default search action
11th TrustCom 2012: Liverpool, United Kingdom
- Geyong Min, Yulei Wu, Lei (Chris) Liu, Xiaolong Jin, Stephen A. Jarvis, Ahmed Yassin Al-Dubai:
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2172-3
TrustCom-2012: The 11th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications
Attack and Defense
- Rosanne English, Ron Poet:
The Effectiveness of Intersection Attack Countermeasures for Graphical Passwords. 1-8 - Haichang Gao, Wei Wang, Ye Fan:
Divide and Conquer: An Efficient Attack on Yahoo! CAPTCHA. 9-16 - Johannes Barnickel, Jian Wang, Ulrike Meyer:
Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode. 17-24 - Zhijun Wu, Lan Ma, Minghua Wang, Meng Yue, Lu Wang:
Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlation. 25-32 - Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. 33-40 - David Fraga, Zorana Bankovic, José Manuel Moya:
A Taxonomy of Trust and Reputation System Attacks. 41-50 - Ferdous A. Barbhuiya, S. Roopa, Ritesh Ratti, Santosh Biswas, Sukumar Nandi:
An Active Detection Mechanism for Detecting ICMP Based Attacks. 51-58
Authentication, Authorization, and Accounting
- Hisham Al-Assam, Sabah Jassim:
Robust Biometric Based Key Agreement and Remote Mutual Authentication. 59-65 - Wencheng Yang, Jiankun Hu, Song Wang:
A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication. 66-70 - Mohamed A. Sharaf:
RFID Mutual Authentication and Secret Update Protocol for Low-Cost Tags. 71-77 - Wassim Drira, Éric Renault, Djamal Zeghlache:
A Hybrid Authentication and Key Establishment Scheme for WBAN. 78-83 - Eduardo dos Santos, Jean Everson Martina, Ricardo Felipe Custódio:
Towards a Formal Verification of a Multi-factor Authentication Protocol Using Automated Theorem Provers. 84-91 - Mehdi Haddad, Mohand-Said Hacid, Robert Laurini:
Data Integration in Presence of Authorization Policies. 92-99
Trust and Cloud Computing
- Qiwei Lu, Yan Xiong, Xudong Gong, Wenchao Huang:
Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing. 100-108 - Sheikh Mahbub Habib, Sebastian Ries, Sascha Hauke, Max Mühlhäuser:
Fusion of Opinions under Uncertainty and Conflict - Application to Trust Assessment for Cloud Marketplaces. 109-118 - Dexian Chang, XiaoBo Chu, Yu Qin, Dengguo Feng:
TSD: A Flexible Root of Trust for the Cloud. 119-126 - Imad M. Abbadi:
Clouds Trust Anchors. 127-136 - Yu Shyang Tan, Ryan K. L. Ko, Peter Jagadpramana, Chun Hui Suen, Markus Kirchberg, Teck Hooi Lim, Bu-Sung Lee, Anurag Singla, Ken Mermoud, Doron Keller, Ha Duc:
Tracking of Data Leaving the Cloud. 137-144 - Vijay Varadharajan, Udaya Kiran Tupakula:
TREASURE: Trust Enhanced Security for Cloud Environments. 145-152 - Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith:
Confidentiality as a Service - Usable Security for the Cloud. 153-162 - Christopher Harrison, Devin Cook, Robert McGraw, John A. Hamilton Jr.:
Constructing a Cloud-Based IDS by Merging VMI with FMA. 163-169 - Safwan Mahmud Khan, Kevin W. Hamlen:
AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing. 170-176
Detection Scheme (1)
- Nicholas Charles Patterson, Michael Hobbs, Jemal H. Abawajy:
Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments. 177-184 - Cunqing Ma, Jingqiang Lin, Yuewu Wang:
Efficient Missing Tag Detection in a Large RFID System. 185-192 - Dijiang Huang, Sean A. Williams, Swaroop Shere:
Cheater Detection in Vehicular Networks. 193-200 - Quang-Anh Tran, Frank Jiang, Jiankun Hu:
A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays. 201-208 - Naruemon Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, Chalermpol Charnsripinyo:
A Practical Network-Based Intrusion Detection and Prevention System. 209-214 - Fei Wang, Xiaofeng Wang, Jinshu Su, Bin Xiao:
VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification. 215-222
Detection Scheme (2)
- Yuxin Meng, Wenjuan Li:
Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment. 223-230 - Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro:
An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETs. 231-238 - Hongjun Dai, Huabo Liu, Zhiping Jia, Tianzhou Chen:
A Multivariate Classification Algorithm for Malicious Node Detection in Large-Scale WSNs. 239-245 - Xin Liu, Anwitaman Datta, Hui Fang, Jie Zhang:
Detecting Imprudence of 'Reliable' Sellers in Online Auction Sites. 246-253 - Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
A Novel Scoring Model to Detect Potential Malicious Web Pages. 254-263 - Lei (Chris) Liu, Xiaolong Jin, Geyong Min, Li Xu:
Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic Analysis. 264-270
Parallel and Distributed Systems
- Jiangshan Yu, Guilin Wang, Yi Mu:
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks. 271-278 - Mohammad Ashiqur Rahman, Libin Bai, Mohamed Shehab, Ehab Al-Shaer:
Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid. 279-286 - Guanghai Cui, Mingchu Li, Zhen Wang, Linlin Tian, Jianhua Ma:
Analysis and Evaluation Framework Based on Spatial Evolutionary Game Theory for Incentive Mechanism in Peer-to-Peer Network. 287-294 - Yi-Ruei Chen, Wen-Guey Tzeng:
Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation. 295-302 - Yuanbo Guo, Jianfeng Ma, Chao Wang, Liangmin Wang:
Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs. 303-309 - Su Chen, Yi Chen, Hai Jiang, Laurence Tianruo Yang, Kuan-Ching Li:
A Secure Distributed File System Based on Revised Blakley's Secret Sharing Scheme. 310-317
E-commerce and E-government
- Haibin Zhang, Yan Wang, Xiuzhen Zhang:
Efficient Contextual Transaction Trust Computation in E-commerce Environments. 318-325 - Huiying Duan, Feifei Liu:
Building Robust Reputation Systems in the E-commerce Environment. 326-333 - Qin Li, Jie Zhang, Keith M. Martin:
Feedback as "Shadow of the Present": An Alternative to Reputation Systems for E-marketplaces. 334-341 - Richard O. Sinnott, Christopher Bayliss, Gerson Galang, Damien Mannix, Martin Tomko:
Security Attribute Aggregation Models for E-research Collaborations. 342-349 - Zeinab Noorian, Jie Zhang, Michael W. Fleming, Stephen Marsh:
Determining the Optimal Reporting Strategy in Competitive E-marketplaces. 350-357
Privacy (1)
- Amina Hossain, Al-Amin Hossain, Sung-Jae Jang, Young-Sung Shin, Jae-Woo Chang:
K-Anonymous Cloaking Algorithm Based on Weighted Adjacency Graph for Preserving Location Privacy. 358-365 - Rajiv Bagai, Nan Jiang:
Measuring Anonymity by Profiling Probability Distributions. 366-374 - Michael Brenner, Henning Perl, Matthew Smith:
How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation. 375-382 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Privacy Preserving Application Acquisition Protocol. 383-392 - Yu-Chih Wei, Yi-Ming Chen:
An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs. 393-400 - David Pergament, Armen Aghasaryan, Jean-Gabriel Ganascia:
Reputation Diffusion Simulation for Avoiding Privacy Violation. 401-408 - Liqun Chen:
Ring Group Signatures. 409-418 - Mark Stegelmann, Dogan Kesdogan:
GridPriv: A Smart Metering Architecture Offering k-Anonymity. 419-426
Privacy (2)
- M. Francisca Hinarejos, Josep Lluís Ferrer-Gomila, Gerard Draper-Gil, Llorenç Huguet i Rotger:
Anonymity and Transferability for an Electronic Bank Check Scheme. 427-435 - Lingchen Zhang, Luning Xia, Zongbin Liu, Jiwu Jing, Yuan Ma:
Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA. 436-442 - Mamoona Naveed Asghar, Mohammad Ghanbari, Martin J. Reed:
Sufficient Encryption with Codewords and Bin-strings of H.264/SVC. 443-450 - Mark Vinkovits, Erion Elmasllari, Claudio Pastrone:
Anonymous Networking Meets Real-World Business Requirements. 451-457 - Timothy Nix, Riccardo Bettati:
Subversion Impedance in Covert Communication Networks. 458-465 - Jing Qin, Jiankun Hu, Huawei Zhao:
Simulatable Oblivious Transfer Protocols Based on Blind Signature. 466-473 - David Herges, Naim Asaj, Bastian Könings, Florian Schaub, Michael Weber:
Ginger: An Access Control Framework for Telematics Applications. 474-481 - Marcelo Henrique Souza Bomfim, R. A. Gontijo, Alexandre Queiroz Bracarense, Eduardo Jose Lima II:
Overhauling of a ASEA Robot IR6 with Open Architecture. 482-489
Network Security (1)
- Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Classification of Correlated Internet Traffic Flows. 490-496 - Wei Chang, Jie Wu, Chiu C. Tan:
Cooperative Trajectory-Based Map Construction. 497-504 - André Egners, Ulrike Meyer, Björn Marschollek:
Messing with Android's Permission Model. 505-514 - Silvio Cesare, Yang Xiang:
Wire - A Formal Intermediate Language for Binary Analysis. 515-524 - René Hummen, Jan Henrik Ziegeldorf, Tobias Heer, Hanno Wirtz, Klaus Wehrle:
SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services. 525-532 - Wei Zhou, Sheng Wen, Yini Wang, Yang Xiang, Wanlei Zhou:
An Analytical Model on the Propagation of Modern Email Worms. 533-540
Network Security (2)
- Dirk Hoffstadt, Alexander Marold, Erwin P. Rathgeb:
Analysis of SIP-Based Threats Using a VoIP Honeynet System. 541-548 - Laura Pla Beltran, Madjid Merabti, Qi Shi:
Multiplayer Game Technology to Manage Critical Infrastructure Protection. 549-556 - Jens Köhler, Sebastian Labitzke, Michael Simon, Martin Nussbaumer, Hannes Hartenstein:
FACIUS: An Easy-to-Deploy SAML-based Approach to Federate Non Web-Based Services. 557-564 - Akshaya Mohan, Rajendra S. Katti:
Provable Data Possession Using Sigma-protocols. 565-572 - Nihel Ben Youssef Ben Souayeh, Adel Bouhoula:
Towards Safe and Optimal Network Designs Based on Network Security Requirements. 573-579 - Minzhe Guo, Prabir Bhattacharya:
Mechanism Design Based Secure Data Object Replication. 580-587 - Wenyin Yang, Li Ma:
HyperDomain: Enabling Inspection of Malicious VMM's Misbehavior. 588-595 - Fan Zhou, Ruomei Wang, Yu Liu, Yun Liang:
Image Resizing Based on Geometry Preservation with Seam Carving. 596-601
Social Networks
- Faraz Ahmed, Muhammad Abulaish:
An MCL-Based Approach for Spam Profile Detection in Online Social Networks. 602-608 - Yong Wang, Ting-Ting Zhang, Hong-Zong Li, Long-Ping He, Jing Peng:
Efficient Privacy Preserving Matchmaking for Mobile Social Networking against Malicious Users. 609-615 - Sana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia:
IRIS: A Novel Method of Direct Trust Computation for Generating Trusted Social Networks. 616-623 - Guanfeng Liu, Yan Wang, Duncan S. Wong:
Multiple QoT Constrained Social Trust Path Selection in Complex Social Networks. 624-631 - Alessio Bonti, Ming Li, Longxiang Gao, Wen Shi:
Effects of Social Characters in Viral Propagation Seeding Strategies in Online Social Networks. 632-639 - Zhengli Xiong, Wenjun Jiang, Guojun Wang:
Evaluating User Community Influence in Online Social Networks. 640-647 - Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat:
Optimal State Management of Data Sharing in Online Social Network (OSN) Services. 648-655
Trust Model and Applications (1)
- Qiwei Lu, Yan Xiong, Wenchao Huang, Xudong Gong, Fuyou Miao:
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET. 656-665 - Zheng Yan, Raimo Kantola, Yue Shen:
Unwanted Traffic Control via Hybrid Trust Management. 666-673 - Cunqing Ma, Jingqiang Lin, Yuewu Wang, Ming Shang:
Offline RFID Grouping Proofs with Trusted Timestamps. 674-681 - Graeme Horsman, Christopher Laing, Paul Vickers:
A Case Based Reasoning Framework for Improving the Trustworthiness of Digital Forensic Investigations. 682-689 - Rolf Kiefhaber, Gerrit Anders, Florian Siefert, Theo Ungerer, Wolfgang Reif:
Confidence as a Means to Assess the Accuracy of Trust Values. 690-697
Trust Model and Applications (2)
- Hui Fang, Jie Zhang, Murat Sensoy, Nadia Magnenat-Thalmann:
A Generalized Stereotypical Trust Model. 698-705 - Huawei Zhao, Jiankun Hu, Jing Qin, Vijay Varadharajan, Haishan Wan:
Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks. 706-713 - Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems. 714-721 - Joydeep Chandra, Ingo Scholtes, Niloy Ganguly, Frank Schweitzer:
A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks. 722-729 - XiaoBo Chu, Qin Yu:
A New Efficient Property-Based Attestation Protocol Based on Elliptic Curves. 730-736 - John Edstrom, Eli Tilevich:
Reusable and Extensible Fault Tolerance for RESTful Applications. 737-744
Mobile and Wireless Communications
- Wibhada Naruephiphat, Yusheng Ji, Chalermpol Charnsripinyo:
An Area-Based Approach for Node Replica Detection in Wireless Sensor Networks. 745-750 - Miao Xie, Jiankun Hu, Biming Tian:
Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks. 751-759 - Arshad Jhumka, Matthew Bradbury, Matthew Leeke:
Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. 760-768 - Musfiq Rahman, Srinivas Sampalli:
A Hybrid Key Management Protocol for Wireless Sensor Networks. 769-776 - Yihong Zang, Johnson P. Thomas, Gheorghita Ghinea, Mathews Thomas, Salaheddin Darwish:
Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs. 777-784 - Aliaa M. Alabdali, Lilia Georgieva, Greg Michaelson:
Modelling of Secure Data Transmission over a Multichannel Wireless Network in Alloy. 785-792 - Qijun Gu, Wanyu Zang, Meng Yu, Peng Liu:
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks. 793-800
TrustID-2012: The Second IEEE International Symposium on Trust and Identity in Mobile Internet, Computing, and Communications
- Jesse Leskinen:
Evaluation Criteria for Future Identity Management. 801-806 - Jun Ishii, Hiroyuki Maeomichi, Ikuo Yoda:
Privacy-Preserving Statistical Analysis Method for Real-World Data. 807-812 - Charles Perez, Babiga Birregah, Marc Lemercier:
The Multi-layer Imbrication for Data Leakage Prevention from Mobile Devices. 813-819 - Yu Chen, Zheng Yan:
Gemini: A Handbag for Pervasive Social Communications. 820-825 - Qingqi Pei, Lei Li, Hongning Li, Beibei Yuan:
Adaptive Trust Management Mechanism for Cognitive Radio Networks. 826-831 - Yanan Sun, Xiaohong Guan, Ting Liu, Yu Qu:
An Identity Authentication Mechanism Based on Timing Covert Channel. 832-836
TSCloud-2012: The Second IEEE International Symposium on Trust and Security in Cloud Computing
- Hani Qusa, Roberto Baldoni, Roberto Beraldi:
A Privacy Preserving Scalable Architecture for Collaborative Event Correlation. 837-843 - Zhiqian Xu, Keith M. Martin:
Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage. 844-849 - Tobias Hahn, Thomas Kunz, Markus Schneider, Sven Vowe:
Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Email Addresses. 850-856 - Adrian J. Duncan, Sadie Creese, Michael Goldsmith:
Insider Attacks in Cloud Computing. 857-862 - Kun Lu, Hua Jiang, Mingchu Li, Sheng Zhao, Jianhua Ma:
Resources Collaborative Scheduling Model Based on Trust Mechanism in Cloud. 863-868 - Mudassar Aslam, Christian Gehrmann, Mats Björkman:
Security and Trust Preserving VM Migrations in Public Clouds. 869-876
MWNS-2012: The Third International Symposium on Mobile and Wireless Network Security
- Caner Kilinc, Todd Booth, Karl Andersson:
WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS. 877-883 - Yongzhao Zhan, Chunxia Li, Xinsheng Wang, Yuan Zhou, Lu Liu, Hussain Al-Aqrabi:
A Secure Node Localization Method Based on the Congruity of Time in Wireless Sensor Networks. 884-889