


default search action
11. GPC 2017: Cetara, Italy
- Man Ho Allen Au, Arcangelo Castiglione, Kim-Kwang Raymond Choo, Francesco Palmieri, Kuan-Ching Li:
Green, Pervasive, and Cloud Computing - 12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, Proceedings. Lecture Notes in Computer Science 10232, 2017, ISBN 978-3-319-57185-0
Cryptography, Security and Biometric Techniques
- Roberto De Prisco
, Alfredo De Santis
, Marco Mannetta:
Reducing Costs in HSM-Based Data Centers. 3-14 - Chiara Galdi
, Michele Nappi, Jean-Luc Dugelay
:
Secure User Authentication on Smartphones via Sensor and Face Recognition on Short Video Clips. 15-22 - Amal Ghorbel, Mahmoud Ghorbel, Mohamed Jmaiel:
A Hybrid Approach for Private Data Protection in the Cloud. 23-37 - Jinhua Ma, Jianghua Liu, Min Wang, Wei Wu:
An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control. 38-52 - Xiaoyu Zhang, Tao Jiang, Kuan-Ching Li
, Xiaofeng Chen:
New Publicly Verifiable Computation for Batch Matrix Multiplication. 53-65 - Wenbin Chen, Hao Lei, Jin Li, Chongzhi Gao, Fufang Li, Ke Qi:
A Multi-source Homomorphic Network Coding Signature in the Standard Model. 66-74 - Hamdi Ouechtati, Nadia Ben Azzouna:
Trust-ABAC Towards an Access Control System for the Internet of Things. 75-89 - Neyire Deniz Sarier
:
Privacy Preserving Multimodal Biometric Authentication in the Cloud. 90-104 - Silvio Barra
, Maria De Marsico, Michele Nappi, Fabio Narducci
, Daniel Riccio:
MOHAB: Mobile Hand-Based Biometric Recognition. 105-115 - Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee
, Chien-Ming Chen:
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems. 116-126
Advanced Network Services, Algorithms and Optimization
- Shaoyu Dou, Xin Su, Dongmin Choi, Pankoo Kim, Chang Choi
:
A Study of Interference Cancellation for NOMA Downlink Near-Far Effect to Support Big Data. 129-137 - Sherenaz W. Al-Haj Baddar
, Alessio Merlo, Mauro Migliardi
, Francesco Palmieri:
Dynamic Latency Sensitivity Recognition: An Application to Energy Saving. 138-151 - Duoqiang Wang, Wei Dai, Chi Zhang, Xuanhua Shi, Hai Jin:
TPS: An Efficient VM Scheduling Algorithm for HPC Applications in Cloud. 152-164 - Francesco Carrabs
, Carmine Cerrone
, Raffaele Cerulli, Ciriaco D'Ambrosio
:
Improved Upper and Lower Bounds for the Close Enough Traveling Salesman Problem. 165-177 - Giuliana Carullo, Mario Di Mauro
, Michele Galderisi, Maurizio Longo, Fabio Postiglione
, Marco Tambasco:
Object Storage in Cloud Computing Environments: An Availability Analysis. 178-190 - Shuting Xu, Chase Qishi Wu, Aiqin Hou, Yongqiang Wang, Meng Wang:
Energy-Efficient Dynamic Consolidation of Virtual Machines in Big Data Centers. 191-206 - Flora Amato
, Vincenzo Moscato, Antonio Picariello, Giancarlo Sperlì:
Influence Maximization in Social Media Networks Using Hypergraphs. 207-221 - Guanghui Zhao
, Xingyan Zi, Kaitai Liang
, Panyi Yun, Junwei Zhou
:
A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes. 222-236 - Andrea De Salve
, Barbara Guidi, Paolo Mori
, Laura Ricci, Vincenzo Ambriola:
Privacy and Temporal Aware Allocation of Data in Decentralized Online Social Networks. 237-251 - Antonio Manzalini, Marco Di Girolamo, Giuseppe Celozzi, Fulvio Bruno, Giuliana Carullo, Marco Tambasco, Gino Carrozzo, Fulvio Risso, Gabriele Castellano:
A Unifying Orchestration Operating Platform for 5G. 252-266 - Eva García Martín, Niklas Lavesson, Håkan Grahn
:
Identification of Energy Hotspots: A Case Study of the Very Fast Decision Tree. 267-281
Mobile and Pervasive Computing
- Francesco Carrabs
, Raffaele Cerulli, Ciriaco D'Ambrosio
, Andrea Raiconi:
Prolonging Lifetime in Wireless Sensor Networks with Interference Constraints. 285-297 - Mehrnoosh Monshizadeh, Vikramajeet Khatri
, Raimo Kantola, Zheng Yan
:
An Orchestrated Security Platform for Internet of Robots. 298-312 - Anxi Wang
, Shuzhen Pan, Chen Wang
, Jian Shen
, Dengzhi Liu:
A Novel Clustering Solution for Wireless Sensor Networks. 313-322 - Alexandru-Valentin Vladuta
, Ion Bica, Victor Valeriu Patriciu, Florin Pop:
Reliable Data Collection for Wireless Sensor Networks Using Unmanned Aerial Vehicles. 323-337 - Bogdan Mocanu, Florin Pop, Alexandra Mihaita Mocanu, Ciprian Dobre
, Valentin Cristea, Aniello Castiglione
:
Flaw Recovery in Cloud Based Bio-inspired Peer-to-Peer Systems for Smart Cities. 338-352 - Leonardo C. Monteiro, Flávia Coimbra Delicato, Luci Pirmez, Paulo F. Pires, Claudio Miceli:
DPCAS: Data Prediction with Cubic Adaptive Sampling for Wireless Sensor Networks. 353-368
Cybersecurity
- Mengmeng Yang, Tianqing Zhu, Yang Xiang, Wanlei Zhou
:
Personalized Privacy Preserving Collaborative Filtering. 371-385 - Mauro Conti
, Fabio De Gaspari
, Luigi V. Mancini:
Know Your Enemy: Stealth Configuration-Information Gathering in SDN. 386-401 - Wenjuan Li
, Weizhi Meng
, Lam-for Kwok
:
SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks. 402-415 - Marcello Trovati, Win Thomas, Quanbin Sun, Georgios Kontonatsios
:
Assessment of Security Threats via Network Topology Analysis: An Initial Investigation. 416-425 - Maddalena Favaretto, Riccardo Spolaor, Mauro Conti, Marco Ferrante
:
You Surf so Strange Today: Anomaly Detection in Web Services via HMM and CTMC. 426-440
Parallel and Distributed Computing
- Alin Zhong, Shun Ren, Shouzhi Xu:
CDLP: A Core Distributing Policy Based on Logic Partitioning. 443-459 - Xiaolu Zhang, Weidong Li
, Xi Liu, Xuejie Zhang:
A Profit-Maximum Resource Allocation Approach for Mapreduce in Data Centers. 460-474 - Giuseppe Cattaneo, Umberto Ferraro Petrillo, Michele Nappi, Fabio Narducci
, Gianluca Roscigno
:
An Efficient Implementation of the Algorithm by Lukáš et al. on Hadoop. 475-489 - Marisol García-Valls
, Javier Ampuero-Calleja, Luis Lino Ferreira:
Integration of Data Distribution Service and Raspberry Pi. 490-504 - Marisol García-Valls
, Daniel Garrido, Manuel Díaz
:
Impact of Middleware Design on the Communication Performance. 505-519
Ontologies and Smart Applications
- Jarmo Kalaoja:
Semantic Knowledge and Service Models for Energy-Aware Systems. 523-537 - Xiang Su, Pingjiang Li, Huber Flores, Jukka Riekki, Xiaoli Liu
, Yuhong Li, Christian Prehofer:
Transferring Remote Ontologies to the Edge of Internet of Things Systems. 538-552 - Fabio Clarizia, Saverio Lemma, Marco Lombardi
, Francesco Pascale
:
A Mobile Context-Aware Information System to Support Tourism Events. 553-566 - Fabio Clarizia, Saverio Lemma, Marco Lombardi
, Francesco Pascale
:
An Ontological Digital Storytelling to Enrich Tourist Destinations and Attractions with a Mobile Tailored Story. 567-581
Healthcare Support Systems
- Guan-Chen Li, Chin-Ling Chen, Feng Lin, Jungpil Shin, Cheng Gu:
Design of a Secure Emergency Communication System Based on Cloud for Pregnancy. 585-595 - Alexandra Mihaita Mocanu, Ciprian Dobre
, Florin Pop, Bogdan Mocanu, Valentin Cristea, Christian Esposito
:
A Trust Application in Participatory Sensing: Elder Reintegration. 596-610 - Ye Li, Kaitai Liang
, Chunhua Su, Wei Wu:
DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity. 611-626 - Omar Behadada, Meryem Abi-Ayad, Georgios Kontonatsios
, Marcello Trovati:
Automatic Diagnosis Metabolic Syndrome via a k- Nearest Neighbour Classifier. 627-637
1st International Workshop on Digital Knowledge Ecosystems
- Lasanthi N. C. De Silva, Jeevani S. Goonetillake, Gihan N. Wikramanayake, Athula Ginige
:
Harnessing Mobile Pervasive Computing to Enhance Livelihood Processes: Farmer Response to a Mobile Agriculture Information System. 641-655 - Marie D. Fernando, Athula Ginige
, Ana Hol:
Social Computing: New Pervasive Computing Paradigm to Enhance Triple Bottom Line. 656-671 - Maneesh Mathai, Athula Ginige
, Uma Srinivasan, Federico Girosi
:
Digital Knowledge Ecosystem for Empowering Users to Self-manage Diabetes Through Context Specific Actionable Information. 672-684 - Monica Sebillo, Giuliana Vitiello
, Danilo Cuciniello, Serena Carrabs:
Human-Centered Design of a Personal Medication Assistant - Putting Polypharmacy Management into Patient's Hand! 685-699 - Paloma Díaz
, Teresa Onorati
, Ignacio Aedo
:
A Digital Knowledge Ecosystem to Increase Participation in Emergency Warnings and Alerts Management. 700-711 - Giovanni Acampora
, Genoveffa Tortora, Autilia Vitiello
:
An Intelligent Framework for Predicting State War Engagement from Territorial Data. 712-721
1st Workshop on Cloud Security Modeling, Monitoring and Management (CS3M)
- Alessio Merlo:
BYODCert: Toward a Cross-Organizational BYOD Paradigm. 725-735 - Smrati Gupta, Jaume Ferrarons-Llagostera, Jacek Dominiak
, Victor Muntés-Mulero
, Peter Matthews, Erkuden Rios
:
Security-Centric Evaluation Framework for IT Services. 736-747 - Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli, Erkuden Rios
:
Multi-cloud Applications Security Monitoring. 748-758 - Massimiliano Rak
, Salvatore Venticinque
:
Secure microGRID in Cloud: The CoSSMic Case Study. 759-772 - Valentina Casola
, Alessandra De Benedictis
, Roberto Nardone
:
Towards Model-Based Security Assessment of Cloud Applications. 773-785 - Massimiliano Rak
:
Security Assurance of (Multi-)Cloud Application with Security SLA Composition. 786-799 - Parnian Najafi Borazjani:
Security Issues in Cloud Computing. 800-811

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.