


Остановите войну!
for scientists:


default search action
12th TrustCom / 11th ISPA / 12th IUCC 2013: Melbourne, Australia
- 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5022-0
The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)
Session 1: Privacy in Cloud Computing
- Gaofeng Zhang, Yun Yang, Jinjun Chen:
A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing. 1-8 - Chang Liu, Xuyun Zhang, Chengfei Liu
, Yun Yang, Rajiv Ranjan
, Dimitrios Georgakopoulos
, Jinjun Chen:
An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing. 9-16 - Juan Li, Yan Bai, Nazia Zaman:
A Fuzzy Modeling Approach for Risk-Based Access Control in eHealth Cloud. 17-23 - Bernd Zwattendorfer, Daniel Slamanig
:
Scalable and Privacy-Preserving Variants of the Austrian Electronic Mandate System in the Public Cloud. 24-33 - Xiaolin Si, Pengpian Wang, Liwu Zhang:
KP-ABE Based Verifiable Cloud Access Control Scheme. 34-41
Session 2: Security and Trust in Network Routing
- Chuanhao Qu, Lei Ju, Zhiping Jia, Huaqiang Xu, Longpeng Zheng:
Light-Weight Trust-Based On-Demand Multipath Routing Protocol for Mobile Ad Hoc Networks. 42-49 - Shaahin Madani, Ibrahim Khalil
:
Garbled Routing (GR): Towards Unification of Anonymous Networks. 50-57 - Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao
:
Secure Routing Based on Network Coding in Wireless Sensor Networks. 58-64 - Ming Xiang
, William Liu
, Quan Bai
:
TIGER: A Trust-based Intelligent Geographical Energy-aware Routing for Smart Grid Communication Networks. 65-72 - Rakesh Matam, Somanath Tripathy
:
AFC: An Effective Metric for Reliable Routing in Wireless Mesh Networks. 73-80
Session 3: Trust in Mobile and Wireless Networks
- Marcin Seredynski
, Riad Aggoune
, Krzysztof Szczypiorski
, Djamel Khadraoui:
Performance Evaluation of Trust-Based Collaborative Sanctioning in MANETs. 81-88 - Fangyong Hou, Nong Xiao, Hongjun He, Fang Liu, Zhiguang Chen:
Novel Physically-Embedded Data Encryption for Embedded Device. 89-93 - Aymen Boudguiga
, Alexis Olivereau, Nouha Oualha
:
Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach. 94-101 - Mohammad Saiful Islam Mamun, Atsuko Miyaji:
A Fully-Secure RFID Authentication Protocol from Exact LPN Assumption. 102-109 - Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:
Determining Similar Recommenders Using Improved Collaborative Filtering in MANETs. 110-117
Session 4: Privacy in Mobile and Wireless Networks
- Xun Yi, Jan Willemson
, Farid Naït-Abdesselam:
Privacy-Preserving Wireless Medical Sensor Network. 118-125 - Lingguang Lei, Yuewu Wang, Jian Zhou, Lei Wang, Zhongwen Zhang:
A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones. 126-133 - Yong Wang, Nan Zhang, Yan-mei Wu, Bin-bin Su, Yong-jian Liao:
Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment. 134-141 - Bryan Dixon, Shivakant Mishra:
Power Based Malicious Code Detection Techniques for Smartphones. 142-149 - Yu-Jia Chen
, Chia-Yu Lin
, Li-Chun Wang
:
A Privacy-Preserved Joint Group Time Scheduling Mechanism for Mobile Social Applications. 150-155
Session 5: Security in Mobile and Wireless Networks
- Qihui Zhou, Dan Wang, Yan Zhang, Bo Qin, Aimin Yu, Baohua Zhao:
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain. 156-162 - Min Zheng, Mingshen Sun, John C. S. Lui:
Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware. 163-171 - Younchan Jung
, Marnel Peradilla
, J. William Atwood:
Securing Domain Name System Combined with MIPv6 for Mobile Hosts. 172-179 - Florent Batard, Karima Boudaoud, Michel Riveill
:
Securing Mobile Mashups with SCCM. 180-187 - Soufiene Ben Othman, Abdelbasset Trad, Habib Youssef, Hani Alzaid:
Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks. 188-195
Session 6: Trust and Security in Social Networks
- Sancheng Peng, Guojun Wang, Shui Yu
:
Modeling Malware Propagation in Smartphone Social Networks. 196-201 - Zheng Yan
, Raimo Kantola, Gaowa Shi, Peng Zhang:
Unwanted Content Control via Trust Management in Pervasive Social Networking. 202-209 - Sana Hamdi, Amel Bouzeghoub, Alda Lopes Gançarski, Sadok Ben Yahia:
Trust Inference Computation for Online Social Networks. 210-217 - Owen Sacco, John G. Breslin, Stefan Decker
:
Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web. 218-225 - Mohd Izuan Hafez Ninggal, Jemal H. Abawajy:
Preserving Utility in Social Network Graph Anonymization. 226-232
Session 7: Network Security
- Yuan Tao, Shui Yu
:
DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics. 233-240 - Yuxin Meng
, Lam-for Kwok
:
Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection. 241-248 - Yang Yu, Zhanfei Zhou:
Rational Secret Sharing Information - Theoretically Secure against Adaptive Adversaries. 249-256 - Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi:
What is the Pattern of a Botnet? 257-264 - Yong Qiao, Yuexiang Yang, Lin Ji, Jie He:
Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences. 265-270
Session 8: Attack and Defense
- Nelcileno Virgilio de Souza Araújo, Ruy de Oliveira, Ed Wilson Tavares Ferreira, Valtemir Emerencio do Nascimento, Ailton Akira Shinoda, Bharat K. Bhargava:
Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks. 271-276 - Jinson Zhang, Mao Lin Huang
:
Visual Analytics Model for Intrusion Detection in Flood Attack. 277-284 - Mingxi Li, Yan Xiong, Xuangou Wu, Xiancun Zhou, Yuhui Sun, Shenpei Chen, Xiaoya Zhu:
A Regional Statistics Detection Scheme against Sybil Attacks in WSNs. 285-291 - Abdulmohsen Almalawi
, Zahir Tari
, Adil Fahad, Ibrahim Khalil
:
A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems. 292-301 - Michael N. Johnstone, Robert Thompson:
Security Aspects of Military Sensor-Based Defence Systems. 302-309
Session 9: Trusted Computing Algorithms
- Anmin Fu
, Gongxuan Zhang, Zhenchao Zhu:
A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol. 310-314 - T. Raghu Vamsi Krishna, Rajesh P. Barnwal
, Soumya K. Ghosh:
MDS-Based Trust Estimation of Event Reporting Node in VANET. 315-320 - Oliver Bonham-Carter, Abhishek Parakh, Dhundy Bastola:
sEncrypt: An Encryption Algorithm Inspired from Biological Processes. 321-327 - Xavier Bonnaire, Rudyar Cortés, Fabrice Kordon, Olivier Marin
:
A Scalable Architecture for Highly Reliable Certification. 328-335 - Raja Naeem Akram
, Konstantinos Markantonakis, Keith Mayes:
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model. 336-345
Session 10: Privacy and Trust
- Roland Assam, Thomas Seidl
:
A Model for Context-Aware Location Identity Preservation Using Differential Privacy. 346-353 - Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake:
P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering. 354-361 - Armen Aghasaryan, Makram Bouzid, Dimitre Kostadinov, Mohit Kothari, Animesh Nandi:
On the Use of LSH for Privacy Preserving Personalization. 362-371 - Jordi Soria-Comas, Josep Domingo-Ferrer
, David Sánchez
, Sergio Martínez
:
Improving the Utility of Differentially Private Data Releases via k-Anonymity. 372-379 - Maria das Gracas da Silva Oliveira, Ruy J. G. B. de Queiroz:
Scheme of User Privacy Protection Applied to Online Marketing. 380-387 - Tianqing Zhu, Ping Xiong, Yang Xiang
, Wanlei Zhou
:
An Effective Deferentially Private Data Releasing Algorithm for Decision Tree. 388-395
Session 11: Security Models and Frameworks
- Dirar Abu-Saymeh, Dhiah el Diehn I. Abou-Tair
, Ahmad Zmily:
An Application Security Framework for Near Field Communication. 396-403 - Jin Bum Hong
, Dong Seong Kim
, Tadao Takaoka:
Scalable Attack Representation Model Using Logic Reduction Techniques. 404-411 - Florian Volk, Florian Sokoli, Sascha Hauke, Max Mühlhäuser
:
Formalizing and Modeling Fairness for Benefit Distribution in Collaborations. 412-420 - Ahmad Samer Wazan, Gregory Blanc
, Hervé Debar
, Joaquín García-Alfaro
:
Attribute-Based Mining Process for the Organization-Based Access Control Model. 421-430 - Keita Emura
, Atsuko Miyaji, Mohammad Shahriar Rahman
:
Private Multiparty Set Intersection Protocol in Rational Model. 431-438
Session 12: Trust and Security in Cloud Computing
- Gwan-Hwan Hwang, Jenn-Zjone Peng, Wei-Sian Huang:
A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices. 439-446 - Miao Zhou, Yi Mu, Willy Susilo
, Man Ho Au
:
Privacy-Enhanced Keyword Search in Clouds. 447-451 - Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin:
iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search. 452-458 - Sheikh Mahbub Habib, Vijay Varadharajan
, Max Mühlhäuser
:
A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces. 459-468 - Talal H. Noor, Quan Z. Sheng
, Abdullah Alfazi:
Reputation Attacks Detection for Effective Trust Assessment among Cloud Services. 469-476
Session 13: Cloud Application Security
- Xuejiao Liu, Yingjie Xia, Shasha Jiang, Fubiao Xia, Yanbo Wang:
Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing. 477-484 - Mansura Habiba, Md. Rafiqul Islam, A. B. M. Shawkat Ali:
Access Control Management for Cloud. 485-492 - Adrian J. Duncan, Sadie Creese, Michael Goldsmith, Jamie S. Quinton
:
Cloud Computing: Insider Attacks on Virtual Machines during Migration. 493-500 - Xuyun Zhang, Chang Liu, Surya Nepal
, Chi Yang, Wanchun Dou, Jinjun Chen:
Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud. 501-508 - Nelson Mimura Gonzalez, Marco Antonio Torrez Rojas, Marcos Vinicius Maciel da Silva
, Fernando F. Redígolo
, Tereza Cristina Melo de Brito Carvalho
, Charles Christian Miers, Mats Näslund, Abu Shohel Ahmed:
A Framework for Authentication and Authorization Credentials in Cloud Computing. 509-516
Session 14: Trust Management
- Aarthi Krishna, Vijay Varadharajan
, Nathan Tarr:
On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures. 517-524 - Sascha Hauke, Sebastian Biedermann, Max Mühlhäuser
, Dominik Heider
:
On the Application of Supervised Machine Learning to Trustworthiness Assessment. 525-534 - Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Building Confidence in Information-Trustworthiness Metrics for Decision Support. 535-543 - Ou Ruan, Cai Fu, Jing Zhou, Lansheng Han, Xiaoyang Liu:
Efficient Fair UC-Secure Two-Party Computation on Committed Inputs. 544-551 - Udaya Kiran Tupakula, Vijay Varadharajan
:
Trust Enhanced Security Architecture for Detecting Insider Threats. 552-559
Session 15: Data Security and Privacy
- Lan Zhou, Vijay Varadharajan
, Michael Hitchens
:
Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage. 560-569 - Ying Zhou, Chen Wang
:
An Online Query Authentication System for Outsourced Databases. 570-577 - Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
Word N-Gram Based Classification for Data Leakage Prevention. 578-585 - Longxiang Gao, Ming Li, Wanlei Zhou
, Wen Shi:
Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks. 586-593 - Chun Hui Suen, Ryan K. L. Ko
, Yu Shyang Tan
, Peter Jagadpramana, Bu-Sung Lee:
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance. 594-602
Session 16: Cyber Security and Privacy
- Nicholas Charles Patterson
, Michael Hobbs
, Darren Palmer
:
A Direct Insight into Victims of Cybercrime. 603-610 - Lazaros Kyrillidis, Keith Mayes, Boris Chazalet, Konstantinos Markantonakis:
Card-Present Transactions on the Internet Using the Smart Card Web Server. 611-619 - Jingquan Wang, Guilin Wang, Willy Susilo
:
Secure Single Sign-On Schemes Constructed from Nominative Signatures. 620-627 - Isredza Rahmi A. Hamid
, Jemal H. Abawajy:
Profiling Phishing Email Based on Clustering Approach. 628-635 - Lei Pan
, Yan Zhou:
Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation Attacks. 636-643
Session 17: Communication Security and Trust
- Wei Zhou, Yang Xu, Guojun Wang:
Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications. 644-650 - Ming Zheng, Jianping Wu, Hai-Xin Duan:
Research on the Anti-attack Design Principles of Low-Latency Anonymous Communication. 651-658 - Younchan Jung
, Enrique Festijo:
Securing RTP Packets Using Per-Packet Selective Encryption Scheme for Real-Time Multimedia Applications. 659-666 - Alasdair Thomason, Matthew Leeke, Matthew Bradbury
, Arshad Jhumka:
Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. 667-674 - Adnan Aziz, Dirk Hoffstadt, Sebastian Ganz, Erwin P. Rathgeb:
Development and Analysis of Generic VoIP Attack Sequences Based on Analysis of Real Attack Traffic. 675-682
Session 18: Security Algorithms
- Minghui Zheng, Yongquan Cui, Liang Chen:
Security Analysis of a Paillier-Based Threshold Proxy Signature Scheme. 683-687 - Muhammad Ahmed, Xu Huang, Hongyan Cui:
A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN. 688-693 - Daniel Migault, Stéphane Sénécal, Stanislas Francfort, Emmanuel Herbert, Maryline Laurent
:
PREFETCHing to Overcome DNSSEC Performance Issue on Large Resolving Platform. 694-703 - Hui Cui
, Yi Mu, Man Ho Au
:
Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps. 704-711 - Weiyu Jiang, Ji Xiang, Limin Liu, Daren Zha, Lei Wang:
From Mini House Game to Hobby-Driven Behavioral Biometrics-Based Password. 712-719
Session 19: Identity Management and Access Control
- Ebenezer Paintsil:
Towards Automation of Privacy and Security Risks Analysis in Identity Management Systems. 720-727 - Ibrahim F. Elashry, Yi Mu, Willy Susilo
:
Identity-Based Mediated RSA Revisited. 728-735 - Md. Sadek Ferdous
, Ron Poet:
Portable Personal Identity Provider in Mobile Phones. 736-745 - Rick Lopes de Souza, Lau Cheuk Lung, Ricardo Felipe Custódio:
Multi-factor Authentication in Key Management Systems. 746-752 - A. S. M. Kayes
, Jun Han, Alan Colman
:
A Semantic Policy Framework for Context-Aware Access Control Applications. 753-762
Session 20: Data Protection
- Xiaochen Yuan
, Chi-Man Pun
:
Feature Based Video Watermarking Resistant to Geometric Distortions. 763-767 - Soumyadeb Chowdhury
, Ron Poet, Lewis Mackenzie:
Exploring the Guessability of Image Passwords Using Verbal Descriptions. 768-775 - Peili Li, Haixia Xu, Shu Guo:
Public Verification of Outsourced Computation of Polynomial Functions. 776-780 - Harini Ragavan, Brajendra Panda:
Mitigating Malicious Updates: Prevention of Insider Threat to Databases. 781-788 - Sébastien Gambs, Marc-Olivier Killijian, Miguel Núñez del Prado Cortez
:
De-anonymization Attack on Geolocated Data. 789-797
Trusted 21: Trusted Computing Applications
- M. Manzur Murshed
, Tishna Sabrina, Anindya Iqbal, Mortuza Ali:
Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines. 798-804 - Wei Ye, Ruixuan Li, Huaqing Li:
Role Mining Using Boolean Matrix Decomposition with Hierarchy. 805-812 - Guowei Wu, Jia Wang, Lin Yao, Chi Lin:
A Secure Social-Aware Incentive Scheme for Delay Tolerant Networks. 813-820 - Gonzalo Huerta Cánepa, Seungwook Han, Dongman Lee, Byoungoh Kim:
A Place-Aware Stereotypical Trust Supporting Scheme. 821-828 - Charles Thevathayan, James Harland, Peter Bertók
:
An Endorsement Trust Model. 829-836
The 11th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA-13)
Session 1: Networking and Modeling
- Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jiannong Cao
, Jie Wu:
Local Monitoring and Maintenance for Operational Wireless Sensor Networks. 837-844 - Waltenegus Dargie
, Jianjun Wen:
A Probabilistic Model for Estimating the Power Consumption of Processors and Network Interface Cards. 845-852 - Chen Chen, Yao Wu, Joshua Suetterlein, Long Zheng, Minyi Guo, Guang R. Gao:
Automatic Locality Exploitation in the Codelet Model. 853-862 - Tao Li, Hua Li, Xuechen Liu, Shuai Zhang, Kai Wang, Yulu Yang:
GPU Acceleration of Interior Point Methods in Large Scale SVM Training. 863-870 - Chung Hwan Lee, Peter Strazdins:
An Analysis of Driver Domain Offload for Paravirtualized Communication. 871-878 - Shuai Zhang, Zhiyong Liu, Dongrui Fan, Fenglong Song, Mingzhe Zhang:
Energy-Performance Modeling and Optimization of Parallel Computing in On-Chip Networks. 879-886
Session 2: Parallel and Distributed Applications
- Yifeng Geng, Xiaomeng Huang, Meiqi Zhu, Huabin Ruan, Guangwen Yang:
SciHive: Array-Based Query Processing with HiveQL. 887-894 - Burkhard Englert, Reza Gheissari:
Multivalued and Deterministic Peer-to-Peer Polling in Social Networks with Reputation Conscious Participants. 895-902 - Qi Guo, Chao Wang,