default search action
14th SecureComm 2018: Singapore
- Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 254, Springer 2018, ISBN 978-3-030-01700-2
IoT Security
- Yaxing Chen, Wenhai Sun, Ning Zhang, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou:
A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT. 3-21 - Devkishen Sisodia, Samuel Mergendahl, Jun Li, Hasan Cam:
Securing the Smart Home via a Two-Mode Security Framework. 22-42 - Suhas Setikere, Vinay Sachidananda, Yuval Elovici:
Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things. 43-52 - Sophie Dramé-Maigné, Maryline Laurent, Laurent Castillo, Hervé Ganem:
Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain. 53-68
User and Data Privacy
- Katchaguy Areekijseree, Yuzhe Richard Tang, Ju Chen, Shuang Wang, Arun Iyengar, Balaji Palanisamy:
Secure and Efficient Multi-Party Directory Publication for Privacy-Preserving Data Sharing. 71-94 - Abhishek Tiwari, Fabian Bendun, Christian Hammer:
A Formal Logic Framework for the Automation of the Right to Be Forgotten. 95-111 - Yangguang Tian, Yingjiu Li, Rongmao Chen, Nan Li, Ximeng Liu, Bing Chang, Xingjie Yu:
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience. 112-132 - Fengqiong Wei, Wei Zhang, Yunfang Chen, Jingwen Zhao:
Differentially Private High-Dimensional Data Publication via Markov Network. 133-148
Mobile Security
- Ziqi Yang, Zhenkai Liang:
Automated Identification of Sensitive Data via Flexible User Requirements. 151-171 - Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang:
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. 172-192 - Martin Byrenheid, Stefan Köpsell, Alexander Naumenko, Thorsten Strufe:
Transparent Low-Latency Network Anonymisation for Mobile Devices. 193-209 - Yao Guo, Junming Ma, Wenjun Wu, Xiangqun Chen:
Inferring UI States of Mobile Applications Through Power Side Channel Exploitation. 210-226 - Ang Li, Wei Du, Qinghua Li:
PoliteCamera: Respecting Strangers' Privacy in Mobile Photographing. 227-247 - Shanshan Wang, Qiben Yan, Zhenxiang Chen, Lin Wang, Riccardo Spolaor, Bo Yang, Mauro Conti:
Lexical Mining of Malicious URLs for Classifying Android Malware. 248-263 - Zhiqiang Li, Jun Sun, Qiben Yan, Witawas Srisa-an, Shakthi Bachala:
GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applications. 264-280 - Chao Liu, Jianan Li, Min Yu, Bo Luo, Song Li, Kai Chen, Weiqing Huang, Bin Lv:
FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection. 281-293
Wireless Security
- Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng, Roger Zimmermann:
An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks. 297-317 - Rens W. van der Heijden, Thomas Lukaseder, Frank Kargl:
VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs. 318-337 - Chitra Javali, Girish Revadigar:
Birds of a Feather Flock Together: Fuzzy Extractor and Gait-Based Robust Group Secret Key Generation for Smart Wearables. 338-357 - Arne Bochem, Benjamin Leiding, Dieter Hogrefe:
Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks. 358-374
Software Security
- Afsah Anwar, Aminollah Khormali, DaeHun Nyang, Aziz Mohaisen:
Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. 377-395 - Daniel Arp, Erwin Quiring, Tammo Krueger, Stanimir Dragiev, Konrad Rieck:
Privacy-Enhanced Fraud Detection with Bloom Filters. 396-415 - Sungjin Kim, Brent ByungHoon Kang:
FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity Matching. 416-432 - Tommy Chin, Kaiqi Xiong, Chengbin Hu, Yi Li:
A Machine Learning Framework for Studying Domain Generation Algorithm (DGA)-Based Malware. 433-448
Cloud Security
- Weizhong Qiang, Zezhao Dong, Hai Jin:
Se-Lambda: Securing Privacy-Sensitive Serverless Applications Using SGX Enclave. 451-470 - Kennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng, Christoph Meinel:
CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era. 471-490 - Li Liu, An Wang, Wanyu Zang, Meng Yu, Menbai Xiao, Songqing Chen:
Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling. 491-511 - Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li:
Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs. 512-528 - Shiran Pan, Wen-Tao Zhu, Qiongxiao Wang, Bing Chang:
Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations. 529-548 - Wei Du, Ang Li, Qinghua Li:
Privacy-Preserving Multiparty Learning for Logistic Regression. 549-568 - Ang Li, Wei Du, Qinghua Li:
Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud. 569-587 - Qi Zhang, Shaojing Fu, Nan Jia, Ming Xu:
A Verifiable and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data with Accuracy Improvement. 588-604
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.