


default search action
12. SecureComm 2016: Guangzhou, China
- Robert H. Deng

, Jian Weng, Kui Ren, Vinod Yegneswaran:
Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 198, Springer 2017, ISBN 978-3-319-59607-5
Mobile Security I
- Zhengyang Qu, Guanyu Guo, Zhengyue Shao, Vaibhav Rastogi, Yan Chen, Hao Chen

, Wangjun Hong:
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management. 3-23 - Dong Shen, Zhangkai Zhang, Xuhua Ding

, Zhoujun Li, Robert H. Deng
:
H-Binder: A Hardened Binder Framework on Android Systems. 24-43 - Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li, Purui Su:

Exploiting Android System Services Through Bypassing Service Helpers. 44-62 - Shaoyong Du

, Yue Gao, Jingyu Hua, Sheng Zhong:
Secure Keyboards Against Motion Based Keystroke Inference Attack. 63-81
Network Security
- Jianbing Ni, Kuan Zhang

, Xiaodong Lin, Yong Yu
, Xuemin (Sherman) Shen
:
Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications. 85-103 - Nicolae Paladi, Christian Gehrmann:

TruSDN: Bootstrapping Trust in Cloud Network Infrastructure. 104-124 - Sang-Yoon Chang, Shaoying Cai, Hwajeong Seo, Yih-Chun Hu:

Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications. 125-143 - Wei Shi

, Mengfei Peng, Jean-Pierre Corriveau, William Lee Croft:
Faulty Node Repair and Dynamically Spawned Black Hole Search. 144-162
Applied Cryptography
- Hui Cui

, Robert H. Deng
, Xuhua Ding
, Yingjiu Li:
Attribute-Based Encryption with Granular Revocation. 165-181 - Assad Umar, Iakovos Gurulian, Keith Mayes, Konstantinos Markantonakis

:
Tokenisation Blacklisting Using Linkable Group Signatures. 182-198 - Tao Zhang, Xiuhua Wang, Sherman S. M. Chow

:
Privacy-Preserving Multi-pattern Matching. 199-218 - Russell W. F. Lai, Sherman S. M. Chow

:
Parallel and Dynamic Structured Encryption. 219-238
ATCS Workshop - Session 1
- Pinaki Sarkar, Morshed Uddin Chowdhury

:
Secure IoT Using Weighted Signed Graphs. 241-256 - Biplob R. Ray

, Morshed U. Chowdhury
, Jemal H. Abawajy:
A Multi-protocol Security Framework to Support Internet of Things. 257-270 - Mark J. Carman, Kim-Kwang Raymond Choo

:
Tinder Me Softly - How Safe Are You Really on Tinder? 271-286 - Mozammel Chowdhury, Junbin Gao

, Rafiqul Islam
:
Biometric Authentication Using Facial Recognition. 287-295 - Fidel Ikundi, Rafiqul Islam

, Peter White:
Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy. 296-304
ATCS Workshop - Session 2
- Jiangyong Shi, Yuexiang Yang:

Architecture Support for Controllable VMI on Untrusted Cloud. 307-316 - Tianjun Wu, Yuexiang Yang:

IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data Leakage. 317-333 - Simi Kamini Bajaj

:
A Multi-layer Model to Detect Spam Email at Client Side. 334-349
Cloud Security
- Enrico Bacis

, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa
, Pierangela Samarati
:
Access Control Management for Secure Cloud Storage. 353-372 - Mohammad Karami, Songqing Chen:

Attribution of Economic Denial of Sustainability Attacks in Public Clouds. 373-391 - Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan:

A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. 392-411 - Lorena González-Manzano, José María de Fuentes

, Kim-Kwang Raymond Choo
:
ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments. 412-428
Web Security and Privacy
- Yuta Takata

, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto:
Website Forensic Investigation to Identify Evidence and Impact of Compromise. 431-453 - Qian Wang

, Xiao Lu, Yan Zhang, Zhibo Wang, Zhan Qin
, Kui Ren:
SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy. 454-474 - Nicolas Van Balen, Christopher T. Ball, Haining Wang:

A Behavioral Biometrics Based Approach to Online Gender Classification. 475-495 - Zheng Xiao, Cheng Wang, Weili Han, Changjun Jiang:

Unique on the Road: Re-identification of Vehicular Location-Based Metadata. 496-513
System Security
- Nathaniel Lageman, Eric D. Kilmer, Robert J. Walls, Patrick D. McDaniel:

BinDNN: Resilient Function Matching Using Deep Learning. 517-537 - Yanhong He, Xianyi Zheng, Ziyuan Zhu, Gang Shi:

TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated Environment. 538-556 - Yao Liu, Ming Xu, Jian Xu, Ning Zheng, Xiaodong Lin:

SQLite Forensic Analysis Based on WAL. 557-574 - Jianming Fu, Yan Lin, Xu Zhang:

Impact of Environment on Branch Transfer of Software. 575-593
Mobile Security II
- Zhiqiang Li, Lichao Sun, Qiben Yan

, Witawas Srisa-an
, Zhenxiang Chen:
DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware. 597-616 - Chengyu Zheng, Nicola Dellarocca, Niccolò Andronio, Stefano Zanero

, Federico Maggi:
GreatEatlon: Fast, Static Detection of Mobile Ransomware. 617-636 - Yongfeng Li, Jinbin Ouyang, Shanqing Guo, Bing Mao:

Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling. 637-654 - Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu:

Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem. 655-672
Hardware Security
- Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Lingchen Zhang:

FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. 675-693 - Jing Yang, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:

Extracting More Entropy for TRNGs Based on Coherent Sampling. 694-709 - Hailiang Fu, Guoqiang Bai, Xingjun Wu:

A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite Field. 710-721 - Muqing Liu, Yuanyuan Zhang, Juanru Li, Junliang Shu, Dawu Gu:

Security Analysis of Vendor Customized Code in Firmware of Embedded Device. 722-739
Poster Session
- Peng Chen, Hao Chen

:
POSTER: Security Analysis of Personal Unmanned Aerial Vehicles. 743-746 - TungNgai Miu, Chenxu Wang, Daniel Xiapu Luo

, Jinhe Wang:
Modeling User Browsing Activity for Application Layer DDoS Attack Detection. 747-750 - Nian Xue, Lulu Liang, Jie Zhang, Xin Huang:

POSTER: A Framework for IoT Reprogramming. 751-754 - Damien Ligier, Sergiu Carpov

, Caroline Fontaine, Renaud Sirdey:
Privacy Preserving Data Classification Using Inner Product Encryption. 755-757 - Peizhao Hu, Siyu Zhu:

POSTER: Location Privacy Using Homomorphic Encryption. 758-761 - Kailei Ren, Qiang Wei, Zehui Wu, Qingxian Wang:

SDNGuardian: Secure Your REST NBIs with API-Grained Permission Checking System. 762-765 - Juan Ai, Zhu Wang, Xinping Zhou, Changhai Ou:

POSTER: A Novel Wavelet Denoising Method Based on Robust Principal Component Analysis in Side Channel Attacks. 766-769 - Ivan Homoliak

, Martin Teknos, Maros Barabas, Petr Hanácek
:
Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. 770-773 - Fei Peng

, Le Qin, Min Long:
POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis. 774-777

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














