


default search action
10. SecureComm 2014: Beijing, China
- Jing Tian, Jiwu Jing, Mudhakar Srivatsa:
International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 152, Springer 2015, ISBN 978-3-319-23828-9
Cloud Computing Security
- Xiaoyan Sun, Jun Dai
, Anoop Singhal, Peng Liu:
Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks. 3-23 - Tayyaba Zeb, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Muhammad Yousaf
:
A Secure Architecture for Inter-cloud Virtual Machine Migration. 24-35 - Jingwei Li
, Dan Lin, Anna Cinzia Squicciarini
, Chunfu Jia:
STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds. 36-44 - Zhangjie Fu, Jiangang Shu
, Xingming Sun:
An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability. 45-54 - Anna Cinzia Squicciarini
, Dan Lin, Smitha Sundareswaran, Jingwei Li
:
Policy Driven Node Selection in MapReduce. 55-72
Authentication and Identity
- Nicolas Van Balen, Haining Wang:
GridMap: Enhanced Security in Cued-Recall Graphical Passwords. 75-94 - Yazhe Wang, Mingming Hu, Chen Li:
UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts. 95-104 - Issa M. Khalil
, Zuochao Dou, Abdallah Khreishah
:
TPM-Based Authentication Mechanism for Apache Hadoop. 105-122 - Sarmad Ullah Khan, Rafiullah Khan, Inam Bari
, Naveed Jan:
An Authentication and Key Management Scheme for Heterogeneous Sensor Networks. 123-131 - Chengcheng Shao
, Liang Chen, Shuo Fan, Xinwen Jiang:
Social Authentication Identity: An Alternate to Internet Real Name System. 132-140 - Ding Wang
, Ping Wang:
On the Usability of Two-Factor Authentication. 141-150
Network Security
- Sushama Karumanchi, Jingwei Li
, Anna Cinzia Squicciarini
:
Securing Resource Discovery in Content Hosting Networks. 153-173 - Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips:
Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations. 174-182 - Kan Chen, Peidong Zhu, Yueshan Xiong:
Keep the Fakes Out: Defending Against Sybil Attack in P2P Systems. 183-191
Privacy and Wireless Security
- Binh Vo, Steven M. Bellovin:
Anonymous Publish-Subscribe Systems. 195-211 - Bhaswati Deka, Ryan M. Gerdes, Ming Li, Kevin P. Heaslip
:
Friendly Jamming for Secure Localization in Vehicular Transportation. 212-221 - Eirini D. Karapistoli, Panagiotis G. Sarigiannidis
, Anastasios A. Economides
:
Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks. 222-238 - Max Suraev:
Implementing an Affordable and Effective GSM IMSI Catcher with 3G Authentication. 239-256
System and Software Security
- Byungho Min, Vijay Varadharajan
:
A Simple and Novel Technique for Counteracting Exploit Kits. 259-277 - Yosra Ben Mustapha, Hervé Debar
, Gregory Blanc
:
Policy Enforcement Point Model. 278-286 - Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, Debin Gao
, Chunfu Jia:
Control Flow Obfuscation Using Neural Network to Fight Concolic Testing. 287-304 - Quanwei Cai
, Jingqiang Lin, Fengjun Li
, Qiongxiao Wang, Daren Zha:
EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients. 305-322 - Christopher Kugler, Tilo Müller:
SCADS - Separated Control- and Data-Stacks. 323-340
Crypto
- Qianying Zhang, Shijun Zhao, Yu Qin, Dengguo Feng:
Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware. 343-361 - Qinglong Zhang, Zongbin Liu, Quanwei Cai, Ji Xiang:
TST: A New Randomness Test Method Based on Coupon Collector's Problem. 362-373 - Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li, Fenghua Li:
Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy. 374-394 - Yuling Luo, Junxiu Liu, Lvchen Cao, Jinjie Bi, Senhui Qiu:
Hardware Implementation of Cryptographic Hash Function Based on Spatiotemporal Chaos. 395-404 - Yi-Ting Chiang, Tsan-sheng Hsu, Churn-Jung Liau, Yun-Ching Liu, Chih-Hao Shen, Da-Wei Wang, Justin Zhan:
An Information-Theoretic Approach for Secure Protocol Composition. 405-423
Mobile Security
- Swarup Chandra, Zhiqiang Lin, Ashish Kundu, Latifur Khan
:
Towards a Systematic Study of the Covert Channel Attacks in Smartphones. 427-435 - Hugo Gonzalez
, Natalia Stakhanova, Ali A. Ghorbani:
DroidKin: Lightweight Detection of Android Apps Similarity. 436-453 - Lulu Zhang, Yongzheng Zhang, Tianning Zang:
Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme. 454-462 - Duohe Ma, Zhen Xu, Dongdai Lin:
Defending Blind DDoS Attack on SDN Based on Moving Target Defense. 463-480 - Chen Cao, Yuqing Zhang, Qixu Liu, Kai Wang:
Function Escalation Attack. 481-497 - Lautaro Dolberg, Quentin Jérôme, Jérôme François, Radu State, Thomas Engel:
RAMSES: Revealing Android Malware Through String Extraction and Selection. 498-506 - Xi Xiao, Xianni Xiao, Yong Jiang, Qing Li
:
Detecting Mobile Malware with TMSVM. 507-516
Posters
- Guozhen Shi, Ying Shen, Fenghua Li, Mang Su, Dong Liu:
Research on Credible Regulation Mechanism for the Trading of Digital Works. 519-523 - Léa El Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Wael Kanoun, Samuel Dubus:
Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks. 524-529 - Xiaolin Xu, Yonglin Zhou, Qingshan Li:
Domain Algorithmically Generated Botnet Detection and Analysis. 530-534 - Jinqiao Shi, Xiao Wang, Binxing Fang, Qingfeng Tan, Li Guo:
Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy. 535-540 - Haofeng Jiao, Xiaohong Li, Lei Zhang, Guangquan Xu, Zhiyong Feng:
Hybrid Detection Using Permission Analysis for Android Malware. 541-545 - Fawad Khan
, Sarmad Ullah Khan, Inam Bari
:
Content Security Scheme for Content Centric Networks. 546-550 - Jinshuo Liu, Yabo Li, Yingyue Peng, Juan Deng, Xin Chen:
Detection of Food Safety Topics Based on SPLDAs. 551-555 - Parvez Faruki, Vijay Kumar, Ammar Bharmal, Manoj Singh Gaur, Vijay Laxmi
, Mauro Conti
:
Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps. 556-560
Web Security
- Jeroen Massar, Ian Mason, Linda Briesemeister, Vinod Yegneswaran:
JumpBox - A Seamless Browser Proxy for Tor Pluggable Transports. 563-581 - Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen, Guofei Gu:
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks. 582-601 - Jialong Zhang, Jayant Notani, Guofei Gu:
Characterizing Google Hacking: A First Large-Scale Quantitative Study. 602-622 - Sami Zhioua
, Adnene Ben Jabeur, Mahjoub Langar, Wael Ilahi:
Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models. 623-631

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.