default search action
9. SpaCCS 2016: Zhangjiajie, China
- Guojun Wang, Indrakshi Ray, José M. Alcaraz Calero, Sabu M. Thampi:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10066, 2016, ISBN 978-3-319-49147-9 - Zhicai Shi, Fei Wu, Changzhi Wang, Shitao Ren:
A Lightweight RFID Authentication Protocol with Forward Security and Randomized Identifier. 1-13 - Huakang Li, Zhenyu Wang, Yitao Yang, Guozi Sun:
A Security Proxy Scheme Based on Attribute Node Mapping for Cloud Storage. 14-25 - Tao Peng, Qin Liu, Guojun Wang, Yang Xiang:
Privacy Preserving Scheme for Location and Content Protection in Location-Based Services. 26-38 - Qi Wu:
An Improved Asymmetric Searchable Encryption Scheme. 39-44 - Mengxian Li, Wenjun Jiang, Kenli Li:
Recommendation Systems in Real Applications: Algorithm and Parallel Architecture. 45-58 - Wenlin Han, Yang Xiao:
Big Data Security Analytic for Smart Grid with Fog Nodes. 59-69 - Wangyang Yu, Guanjun Liu, Leifeng He:
A Reduction Method of Analyzing Data-Liveness and Data-Boundedness for a Class of E-commerce Business Process Nets. 70-83 - Mimi Wang, GuanJun Liu, Changjun Jiang, ChunGang Yan:
Computation of Secure Consistency for Real Systems. 84-97 - Jiayi Gan, Hongyun Xu, Mengzhen Xu, Kai Tian, Yaohui Zheng, Yong Zhang:
Study on Personalized Location Privacy Protection Algorithms for Continuous Queries in LBS. 98-108 - Jie Wang, Jie Wu:
A Novel Signature Generation Approach in Noisy Environments for Detecting Polymorphic Worm. 109-121 - Jiaqing Mo, Zhongwang Hu, Yuhua Lin:
A User Authentication Scheme Based on Trusted Platform for Cloud Computing. 122-130 - Lu Si, Jie Yu, Lei Luo, Jun Ma, Qingbo Wu, Shasha Li:
ROP-Hunt: Detecting Return-Oriented Programming Attacks in Applications. 131-144 - Jianhong Zhang, Zhibin Sun, Shuai Liu, Pengyan Liu:
On the Security of a Threshold Anonymous Authentication Protocol for VANETs. 145-155 - Yiliang Han:
The Encryption Scheme with Data Compression Based on QC-LDPC. 156-163 - Xi Lin, Yiliang Han, Yan Ke, Xiaoyuan Yang:
Location Privacy Preserving Scheme Based on Attribute Encryption. 164-177 - Dacheng Meng, Wenbo Wang, Entao Luo, Guojun Wang:
Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. 178-189 - Entao Luo, Wenbo Wang, Dacheng Meng, Guojun Wang:
A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks. 190-203 - Li Luo, Hongjun He, Jiao Zhu:
Defect Analysis and Risk Assessment of Mainstream File Access Control Policies. 204-212 - Guanlin Si, Zhitao Guan, Jing Li, Peng Liu, Hong Yao:
A Comprehensive Survey of Privacy-Preserving in Smart Grid. 213-223 - Przemyslaw Blaskiewicz, Miroslaw Kutylowski, Jakub Lemiesz, Malgorzata Sulkowska:
Ghost Train for Anonymous Communication. 224-239 - Peixiu An, Zhitao Guan:
Efficient Detection Method for Data Integrity Attacks in Smart Grid. 240-250 - Changji Wang, Jian Fang, Jianguo Xie:
Fully Secure Unbounded Revocable Key-Policy Attribute-Based Encryption Scheme. 251-264 - Qiang Zhang, Qin Liu, Guojun Wang:
A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data. 265-278 - Sancheng Peng, Shengyi Jiang, Pengfei Yin:
Modeling and Propagation Analysis on Social Influence Using Social Big Data. 279-291 - Jun Pan, Lin Ma, Kai Yu:
FASRP: A Fully Anonymous Security Routing Protocol in MANETs. 292-304 - Kun Xu, Zheng Yan:
Privacy Protection in Mobile Recommender Systems: A Survey. 305-318 - Zhen Yao, Zheng Yan:
Security in Software-Defined-Networking: A Survey. 319-332 - Qiang Huang, Dehua Zhang, Le Chang, Jinhua Zhao:
Building Root of Trust for Report with Virtual AIK and Virtual PCR Usage for Cloud. 333-342 - Hanni Cheng, Shiling Mao, Minhui Xue, Xiaojun Hei:
On the Impact of Location Errors on Localization Attacks in Location-Based Social Network Services. 343-357 - Sardar Hussain, Richard O. Sinnott, Ron Poet:
Service-Oriented Workflow Executability from a Security Perspective. 358-373 - Fang Qi, Wenbo Wang, Zhe Tang:
Distributed Multi-authority Attribute-Based Encryption for Secure Friend Discovery and Data Sharing in Mobile Social Networks. 374-382 - Weina Niu, Xiaosong Zhang, Kenli Li, Guowu Yang, Ruidong Chen:
Modeling Attack Process of Advanced Persistent Threat. 383-391 - Chong Fu, Ming Tie, Jian-Lin Wang, Shao-ting Chen, Hui-yan Jiang:
A New Image Encryption Scheme Using a Hyperchaotic System. 392-405 - Sardar Hussain, Richard O. Sinnott, Ron Poet:
Architectural Patterns for Security-Oriented Workflows in Collaborative Environments. 406-421 - Mimi Wang, GuanJun Liu, ChunGang Yan, Changjun Jiang:
Modeling and Vulnerable Points Analysis for E-commerce Transaction System with a Known Attack. 422-436 - Yang-Wai Chow, Willy Susilo, Guomin Yang, Man Ho Au, Cong Wang:
Authentication and Transaction Verification Using QR Codes with a Mobile Device. 437-451 - Xiaoling Zhu, Zhengfeng Hou, Donghui Hu, Jing Zhang:
Secure and Efficient Mobile Payment Using QR Code in an Environment with Dishonest Authority. 452-465 - Frank Jiang, Mingdong Tang, Quang-Anh Tran:
User Preference-Based Spamming Detection with Coupled Behavioral Analysis. 466-477 - Fei Zhao, Wenchang Shi, Bo Qin, Bin Liang:
Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection. 478-490 - Asha Liza John, Sabu M. Thampi:
Encryption Scheme Based on Hyperelliptic Curve Cryptography. 491-506
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.