet of Things. 1811-1818 - Weiwei Yuan, Donghai Guan, Lei Shu

, Jianwei Niu
:
Efficient Searching Mechanism for Trust-Aware Recommender Systems Based on Scale-Freeness of Trust Networks. 1819-1823 - Junqi Guo, Hongyang Zhang, Yunchuan Sun, Rongfang Bie:

Square-Root Unscented Kalman Filtering Based Localization and Tracking in the Internet of Things. 1824-1829 - Xue Chen, Chao Wu:

A Text Representation Method Based on Harmonic Series. 1830-1834 - Guicheng Shen, Bingwu Liu:

Research on Embedding ECC into RFID Authentication Protocol. 1835-1838 - Dandan Li, Xiaohui Ji, ZhangBing Zhou, Qun Wang:

A Hybrid MPI/OpenMP Model Based on DDM for Large-Scale Partial Differential Equations. 1839-1843 - Stefan Forsström, Theo Kanter, Olle Johansson:

Real-Time Distributed Sensor-Assisted mHealth Applications on the Internet-of-Things. 1844-1849
MultiCom-2012: The Second International Workshop on Multimedia Communications and Networking
- Colin Bailey, Xiao-Hong Peng:

Quality Assessment of Video Transmission in Heterogeneous Networks as Applied to Real-Time Telecare. 1850-1855 - S. Nayyef, Charalampos Tsimenidis, Arafat Al-Dweik

, Bayan S. Sharif
, Ali Hazmi
:
Time- and Frequency-Domain Impulsive Noise Spreader for OFDM Systems. 1856-1861 - Sanjay Kumar, Nadeem Javaid

, Zahid Yousuf, Haresh Kumar, Zahoor Ali Khan
, Ayesha Bibi:
DSDV, DYMO, OLSR: Link Duration and Path Stability. 1862-1866 - Subhash Sagar

, Nadeem Javaid
, Zahoor Ali Khan
, J. Saqib, Ayesha Bibi, Safdar Hussain Bouk
:
Analysis and Modeling Experiment Performance Parameters of Routing Protocols in MANETs and VANETs. 1867-1871
AIPNGN-2012: The Second International Workshop on All-IP Next Generation Networks
- Hui Lin, Jia Hu, Atulya Nagar

, Li Xu:
Role Based Privacy-Aware Secure Routing in WMNs. 1872-1877 - Gang Liu, Hua Wang, Hong Zhang:

An Ant Colony Optimization Algorithm for Overlay Backbone Multicast Routing in Content Delivery Networks. 1878-1882 - Zhenzhou Li, Feng Li, Zhiping Jia, Lei Ju, Renhai Chen:

The Research and Application of a Specific Instruction Processor for SMS4. 1883-1888 - Yongji Yu, Zhiping Jia, Ruihua Zhang:

Prediction-Based Algorithm for Event Detection in Wireless Sensor Networks. 1889-1894
IWVT-2012: The Third International Workshop on Virtualization Technology
- Fan Yang, Huanguo Zhang, Fei Yan, Jian Yang:

Testing Method of Code Redundancy Simplification Based on Program Dependency Graph. 1895-1900 - Jiahui Wen, Li Shen, Zhiying Wang:

Dynamic Optimization on Multi-core Platform. 1901-1906 - Xiaolin Wang, Xiang Wen, Yechen Li, Yingwei Luo, Xiaoming Li, Zhenlin Wang:

A Dynamic Cache Partitioning Mechanism under Virtualization Environment. 1907-1911 - Fan Xu, Shen Li, Zhiying Wang:

HVD-TLS: A Novel Framework of Thread Level Speculation. 1912-1917 - Xin Peng, Xiaofei Liao, Hai Jin, Xuepeng Fan, Xuping Tu, Linchen Yu:

An Efficient Distributed Transactional Memory System. 1918-1923
IEETeL-2012: The Third International Workshop on Interactive Environments and Emergent Technologies for eLearning
- Minoru Nakayama, Kouichi Mutsuura, Hiroh Yamamoto:

Causal Analysis of Student's Characteristics of Note-Taking Activities and Learning Performance during a Fully Online Course. 1924-1929 - Xiaodong Li, Hong Zhang:

Research on Cooperative Learning of Digital English Writing in Network Environment. 1930-1935 - Katherine Inalef, Julio Guerra

, Eliana Scheihing
:
Development and Validation of a Virtual Worklog as a Collaboration Tool for the Kelluwen Learning Community. 1936-1941 - Malinka Ivanova

, Tatyana Ivanova
:
Actualization of a Course Library through Influential Twitter Knowledge. 1942-1947
AUCN-2012: The 2012 International Symposium on Advances in Ubiquitous Computing and Networking
Cloud Computing and Wireless Networks
- Francis Owusu, Colin Pattinson:

The Current State of Understanding of the Energy Efficiency of Cloud Computing. 1948-1953 - Marco Bazzani

, Davide Conzon
, Andrea Scalera, Maurizio A. Spirito
, Claudia Irene Trainito:
Enabling the IoT Paradigm in E-health Solutions through the VIRTUS Middleware. 1954-1959 - Naveed A. Khan, Nadeem Javaid

, Zahoor Ali Khan
, M. Jaffar, U. Rafiq, Ayesha Bibi:
Ubiquitous HealthCare in Wireless Body Area Networks. 1960-1967 - Obaid Ur Rehman, Nadeem Javaid

, Ayesha Bibi, Zahoor Ali Khan
:
Performance Study of Localization Techniques in Wireless Body Area Sensor Networks. 1968-1975 - Uthman Baroudi

, Amin-ud-din Qureshi
, Samir Mekid
, Abdelhafid Bouhraoua:
Radio Frequency Energy Harvesting Characterization: An Experimental Study. 1976-1981
Network Analysis
- Xiaoqiang Li, Yun Mi, Yingwei Jin, Heng Qi, Zhiyang Li:

A Novel System for Evaluating Website Using Link Analysis. 1982-1987 - Jianzhi Jin, Yuhua Liu, Laurence Tianruo Yang, Naixue Xiong, Fang Hu:

An Efficient Detecting Communities Algorithm with Self-Adapted Fuzzy C-Means Clustering in Complex Networks. 1988-1993 - Andrew Jones, Lu Liu

, Nick Antonopoulos, Weining Liu:
An Analysis of Peer to Peer Protocols for Massively Multiplayer Online Games. 1994-1999 - Deepak Pai, Sasi Inguva, Phani Shekhar Mantripragada, Mudit Malpani, Nitin Aggarwal:

Padati: A Robust Pedestrian Dead Reckoning System on Smartphones. 2000-2007 - Sérgio Ivan Lopes

, José Manuel Neto Vieira
, Daniel Filipe Albuquerque
:
High Accuracy 3D Indoor Positioning Using Broadband Ultrasonic Signals. 2008-2014
Ubiquitous System, Services, and Applications
- Yean-Fu Wen:

Weighted Flow and Spectral Resource to Enhance QoS for Multi-hop Cognitive Radio Networks. 2015-2020 - Attila Reiss, Didier Stricker, Ilias Lamprinos

:
An Integrated Mobile System for Long-Term Aerobic Activity Monitoring and Support in Daily Life. 2021-2028 - David Martín, Carlos Lamsfus, Aurkene Alzua

, Diego López-de-Ipiña
:
Foundations for a Platform to Develop Context-aware Systems by Domain Experts. 2029-2034 - Huihui Wu, Jiguang He, Liangliang Xu, Lin Wang:

Joint Source-Channel Coding Based on P-LDPC Codes for Radiography Images Transmission. 2035-2039

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














