default search action
5th SocialSec 2019: Copenhagen, Denmark
- Weizhi Meng, Steven Furnell:
Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers. Communications in Computer and Information Science 1095, Springer 2019, ISBN 978-981-15-0757-1 - Jianming Fu, Lin Li, Yingjun Wang, Jianwei Huang, Guojun Peng:
Web Scanner Detection Based on Behavioral Differences. 1-16 - Jiming Liu, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation. 17-31 - Juyan Li, Chunguang Ma, Kejia Zhang:
A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing. 32-46 - Qikun Zhang, Yongjiao Li, Jianyong Li, Yong Gan, Yanhua Zhang, Jingjing Hu:
Blockchain-Based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network. 47-56 - Liuying Sun, Anthony T. S. Ho, Zhe Xia, Jiageng Chen, Mingwu Zhang:
Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features. 57-73 - Jinbao Gao, Yuanzhang Li, Hongwei Jiang, Lu Liu, Xiaosong Zhang:
An RTP Extension for Reliable User-Data Transmission over VoIP Traffic. 74-86 - Xiaosong Zhang, Linhong Guo, Yuan Xue, Hongwei Jiang, Lu Liu, Quanxin Zhang:
A Hybrid Covert Channel with Feedback over Mobile Networks. 87-94 - Chenyu Wang, Ding Wang, Haowei Wang, Guoai Xu, Jing Sun, Huaxiong Wang:
Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things. 95-109 - Chunsheng Gu:
Integer Version of Ring-LWE and Its Applications. 110-122 - Xiang Cheng, Jiale Zhang, Bing Chen:
Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension. 123-138 - Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski, Chunhua Su:
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds. 139-151 - Zian Liu, Chao Chen, Shigang Liu, Dongxi Liu, Yu Wang:
Exploit in Smart Devices: A Case Study. 152-164 - Jun Zhang, Houda Labiod:
Retrieve the Hidden Leaves in the Forest: Prevent Voting Spamming in Zhihu. 165-180 - Wanlun Ma, Zhuo Liu, Xiangyu Hu:
Online Event Detection in Social Media with Bursty Event Recognition. 181-190 - Xiangyu Wei, Jin Li, Zhen Han, Wei Wang:
Predicting Users' Emotional Intelligence with Social Networking Data. 191-202 - Xiaofeng Wang, Qilin Zhang, Zhenni Shi, Ziyuan Ye:
Design and Implementation of Medical Dispute Governance Based on Blockchain. 203-222 - Jie Ji, Guohua Wu, Chenjian Duan, Yizhi Ren, Zhen Wang:
Greedily Remove k Links to Hide Important Individuals in Social Network. 223-237 - Borui Gong, Xingye Lu, Wang Fat Lau, Man Ho Au:
Blockchain-Based Threshold Electronic Voting System. 238-250 - Teng Zhou, Liang Liu, Haifeng Wang, Wenjuan Li, Chong Jiang:
PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication. 251-263 - Yu Sui, Mengze Yu, Haifeng Hong, Xianxian Pan:
Learning from Imbalanced Data: A Comparative Study. 264-274
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.