Abstract is missing.
- A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory DataZhou-Fu Cai, He-Xing Yang, Wang Shuang, Xu Jian, Wang-Ming Wei, Wu-Li Na. 1-8 [doi]
- A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile PlatformBo Yang, Dengguo Feng, Yu Qin. 9-17 [doi]
- Automated User Profiling in Location-Based Mobile Messaging ApplicationsYao Cheng, Chang Xu, Yi Yang, Lingyun Ying, Purui Su, Dengguo Feng. 18-26 [doi]
- PrivateDroid: Private Browsing Mode for AndroidSu Mon Kywe, Christopher Landis, Yutong Pei, Justin Satterfield, Yuan Tian, Patrick Tague. 27-36 [doi]
- TTPCookie: Flexible Third-Party Cookie Management for Increasing Online PrivacyAshar Javed, Christian Merz, Jörg Schwenk. 37-44 [doi]
- Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social BenefitMu Yang, Yijun Yu, Arosha K. Bandara, Bashar Nuseibeh. 45-52 [doi]
- Garbling in Reverse OrderTommi Meskanen, Valtteri Niemi, Noora Nieminen. 53-60 [doi]
- Private Outsourcing of Polynomial FunctionsPeili Li, Haixia Xu, Jiaqi Hong. 61-68 [doi]
- A Machine Learning Based Trust Evaluation Framework for Online Social NetworksKang Zhao, Li Pan. 69-74 [doi]
- Multi-dimensions of Developer Trustworthiness Assessment in OSS CommunityYu Bai, Gang Yin, Huaimin Wang. 75-81 [doi]
- A Novel Feature Selection Approach for Intrusion Detection Data ClassificationMohammed A. Ambusaidi, Xiangjian He, Zhiyuan Tan, Priyadarsi Nanda, Liang Fu Lu, Upasana T. Nagar. 82-89 [doi]
- An On-Line Anomaly Detection Method Based on a New Stationary Metric - Entropy-RatioZiyu Wang, Jiahai Yang, Fuliang Li. 90-97 [doi]
- Reaching Agreement in Security Policy NegotiationYanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey. 98-105 [doi]
- Remembrance of Local Information Status for Enforcing Robustness of Policy-Exchanged Strategies for Trust NegotiationYunxi Zhang, Darren Mundy. 106-113 [doi]
- Secure and Privacy-Friendly Public Key Generation and CertificationFábio Borges, Leonardo A. Martucci, Filipe Beato, Max Mühlhäuser. 114-121 [doi]
- A Stateful Mechanism for the Tree-Rule FirewallThawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan. 122-129 [doi]
- CAFS: A Framework for Context-Aware Federated ServicesMd. Sadek Ferdous, Ron Poet. 130-139 [doi]
- Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage ServicesYong Ho Hwang, Jae Woo Seo, Il Joo Kim. 140-147 [doi]
- High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary FieldsShuai Liu, Lei Ju, Xiaojun Cai, Zhiping Jia, Zhiyong Zhang. 148-155 [doi]
- A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc NetworksChongxian Guo, Huaqiang Xu, Lei Ju, Zhiping Jia, Jihai Xu. 156-163 [doi]
- SIMS: A Comprehensive Approach for a Secure Instant Messaging SifterGünter Fahrnberger. 164-173 [doi]
- Towards Designing an Email Classification System Using Multi-view Based Semi-supervised LearningWenjuan Li, Weizhi Meng, Zhiyuan Tan, Yang Xiang. 174-181 [doi]
- Ultra High-Speed SM2 ASIC ImplementationZhenwei Zhao, Guoqiang Bai. 182-188 [doi]
- Visual Similarity Based Anti-phishing with the Combination of Local and Global FeaturesYu Zhou, Yongzheng Zhang 0002, Jun Xiao, Yipeng Wang, Weiyao Lin. 189-196 [doi]
- A Practically Optimized Implementation of Attribute Based CryptosystemsChunqiang Hu, Fan Zhang, Tao Xiang, Hongjuan Li, Xiao Xiao, Guilin Huang. 197-204 [doi]
- A Robust Authentication Scheme for Observing Resources in the Internet of Things EnvironmentMian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Zhiyuan Tan, Ren Ping Liu. 205-211 [doi]
- Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETsLicai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang. 212-220 [doi]
- Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile SystemsUthpala Subodhani Premarathne, Ibrahim Khalil. 221-228 [doi]
- ToAuth: Towards Automatic Near Field Authentication for SmartphonesWeixi Gu, Zheng Yang, Longfei Shangguan, Xiaoyu Ji, Yiyang Zhao. 229-236 [doi]
- One Kind of Cross-Domain DAA Scheme from Bilinear MappingXiaoming Wang, Heyou Cheng, Ruihua Zhang. 237-243 [doi]
- Long Term Tracking and Characterization of P2P BotnetJia Yan, Lingyun Ying, Yi Yang, Purui Su, Dengguo Feng. 244-251 [doi]
- A Survey of Security Network Coding toward Various AttacksShixiong Yao, Jing Chen, RuiYing Du, Lan Deng, Chiheng Wang. 252-259 [doi]
- Defensor: Lightweight and Efficient Security-Enhanced Framework for AndroidXuerui Pan, Yibing Zhongyang, Zhi-Xin, Bing Mao, Hao Huang. 260-267 [doi]
- Public-Key Encryption Resilient against Linear Related-Key Attacks RevisitedHui Cui, Yi Mu, Man Ho Au. 268-275 [doi]
- The Micro-architectural Support Countermeasures against the Branch Prediction Analysis AttackYa Tan, Jizeng Wei, Wei Guo. 276-283 [doi]
- AHP-Based Quantitative Approach for Assessing and Comparing Cloud SecurityAhmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri. 284-291 [doi]
- Efficiently Attribute-Based Access Control for Mobile Cloud Storage SystemZhiquan Lv, Jialin Chi, Min Zhang, Dengguo Feng. 292-299 [doi]
- EqualVisor: Providing Memory Protection in an Untrusted Commodity HypervisorLiang Deng, Qingkai Zeng, Weiguang Wang, Yao Liu. 300-309 [doi]
- FEACS: A Flexible and Efficient Access Control Scheme for Cloud ComputingYu Zhang, Jing Chen, RuiYing Du, Lan Deng, Yang Xiang, Qing Zhou. 310-319 [doi]
- ONHelp: Components in Building Secure Cloud Based on OpenNebulaKao Zhao, Hai Jin, Deqing Zou, Weiqi Dai. 320-327 [doi]
- Proofs of Ownership and Retrievability in Cloud StorageRuiYing Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng. 328-335 [doi]
- Temporal Access Control with User Revocation for Cloud DataNihal Balani, Sushmita Ruj. 336-343 [doi]
- Trust Enhanced Cloud Security for Healthcare ServicesUdaya Kiran Tupakula, Vijay Varadharajan. 344-351 [doi]
- Trusted Geolocation-Aware Data Placement in Infrastructure CloudsNicolae Paladi, Mudassar Aslam, Christian Gehrmann. 352-360 [doi]
- Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation ContextYuanlong Cao, Jianfeng Guan, Changqiao Xu, Wei Quan, Hongke Zhang. 361-369 [doi]
- AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android AppsJulian Schütte, Dennis Titze, J. M. De Fuentes. 370-379 [doi]
- Attack Tree Based Android Malware Detection with Hybrid AnalysisShuai Zhao, Xiaohong Li, Guangquan Xu, Lei Zhang, Zhiyong Feng. 380-387 [doi]
- Automatically Exploiting Potential Component Leaks in Android ApplicationsLi Li, Alexandre Bartel, Jacques Klein, Yves Le Traon. 388-397 [doi]
- Data-centric Rogue Node Detection in VANETsKamran Zaidi, Milos Milojevic, Veselin Rakocevic, Muttukrishnan Rajarajan. 398-405 [doi]
- Detect Android Malware Variants Using Component Based Topology GraphTong Shen, Yibing Zhongyang, Zhi-Xin, Bing Mao, Hao Huang. 406-413 [doi]
- Evaluation of Android Anti-malware Techniques against Dalvik Bytecode ObfuscationParvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan. 414-421 [doi]
- Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDRSarah Abughazalah, Konstantinos Markantonakis, Keith Mayes. 422-431 [doi]
- Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android SmartphonesZhihui Han, Liang Cheng, Yang Zhang, Shuke Zeng, Yi Deng, Xiaoshan Sun. 432-439 [doi]
- Synthesising End-to-End Security ProtocolsCharles Thevathayan, Peter Bertók, George Fernandez. 440-447 [doi]
- Collaborative and Ubiquitous Consumer Oriented Trusted Service ManagerRaja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron. 448-456 [doi]
- Design and Analysis of a New Feature-Distributed MalwareByungho Min, Vijay Varadharajan. 457-464 [doi]
- On Energy Efficient Scheduling and Load Distribution Based on Renewable Energy for Wireless Mesh Network in Disaster AreaMeng Li, Hiroki Nishiyama, Yasunori Owada, Kiyoshi Hamaguchi. 465-472 [doi]
- Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETsHui Xia, Jia Yu, Zhiyong Zhang, Xiangguo Cheng, Zhen-Kuan Pan. 473-480 [doi]
- BIBRM: A Bayesian Inference Based Road Message Trust Model in Vehicular Ad Hoc NetworksGuanghao Wang, Yue Wu. 481-486 [doi]
- Convergence of True Cooperations in Bayesian Reputation GameJooyoung Lee, Jae C. Oh. 487-494 [doi]
- Practical Assessment of Biba Integrity for TCG-Enabled PlatformsRoberto Sassu, Gianluca Ramunno, Antonio Lioy. 495-504 [doi]
- SigmoRep: A Robust Reputation Model for Open Collaborative EnvironmentsAhmad A. Kardan, Reza Salarmehr, Azade Farshad. 505-510 [doi]
- Towards Robust and Effective Trust Management for Security: A SurveyDongxia Wang, Tim Muller, Yang Liu, Jie Zhang. 511-518 [doi]
- Trust Mechanism for Enforcing Compliance to Secondary Data Use ContractsZeinab Noorian, Johnson Iyilade, Mohsen Mohkami, Julita Vassileva. 519-526 [doi]
- An Effective Path Load Balancing Mechanism Based on SDNJun Li, Xiangqing Chang, Yongmao Ren, Zexin Zhang, Guodong Wang. 527-533 [doi]
- Integrity Levels: A New Paradigm for Protecting Computing SystemsChristipher Jenkins, Lyndon Pierson. 534-543 [doi]
- Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime EnvironmentsMichael Weiß, Steffen Wagner, Roland Hellman, Sascha Wessel. 544-551 [doi]
- Overhead-Free In-Place Recovery Scheme for XOR-Based Storage CodesXiming Fu, Zhiqing Xiao, Shenghao Yang. 552-557 [doi]
- Untrusted User Detection in MicroblogsZidan Yu, Huiqun Yu. 558-564 [doi]
- A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative SignaturesSanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai. 565-574 [doi]
- Anonymous Proxy Signature with Restricted TraceabilityJiannan Wei, Guomin Yang, Yi Mu. 575-581 [doi]
- Efficient Traceable Attribute-Based SignatureShenglong Ding, Yiming Zhao, Yuyang Liu. 582-589 [doi]
- Computation Integrity Measurement Based on Branch TransferJianming Fu, Yan Lin, Xu Zhang, Pengwei Li. 590-597 [doi]
- Emergency Key Rollover in DNSSECZheng Wang, Liyuan Xiao. 598-604 [doi]
- Crowd Sensing of Urban Emergency Events Based on Social Media Big DataZheng Xu, Hui Zhang, Yunhuai Liu, Lin Mei. 605-610 [doi]
- SocAware: A Middleware for Social Applications in Online Social NetworksLiang Chen, Kan Chen, Chengcheng Shao, Peidong Zhu. 611-615 [doi]
- Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed DomainConghuan Ye, Zenggang Xiong, Yaoming Ding, Jiping Li, Guangwei Wang, Xuemin Zhang, Kaibing Zhang. 616-621 [doi]
- A Proposal for a Reference Architecture for Long-Term Archiving, Preservation, and Retrieval of Big DataPhillip Viana, Liria Sato. 622-629 [doi]
- Big Data Analyses for Collective Opinion Elicitation in Social NetworksYingxu Wang, Victor J. Wiebe. 630-637 [doi]
- An Improved Image File Storage Method Using Data DeduplicationZhou Lei, Zhaoxin Li, Yu Lei, Yanling Bi, Luokai Hu, Wenfeng Shen. 638-643 [doi]
- HBaseSpatial: A Scalable Spatial Data Storage Based on HBaseNingyu Zhang, Guozhou Zheng, Huajun Chen, Jiaoyan Chen, Xi Chen. 644-651 [doi]
- On the Application and Performance of MongoDB for Climate Satellite DataParinaz Ameri, Udo Grabowski, Jörg Meyer, Achim Streit. 652-659 [doi]
- Research of Provenance Storage in Cloud Computing EnvironmentZhangxuan Luo, Guoyan Xu. 660-664 [doi]
- Data Interface All-iN-A-Place (DIANA) for Big DataFrank Zhigang Wang, Theo Dimitrakos, Na Helian, Sining Wu, Yuhui Deng, Ling Li, Rodric Yates. 665-672 [doi]
- Performance Evaluation of the SSD-Based Swap System for Big Data ProcessingJaehun Lee, Sungmin Park, Minsoo Ryu, Sooyong Kang. 673-680 [doi]
- A Study on Recursive Neural Network Based Sentiment Classification of Sina WeiboChen Fu, Bai Xue, Zhan Shaobin. 681-685 [doi]
- VALID: A Web Framework for Visual Analytics of Large Streaming DataChenhui Li, George Baciu. 686-692 [doi]
- A High Speed Lossless Compression Algorithm Based on CPU and GPU Hybrid PlatformBin Zhou, Hai Jin, Ran Zheng. 693-698 [doi]
- Improved 2DLDA Algorithm and Its Application in Face RecognitionDong Wang, Shunfang Wang. 707-713 [doi]
- The Evaluation of Emulab as an Environment for Bio-Informatics ResearchKyungWoo Kang, YunHee Kang, Sungjin Sul. 714-720 [doi]
- A Evaluation Method for Web Service with Large Numbers of Historical RecordsLianyong Qi, Jiancheng Ni, Xiaona Xia, Chao Yan, Hua Wang, Wanli Huang. 721-726 [doi]
- BIG DATA: Preconditions to ProductivitySteve Hallman, Jasur Rakhimov, Michel Plaisent, Prosper Bernard. 727-731 [doi]
- Data Mining Application of Decision Trees for Student Profiling at the Open University of ChinaWilton W. T. Fok, Haohua Chen, Jiaqu Yi, Sizhe Li, H. H. Au Yeung, Wang Ying, Liu Fang. 732-738 [doi]
- Aeromancer: A Workflow Manager for Large-Scale MapReduce-Based Scientific WorkflowsNabeel Mohamed, Nabanita Maji, Jing Zhang, Nataliya Timoshevskaya, Wu-chun Feng. 739-746 [doi]
- MapReduce for Large-Scale Monitor Data AnalysesJianwei Ding, Yingbo Liu, Li Zhang, Jianmin Wang 0001. 747-754 [doi]
- FedLoop: Looping on Federated MapReduceChun-yu Wang, Tzu-Li Tai, Kuan-Chieh Huang, Tse-En Liu, Jyh-Biau Chang, Ce-Kuen Shieh. 755-762 [doi]
- In-Map/In-Reduce: Concurrent Job Execution in MapReduceMuhammad Idris, Shujaat Hussain, Sungyoung Lee. 763-768 [doi]
- Towards Policy Retrieval for Provenance Based Access Control ModelJisheng Pei, Xiaojun Ye. 769-776 [doi]
- SARAH - Statistical Analysis for Resource Allocation in HadoopBruce Martin. 777-782 [doi]
- Privacy Aware Non-linear Support Vector Machine for Multi-source Big DataYunmei Lu, Piyaphol Phoungphol, Yanqing Zhang. 783-789 [doi]
- Modeling of Data Provenance on Space and Time Based on OPMJiehua Kang, Guoyan Xu. 790-794 [doi]
- Threshold-Based Secure and Privacy-Preserving Message Verification in VANETsWei Gao, Mingzhong Wang, Liehuang Zhu, Xiaoping Zhang. 795-802 [doi]
- A Semantic Knowledge Base Construction Method for Information SecurityYuangang Yao, Xiaoyu Ma, Hui Liu, Jin Yi, Xianghui Zhao, Lin Liu. 803-808 [doi]
- Adding Privacy to Multicast DNS Service DiscoveryDaniel Kaiser, Marcel Waldvogel. 809-816 [doi]
- Encrypted Program ExecutionDmytro Zhuravlev, Ihor Samoilovych, Roman Orlovskyi, Ievgen Bondarenko, Yaroslav Lavrenyuk. 817-822 [doi]
- Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy ClusteringDuo Liu, Chung-Horng Lung, Nabil Seddigh, Biswajit Nandy. 823-830 [doi]
- Unified Model for Data Security - A Position PaperRaja Naeem Akram, Ryan K. L. Ko. 831-839 [doi]
- A Secure Authentication Protocol for IP-Based Wireless Sensor Communications Using the Location/ID Split Protocol (LISP)Ali Raheem, Aboubaker Lasebae, Jonathan Loo. 840-845 [doi]
- A Compact Hardware Implementation of SM3 Hash FunctionTianyong Ao, Zhangqing He, Jinli Rao, Kui Dai, Xuecheng Zou. 846-850 [doi]
- A Load Balancing Strategy of SDN Controller Based on Distributed DecisionYuanhao Zhou, Mingfa Zhu, Limin Xiao, Li Ruan, Wenbo Duan, Deguo Li, Rui Liu, Mingming Zhu. 851-856 [doi]
- Modeling Degrees of Fairness for CollaborationsFlorian Volk, Maria Pelevina, Sheikh Mahbub Habib, Sascha Hauke, Max Mühlhäuser. 857-864 [doi]
- Performance Analysis on M2M Communication Network Based on Stochastic Network CalculusTao Zhou, Quan Wang, Gao-Cai Wang. 865-870 [doi]
- Mining Specification of Insecure Browser Extension BehaviorHongbin Pei, Xiaohong Li, Guangquan Xu, Zhiyong Feng. 871-876 [doi]
- Detection of Android Malicious Apps Based on the Sensitive BehaviorsDaiyong Quan, Lidong Zhai, Fan Yang, Peng Wang. 877-883 [doi]
- Digital Trust - Trusted Computing and Beyond: A Position PaperRaja Naeem Akram, Ryan K. L. Ko. 884-892 [doi]
- Identifying P2P Network Activities on Encrypted TrafficXiaolei Wang, Jie He, Yuexiang Yang. 893-899 [doi]
- Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart PostersSufian Hameed, Bilal Hameed, Syed Atyab Hussain, Waqas Khalid. 900-905 [doi]
- Survey of Integrity Detection Methods in Internet of ThingsChaoliang Li, Qin Li, Guojun Wang. 906-913 [doi]
- TEEI - A Mobile Security Infrastructure for TEE IntegrationHongfeng Chai, Zhijun Lu, Qingyang Meng, Jun Wang, Xiubang Zhang, Zhijian Zhang. 914-920 [doi]
- Continuous Certification of Non-repudiation in Cloud Storage ServicesMaria Krotsiani, George Spanoudakis. 921-928 [doi]
- JVM-Based Dynamic Attestation in Cloud ComputingHaihe Ba, Zhiying Wang, Jiang-chun Ren, Huaizhe Zhou. 929-934 [doi]
- Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of ConceptBen Martini, Kim-Kwang Raymond Choo. 935-942 [doi]
- vPatcher: VMI-Based Transparent Data Patching to Secure Software in the CloudHao Zhang, Lei Zhao, Lai Xu, Lina Wang, Deming Wu. 943-948 [doi]
- Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloudQuang Do, Ben Martini, Kim-Kwang Raymond Choo. 949-954 [doi]
- A Novel Public Key Encryption Scheme for Large ImageLingjiao Chen, Xinji Chen, Zhigang Peng. 955-960 [doi]
- Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSNGuorui Li, Ying Liu, Ying Wang. 961-966 [doi]
- Attacks on Physically-Embedded Data Encryption for Embedded DevicesChaohui Du, Guoqiang Bai. 967-972 [doi]
- Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical PasswordsHani Moaiteq Aljahdali, Ron Poet. 973-982 [doi]
- Escrow: A Large-Scale Web Vulnerability Assessment ToolBaden Delamore, Ryan K. L. Ko. 983-988 [doi]
- Personal Data Access Based on Trust Assessment in Mobile Social NetworkingZheng Yan, Xueyun Li, Raimo Kantola. 989-994 [doi]