Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/trustcom/trustcom2013.bht:"
@inproceedings{DBLP:conf/trustcom/AbdullaTBN13, author = {Umran Azziz Abdulla and Ken Taylor and Michael G. Barlow and Khushnood Z. Naqshbandi}, title = {Measuring Walking and Running Cadence Using Magnetometers}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1458--1462}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.176}, doi = {10.1109/TRUSTCOM.2013.176}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AbdullaTBN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Abu-SaymehAZ13, author = {Dirar Abu{-}Saymeh and Dhiah el Diehn I. Abou{-}Tair and Ahmad Zmily}, title = {An Application Security Framework for Near Field Communication}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {396--403}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.50}, doi = {10.1109/TRUSTCOM.2013.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Abu-SaymehAZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AghasaryanBKKN13, author = {Armen Aghasaryan and Makram Bouzid and Dimitre Kostadinov and Mohit Kothari and Animesh Nandi}, title = {On the Use of {LSH} for Privacy Preserving Personalization}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {362--371}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.46}, doi = {10.1109/TRUSTCOM.2013.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AghasaryanBKKN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AhmedHC13, author = {Muhammad R. Ahmed and Xu Huang and Hongyan Cui}, title = {A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in {WSN}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {688--693}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.276}, doi = {10.1109/TRUSTCOM.2013.276}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AhmedHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AkramMM13, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, title = {A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {336--345}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.245}, doi = {10.1109/TRUSTCOM.2013.245}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AkramMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlazabAHLK13, author = {Ammar Alazab and Jemal H. Abawajy and Michael Hobbs and Robert Layton and Ansam Khraisat}, title = {Crime Toolkits: The Productisation of Cybercrime}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1626--1632}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.273}, doi = {10.1109/TRUSTCOM.2013.273}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlazabAHLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AljahdaliP13, author = {Hani Moaiteq Aljahdali and Ron Poet}, title = {The Affect of Familiarity on the Usability of Recognition-Based Graphical Passwords: Cross Cultural Study between Saudi Arabia and the United Kingdom}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1528--1534}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.187}, doi = {10.1109/TRUSTCOM.2013.187}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AljahdaliP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlmalawiTFK13, author = {Abdulmohsen Almalawi and Zahir Tari and Adil Fahad and Ibrahim Khalil}, title = {A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for {SCADA} Systems}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {292--301}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.40}, doi = {10.1109/TRUSTCOM.2013.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlmalawiTFK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlneyadiSM13, author = {Sultan Alneyadi and Elankayer Sithirasenan and Vallipuram Muthukkumarasamy}, title = {Word N-Gram Based Classification for Data Leakage Prevention}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {578--585}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.71}, doi = {10.1109/TRUSTCOM.2013.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlneyadiSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlsunbulLT13, author = {Saad Alsunbul and Phu Dung Le and Jefferson Tan}, title = {A Defense Security Approach for Infrastructures against Hacking}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1600--1606}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.197}, doi = {10.1109/TRUSTCOM.2013.197}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlsunbulLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlzahraniLL13, author = {Ahmad A. Alzahrani and Seng W. Loke and Hongen Lu}, title = {Conflict and Interference Resolution for Physical Annotation Systems}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1331--1338}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.159}, doi = {10.1109/TRUSTCOM.2013.159}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlzahraniLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ApilettiBCCG13, author = {Daniele Apiletti and Elena Baralis and Tania Cerquitelli and Silvia Chiusano and Luigi Grimaudo}, title = {SeaRum: {A} Cloud-Based Service for Association Rule Mining}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1283--1290}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.153}, doi = {10.1109/TRUSTCOM.2013.153}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ApilettiBCCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AraujoOFNSB13, author = {Nelcileno Virgilio de Souza Ara{\'{u}}jo and Ruy de Oliveira and Ed Wilson Tavares Ferreira and Valtemir Emerencio do Nascimento and Ailton Akira Shinoda and Bharat K. Bhargava}, title = {Kappa-Fuzzy {ARTMAP:} {A} Feature Selection Based Methodology to Intrusion Detection in Computer Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {271--276}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.37}, doi = {10.1109/TRUSTCOM.2013.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AraujoOFNSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AsajSMH013, author = {Naim Asaj and Florian Schaub and Michael M{\"{u}}ter and Albert Held and Michael Weber}, title = {ProTACD: {A} Generic Privacy Process for Vehicle Development}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1675--1682}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.208}, doi = {10.1109/TRUSTCOM.2013.208}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AsajSMH013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AssamS13, author = {Roland Assam and Thomas Seidl}, title = {A Model for Context-Aware Location Identity Preservation Using Differential Privacy}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {346--353}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.45}, doi = {10.1109/TRUSTCOM.2013.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AssamS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Atoofian13, author = {Ehsan Atoofian}, title = {TxSnoop: Power-Aware Transactional Snoop}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {935--940}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.114}, doi = {10.1109/TRUSTCOM.2013.114}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Atoofian13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AzizHGR13, author = {Adnan Aziz and Dirk Hoffstadt and Sebastian Ganz and Erwin P. Rathgeb}, title = {Development and Analysis of Generic VoIP Attack Sequences Based on Analysis of Real Attack Traffic}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {675--682}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.82}, doi = {10.1109/TRUSTCOM.2013.82}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AzizHGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BaigAS13, author = {Zubair Ahmed Baig and Saif Ahmad and Sadiq M. Sait}, title = {Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1594--1599}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.196}, doi = {10.1109/TRUSTCOM.2013.196}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BaigAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BaqasahPHR13, author = {Abdullah M. Baqasah and Eric Pardede and Irena Holubov{\'{a}} and J. Wenny Rahayu}, title = {On Change Detection of {XML} Schemas}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {974--982}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.119}, doi = {10.1109/TRUSTCOM.2013.119}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BaqasahPHR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BatardBR13, author = {Florent Batard and Karima Boudaoud and Michel Riveill}, title = {Securing Mobile Mashups with {SCCM}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {180--187}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.27}, doi = {10.1109/TRUSTCOM.2013.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BatardBR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BhuiyanWC013, author = {Md. Zakirul Alam Bhuiyan and Guojun Wang and Jiannong Cao and Jie Wu}, title = {Local Monitoring and Maintenance for Operational Wireless Sensor Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {837--844}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.102}, doi = {10.1109/TRUSTCOM.2013.102}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BhuiyanWC013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BiswasRZ13, author = {Abhishek Biswas and Desh Ranjan and Mohammad Zubair}, title = {Genome Assembly on a Multicore System}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1233--1240}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.148}, doi = {10.1109/TRUSTCOM.2013.148}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BiswasRZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Bonham-CarterPB13, author = {Oliver Bonham{-}Carter and Abhishek Parakh and Dhundy Bastola}, title = {sEncrypt: An Encryption Algorithm Inspired from Biological Processes}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {321--327}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.43}, doi = {10.1109/TRUSTCOM.2013.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Bonham-CarterPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BonnaireCKM13, author = {Xavier Bonnaire and Rudyar Cort{\'{e}}s and Fabrice Kordon and Olivier Marin}, title = {A Scalable Architecture for Highly Reliable Certification}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {328--335}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.44}, doi = {10.1109/TRUSTCOM.2013.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BonnaireCKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BoudguigaOO13, author = {Aymen Boudguiga and Alexis Olivereau and Nouha Oualha}, title = {Server Assisted Key Establishment for {WSN:} {A} MIKEY-Ticket Approach}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {94--101}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.16}, doi = {10.1109/TRUSTCOM.2013.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BoudguigaOO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BrandoleseFR13, author = {Carlo Brandolese and William Fornaciari and Luigi Rucco}, title = {Power Management Support to Optimal Duty-Cycling in Stateful Multitasking {WSN}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1123--1132}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.136}, doi = {10.1109/TRUSTCOM.2013.136}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BrandoleseFR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BusnelCGHM13, author = {Yann Busnel and Nuno Cruz and Denis Gillet and Adrian Holzer and Hugo Miranda}, title = {Reinventing Mobile Community Computing and Communication}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1450--1457}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.175}, doi = {10.1109/TRUSTCOM.2013.175}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BusnelCGHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CanepaHLK13, author = {Gonzalo Huerta C{\'{a}}nepa and Seungwook Han and Dongman Lee and Byoungoh Kim}, title = {A Place-Aware Stereotypical Trust Supporting Scheme}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {821--828}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.100}, doi = {10.1109/TRUSTCOM.2013.100}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CanepaHLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChandioXTBK13, author = {Aftab Ahmed Chandio and Cheng{-}Zhong Xu and Nikos Tziritas and Kashif Bilal and Samee Ullah Khan}, title = {A Comparative Study of Job Scheduling Strategies in Large-Scale Parallel Computational Systems}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {949--957}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.116}, doi = {10.1109/TRUSTCOM.2013.116}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChandioXTBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenDWY13, author = {Jing Chen and Ruiying Du and Qian Wang and Shixiong Yao}, title = {Secure Routing Based on Network Coding in Wireless Sensor Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {58--64}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.11}, doi = {10.1109/TRUSTCOM.2013.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenDWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenHBTC13, author = {Licheng Chen and Yongbing Huang and Yungang Bao and Guangming Tan and Zehan Cui}, title = {A Study of Leveraging Memory Level Parallelism for {DRAM} System on Multi-core/Many-Core Architecture}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1206--1215}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.145}, doi = {10.1109/TRUSTCOM.2013.145}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenHBTC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLW13, author = {Yu{-}Jia Chen and Chia{-}Yu Lin and Li{-}Chun Wang}, title = {A Privacy-Preserved Joint Group Time Scheduling Mechanism for Mobile Social Applications}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {150--155}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.23}, doi = {10.1109/TRUSTCOM.2013.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenWSZGG13, author = {Chen Chen and Yao Wu and Joshua Suetterlein and Long Zheng and Minyi Guo and Guang R. Gao}, title = {Automatic Locality Exploitation in the Codelet Model}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {853--862}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.104}, doi = {10.1109/TRUSTCOM.2013.104}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenWSZGG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenYTZY13, author = {Zhikun Chen and Shuqiang Yang and Shuang Tan and Ge Zhang and Huiyu Yang}, title = {Hybrid Range Consistent Hash Partitioning Strategy - {A} New Data Partition Strategy for NoSQL Database}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1161--1169}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.140}, doi = {10.1109/TRUSTCOM.2013.140}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenYTZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenZJW13, author = {Zhongwei Chen and Ruihua Zhang and Lei Ju and Wei Wang}, title = {Multivalued Trust Routing Based on Topology Level for Wireless Sensor Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1516--1521}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.185}, doi = {10.1109/TRUSTCOM.2013.185}, timestamp = {Tue, 07 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenZJW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChowdhuryPM13, author = {Soumyadeb Chowdhury and Ron Poet and Lewis Mackenzie}, title = {Exploring the Guessability of Image Passwords Using Verbal Descriptions}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {768--775}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.93}, doi = {10.1109/TRUSTCOM.2013.93}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChowdhuryPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChungS13, author = {Ki{-}Sook Chung and Young{-}Mee Shin}, title = {Communication and Collaboration Service Components for Ubiquitous Communication Applications}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1372--1377}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.242}, doi = {10.1109/TRUSTCOM.2013.242}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChungS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CuiMA13, author = {Hui Cui and Yi Mu and Man Ho Au}, title = {Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {704--711}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.85}, doi = {10.1109/TRUSTCOM.2013.85}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CuiMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DaiLWZZ13, author = {Dong Dai and Xi Li and Chao Wang and Junneng Zhang and Xuehai Zhou}, title = {Detecting Associations in Large Dataset on MapReduce}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1788--1794}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.222}, doi = {10.1109/TRUSTCOM.2013.222}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DaiLWZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DargieW13, author = {Waltenegus Dargie and Jianjun Wen}, title = {A Probabilistic Model for Estimating the Power Consumption of Processors and Network Interface Cards}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {845--852}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.103}, doi = {10.1109/TRUSTCOM.2013.103}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DargieW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DiniMMPSS13, author = {Gianluca Dini and Fabio Martinelli and Ilaria Matteucci and Marinella Petrocchi and Andrea Saracino and Daniele Sgandurra}, title = {Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1541--1546}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.189}, doi = {10.1109/TRUSTCOM.2013.189}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DiniMMPSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DixonM13, author = {Bryan Dixon and Shivakant Mishra}, title = {Power Based Malicious Code Detection Techniques for Smartphones}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {142--149}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.22}, doi = {10.1109/TRUSTCOM.2013.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DixonM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DominguezHMC13, author = {Carlos Dom{\'{\i}}nguez and Houcine Hassan and Vicent Mayans and Alfons Crespo}, title = {Multicore Parallel Implementation of Agent Emotional Processes}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1856--1861}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.248}, doi = {10.1109/TRUSTCOM.2013.248}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DominguezHMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuncanCGQ13, author = {Adrian J. Duncan and Sadie Creese and Michael Goldsmith and Jamie S. Quinton}, title = {Cloud Computing: Insider Attacks on Virtual Machines during Migration}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {493--500}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.62}, doi = {10.1109/TRUSTCOM.2013.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DuncanCGQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ElashryMS13, author = {Ibrahim F. Elashry and Yi Mu and Willy Susilo}, title = {Identity-Based Mediated {RSA} Revisited}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {728--735}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.88}, doi = {10.1109/TRUSTCOM.2013.88}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ElashryMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/EllouzeLB13, author = {Zied Ellouze and Nada Louati and Rafik Bouaziz}, title = {A Next Generation Object-Oriented Environment for Real-Time Database Application Development}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1224--1232}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.147}, doi = {10.1109/TRUSTCOM.2013.147}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/EllouzeLB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/EmuraMR13, author = {Keita Emura and Atsuko Miyaji and Mohammad Shahriar Rahman}, title = {Private Multiparty Set Intersection Protocol in Rational Model}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {431--438}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.54}, doi = {10.1109/TRUSTCOM.2013.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/EmuraMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/EnglertG13, author = {Burkhard Englert and Reza Gheissari}, title = {Multivalued and Deterministic Peer-to-Peer Polling in Social Networks with Reputation Conscious Participants}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {895--902}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.109}, doi = {10.1109/TRUSTCOM.2013.109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/EnglertG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FanP13, author = {Wenjuan Fan and Harry G. Perros}, title = {A Reliability-Based Trust Management Mechanism for Cloud Services}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1581--1586}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.194}, doi = {10.1109/TRUSTCOM.2013.194}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FanP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengZCS13, author = {Tao Feng and Xi Zhao and Bogdan Carbunar and Weidong Shi}, title = {Continuous Mobile Authentication Using Virtual Key Typing Biometrics}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1547--1552}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.272}, doi = {10.1109/TRUSTCOM.2013.272}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FengZCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengZLZ13, author = {Jingyu Feng and Yuqing Zhang and Guangyue Lu and Liang Zhang}, title = {Defend against Collusive {SSDF} Attack Using Trust in Cooperative Spectrum Sensing Environment}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1656--1661}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.205}, doi = {10.1109/TRUSTCOM.2013.205}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FengZLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FerdousMS13, author = {Raihana Ferdous and Vallipuram Muthukkumarasamy and Elankayer Sithirasenan}, title = {Determining Similar Recommenders Using Improved Collaborative Filtering in MANETs}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {110--117}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.18}, doi = {10.1109/TRUSTCOM.2013.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FerdousMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FerdousP13, author = {Md. Sadek Ferdous and Ron Poet}, title = {Portable Personal Identity Provider in Mobile Phones}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {736--745}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.89}, doi = {10.1109/TRUSTCOM.2013.89}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FerdousP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FerreiraGHKL13, author = {Ana Ferreira and Rosario Giustolisi and Jean{-}Louis Huynen and Vincent Koenig and Gabriele Lenzini}, title = {Studies in Socio-technical Security Analysis: Authentication of Identities with {TLS} Certificates}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1553--1558}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.190}, doi = {10.1109/TRUSTCOM.2013.190}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FerreiraGHKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FinsterB13, author = {S{\"{o}}ren Finster and Ingmar Baumgart}, title = {Pseudonymous Smart Metering without a Trusted Third Party}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1723--1728}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.234}, doi = {10.1109/TRUSTCOM.2013.234}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FinsterB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FuZZ13, author = {Anmin Fu and Gongxuan Zhang and Zhenchao Zhu}, title = {A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {310--314}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.41}, doi = {10.1109/TRUSTCOM.2013.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FuZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GalloKD13, author = {Roberto Gallo and Henrique Kawakami and Ricardo Dahab}, title = {Case Study: On the Security of Key Storage on PCs}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1645--1651}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.203}, doi = {10.1109/TRUSTCOM.2013.203}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GalloKD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GambsKC13, author = {S{\'{e}}bastien Gambs and Marc{-}Olivier Killijian and Miguel N{\'{u}}{\~{n}}ez del Prado Cortez}, title = {De-anonymization Attack on Geolocated Data}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {789--797}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.96}, doi = {10.1109/TRUSTCOM.2013.96}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GambsKC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoLZS13, author = {Longxiang Gao and Ming Li and Wanlei Zhou and Wen Shi}, title = {Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {586--593}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.72}, doi = {10.1109/TRUSTCOM.2013.72}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GaoLZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GeDWEY13, author = {Jingguo Ge and Chuan Du and Yulei Wu and Yuepeng E. and Junling You}, title = {Performance Analysis of Load-Aware Anycasting Based on OpenFlow}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1868--1872}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.231}, doi = {10.1109/TRUSTCOM.2013.231}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GeDWEY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GeSEWY13, author = {Jingguo Ge and Hanji Shen and Yuepeng E. and Yulei Wu and Junling You}, title = {An OpenFlow-Based Dynamic Path Adjustment Algorithm for Multicast Spanning Trees}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1478--1483}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.179}, doi = {10.1109/TRUSTCOM.2013.179}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GeSEWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GengHZRY13, author = {Yifeng Geng and Xiaomeng Huang and Meiqi Zhu and Huabin Ruan and Guangwen Yang}, title = {SciHive: Array-Based Query Processing with HiveQL}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {887--894}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.108}, doi = {10.1109/TRUSTCOM.2013.108}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GengHZRY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GoehnerGAAL13, author = {Joshua D. Goehner and Taylor L. Groves and Dorian C. Arnold and Dong H. Ahn and Gregory L. Lee}, title = {An Optimal Algorithm for Extreme Scale Job Launching}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1115--1122}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.135}, doi = {10.1109/TRUSTCOM.2013.135}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GoehnerGAAL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Gomez-IglesiasES13, author = {Antonio G{\'{o}}mez{-}Iglesias and Andreas T. Ernst and Gaurav Singh}, title = {Scalable Multi Swarm-Based Algorithms with Lagrangian Relaxation for Constrained Problems}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1073--1080}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.241}, doi = {10.1109/TRUSTCOM.2013.241}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Gomez-IglesiasES13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GonzalezRSRCMNA13, author = {Nelson Mimura Gonzalez and Marco Antonio Torrez Rojas and Marcos Vinicius Maciel da Silva and Fernando F. Red{\'{\i}}golo and Tereza Cristina Melo de Brito Carvalho and Charles Christian Miers and Mats N{\"{a}}slund and Abu Shohel Ahmed}, title = {A Framework for Authentication and Authorization Credentials in Cloud Computing}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {509--516}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.63}, doi = {10.1109/TRUSTCOM.2013.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GonzalezRSRCMNA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GramachoRL13, author = {Joao Gramacho and Dolores Rexachs and Emilio Luque}, title = {Saving Time in a Program Robustness Evaluation}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1274--1282}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.237}, doi = {10.1109/TRUSTCOM.2013.237}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GramachoRL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GravenhorstTDST13, author = {Franz Gravenhorst and Timothy Turner and Conny Draper and Richard M. Smith and Gerhard Tr{\"{o}}ster}, title = {Validation of a Rowing Oar Angle Measurement System Based on an Inertial Measurement Unit}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1412--1419}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.171}, doi = {10.1109/TRUSTCOM.2013.171}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GravenhorstTDST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoWFZ13, author = {Qi Guo and Chao Wang and Xiaojing Feng and Xuehai Zhou}, title = {Automatic Loop-Based Pipeline Optimization on Reconfigurable Platform}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {919--926}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.112}, doi = {10.1109/TRUSTCOM.2013.112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuoWFZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoWZL13, author = {Qi Guo and Chao Wang and Xuehai Zhou and Xi Li}, title = {Static or Dynamic: Trade-Offs for Task Dependency Analysis for Heterogeneous MPSoC}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {903--910}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.110}, doi = {10.1109/TRUSTCOM.2013.110}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuoWZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HabibVM13, author = {Sheikh Mahbub Habib and Vijay Varadharajan and Max M{\"{u}}hlh{\"{a}}user}, title = {A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {459--468}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.58}, doi = {10.1109/TRUSTCOM.2013.58}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HabibVM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HabibaIA13, author = {Mansura Habiba and Md. Rafiqul Islam and A. B. M. Shawkat Ali}, title = {Access Control Management for Cloud}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {485--492}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.61}, doi = {10.1109/TRUSTCOM.2013.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HabibaIA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HamdiBGY13, author = {Sana Hamdi and Amel Bouzeghoub and Alda Lopes Gan{\c{c}}arski and Sadok Ben Yahia}, title = {Trust Inference Computation for Online Social Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {210--217}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.240}, doi = {10.1109/TRUSTCOM.2013.240}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HamdiBGY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HamidA13, author = {Isredza Rahmi A. Hamid and Jemal H. Abawajy}, title = {Profiling Phishing Email Based on Clustering Approach}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {628--635}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.76}, doi = {10.1109/TRUSTCOM.2013.76}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HamidA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanzlikKKK13, author = {Lucjan Hanzlik and Kamil Kluczniak and Lukasz Krzywiecki and Miroslaw Kutylowski}, title = {Mutual Chip Authentication}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1683--1689}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.209}, doi = {10.1109/TRUSTCOM.2013.209}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HanzlikKKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HaukeBMH13, author = {Sascha Hauke and Sebastian Biedermann and Max M{\"{u}}hlh{\"{a}}user and Dominik Heider}, title = {On the Application of Supervised Machine Learning to Trustworthiness Assessment}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {525--534}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.5}, doi = {10.1109/TRUSTCOM.2013.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HaukeBMH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HiranoCY13, author = {Manabu Hirano and David W. Chadwick and Suguru Yamaguchi}, title = {Use of Role Based Access Control for Security-Purpose Hypervisors}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1613--1619}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.199}, doi = {10.1109/TRUSTCOM.2013.199}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HiranoCY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HongKT13, author = {Jin Bum Hong and Dong Seong Kim and Tadao Takaoka}, title = {Scalable Attack Representation Model Using Logic Reduction Techniques}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {404--411}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.51}, doi = {10.1109/TRUSTCOM.2013.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HongKT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HossainLH13, author = {Al Amin Hossain and Seung{-}Jin Lee and Eui{-}Nam Huh}, title = {Shear-Based Spatial Transformation to Protect Proximity Attack in Outsourced Database}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1633--1638}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.201}, doi = {10.1109/TRUSTCOM.2013.201}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HossainLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HouXHLC13, author = {Fangyong Hou and Nong Xiao and Hongjun He and Fang Liu and Zhiguang Chen}, title = {Novel Physically-Embedded Data Encryption for Embedded Device}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {89--93}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.15}, doi = {10.1109/TRUSTCOM.2013.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HouXHLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuXGLLH13, author = {Yiqing Hu and Yan Xiong and Xudong Gong and Qiwei Lu and Mingxi Li and Wenchao Huang}, title = {{TARS:} Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1729--1734}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.215}, doi = {10.1109/TRUSTCOM.2013.215}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuXGLLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangLH13, author = {Hucai Huang and Tao Li and Jungang Han}, title = {Simulator Implementation and Performance Study of a Polymorphous Array Computer}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1848--1855}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.229}, doi = {10.1109/TRUSTCOM.2013.229}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangWGZW13, author = {Tao Huang and Jing Wang and Xuetao Guan and Qi Zhong and Keyi Wang}, title = {Combining Process-Based Cache Partitioning and Pollute Region Isolation to Improve Shared Last Level Cache Utilization on Multicore Systems}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1153--1160}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.139}, doi = {10.1109/TRUSTCOM.2013.139}, timestamp = {Fri, 22 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangWGZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuebnerFMJ13, author = {Andreas Huebner and Christian Facchi and Markus Meyer and Helge Janicke}, title = {A Model-Based Approach for {RFID} Application Testing}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1490--1497}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.181}, doi = {10.1109/TRUSTCOM.2013.181}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuebnerFMJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HwangPH13, author = {Gwan{-}Hwan Hwang and Jenn{-}Zjone Peng and Wei{-}Sian Huang}, title = {A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {439--446}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.55}, doi = {10.1109/TRUSTCOM.2013.55}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HwangPH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JamesS13, author = {Alex Pappachen James and Sherin Sugathan}, title = {Parallel Realization of Cognitive Cells on Film Mammography}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1873--1878}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.232}, doi = {10.1109/TRUSTCOM.2013.232}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JamesS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangXLZW13, author = {Weiyu Jiang and Ji Xiang and Limin Liu and Daren Zha and Lei Wang}, title = {From Mini House Game to Hobby-Driven Behavioral Biometrics-Based Password}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {712--719}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.86}, doi = {10.1109/TRUSTCOM.2013.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JiangXLZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JohnstoneT13, author = {Michael N. Johnstone and Robert Thompson}, title = {Security Aspects of Military Sensor-Based Defence Systems}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {302--309}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.277}, doi = {10.1109/TRUSTCOM.2013.277}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JohnstoneT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JungF13, author = {Younchan Jung and Enrique Festijo}, title = {Securing {RTP} Packets Using Per-Packet Selective Encryption Scheme for Real-Time Multimedia Applications}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {659--666}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.80}, doi = {10.1109/TRUSTCOM.2013.80}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JungF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JungPA13, author = {Younchan Jung and Marnel Peradilla and J. William Atwood}, title = {Securing Domain Name System Combined with MIPv6 for Mobile Hosts}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {172--179}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.26}, doi = {10.1109/TRUSTCOM.2013.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JungPA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KalavriV13, author = {Vasiliki Kalavri and Vladimir Vlassov}, title = {MapReduce: Limitations, Optimizations and Open Issues}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1031--1038}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.126}, doi = {10.1109/TRUSTCOM.2013.126}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KalavriV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KayesHC13, author = {A. S. M. Kayes and Jun Han and Alan Colman}, title = {A Semantic Policy Framework for Context-Aware Access Control Applications}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {753--762}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.91}, doi = {10.1109/TRUSTCOM.2013.91}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KayesHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhanFLA13, author = {Zeshan Aslam Khan and Edison Pignaton de Freitas and Tony Larsson and Haider Abbas}, title = {A Multi-agent Model for Fire Detection in Coal Mines Using Wireless Sensor Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1754--1761}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.275}, doi = {10.1109/TRUSTCOM.2013.275}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KhanFLA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhanH13, author = {Muhammad Khurram Khan and Debiao He}, title = {Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard"}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1708--1710}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.212}, doi = {10.1109/TRUSTCOM.2013.212}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KhanH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhanPB13, author = {Saeed Farooq Khan and Marius Portmann and Neil W. Bergmann}, title = {VoIP Spam Prevention}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1463--1470}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.177}, doi = {10.1109/TRUSTCOM.2013.177}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KhanPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhogaliDR13, author = {Rashid Khogali and Olivia Das and Kaamran Raahemifar}, title = {Mobile Parallel Computing Algorithms for Single-Buffered, Speed-Scalable Processors}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1832--1839}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.236}, doi = {10.1109/TRUSTCOM.2013.236}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KhogaliDR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KrishnaBG13, author = {T. Raghu Vamsi Krishna and Rajesh P. Barnwal and Soumya K. Ghosh}, title = {MDS-Based Trust Estimation of Event Reporting Node in {VANET}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {315--320}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.42}, doi = {10.1109/TRUSTCOM.2013.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KrishnaBG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KrishnaVT13, author = {Aarthi Krishna and Vijay Varadharajan and Nathan Tarr}, title = {On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {517--524}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.246}, doi = {10.1109/TRUSTCOM.2013.246}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KrishnaVT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KutylowskiL13, author = {Miroslaw Kutylowski and Piotr Lipiak}, title = {Disability Parking Permit - Lightweight But Trustworthy Identity Documents}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1535--1540}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.188}, doi = {10.1109/TRUSTCOM.2013.188}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KutylowskiL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KyrillidisMCM13, author = {Lazaros Kyrillidis and Keith Mayes and Boris Chazalet and Konstantinos Markantonakis}, title = {Card-Present Transactions on the Internet Using the Smart Card Web Server}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {611--619}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.75}, doi = {10.1109/TRUSTCOM.2013.75}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KyrillidisMCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LafuenteS13, author = {Carlos Ballester Lafuente and Jean{-}Marc Seigneur}, title = {Achieving Collaborative Wi-Fi Sharing without Changing Current Technologies}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1510--1515}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.184}, doi = {10.1109/TRUSTCOM.2013.184}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LafuenteS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LeeAHU13, author = {Chunghan Lee and Hirotake Abe and Toshio Hirotsu and Kyoji Umemura}, title = {Performance Implications of Task Scheduling by Predicting Network Throughput on the Internet}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1089--1098}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.132}, doi = {10.1109/TRUSTCOM.2013.132}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LeeAHU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LeeK13, author = {Young{-}Ho Lee and Jihong Kim}, title = {Fast and Accurate On-line Prediction of Performance and Power Consumption in Multicore-based Systems}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1879--1886}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.249}, doi = {10.1109/TRUSTCOM.2013.249}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LeeK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LeeS13, author = {Chung Hwan Lee and Peter Strazdins}, title = {An Analysis of Driver Domain Offload for Paravirtualized Communication}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {871--878}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.106}, doi = {10.1109/TRUSTCOM.2013.106}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LeeS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LeiWZWZ13, author = {Lingguang Lei and Yuewu Wang and Jian Zhou and Lei Wang and Zhongwen Zhang}, title = {A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {126--133}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.20}, doi = {10.1109/TRUSTCOM.2013.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LeiWZWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LenandoJZA13, author = {Halikul Lenando and Mohamad Nazim Jambli and Kartinah bt Hj Zen and Johari Abdullah}, title = {Impact of Mobility Models on Social Structure Formation in Opportunistic Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1434--1441}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.270}, doi = {10.1109/TRUSTCOM.2013.270}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LenandoJZA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiBZ13, author = {Juan Li and Yan Bai and Nazia Zaman}, title = {A Fuzzy Modeling Approach for Risk-Based Access Control in eHealth Cloud}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {17--23}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.66}, doi = {10.1109/TRUSTCOM.2013.66}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiBZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiJJWS13, author = {Yang Li and Lei Ju and Zhiping Jia and Yi Wang and Zili Shao}, title = {Thermal-Aware On-Chip Memory Architecture Exploration}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1386--1393}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.167}, doi = {10.1109/TRUSTCOM.2013.167}, timestamp = {Tue, 07 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiJJWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLLZWY13, author = {Tao Li and Hua Li and Xuechen Liu and Shuai Zhang and Kai Wang and Yulu Yang}, title = {{GPU} Acceleration of Interior Point Methods in Large Scale {SVM} Training}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {863--870}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.105}, doi = {10.1109/TRUSTCOM.2013.105}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiLLZWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLRG13, author = {Yin Li and Chuang Lin and Fengyuan Ren and Yifeng Geng}, title = {{H-PFSP:} Efficient Hybrid Parallel {PFSP} Protected Scheduling for MapReduce System}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1099--1106}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.133}, doi = {10.1109/TRUSTCOM.2013.133}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLRG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiXG13, author = {Peili Li and Haixia Xu and Shu Guo}, title = {Public Verification of Outsourced Computation of Polynomial Functions}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {776--780}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.94}, doi = {10.1109/TRUSTCOM.2013.94}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiXG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiXWZSCZ13, author = {Mingxi Li and Yan Xiong and Xuangou Wu and Xiancun Zhou and Yuhui Sun and Shenpei Chen and Xiaoya Zhu}, title = {A Regional Statistics Detection Scheme against Sybil Attacks in WSNs}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {285--291}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.39}, doi = {10.1109/TRUSTCOM.2013.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiXWZSCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiYW13, author = {Li Li and Wang Yang and Guojun Wang}, title = {{HIWL:} An Unsupervised Learning Algorithm for Indoor Wireless Localization}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1747--1753}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.217}, doi = {10.1109/TRUSTCOM.2013.217}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiYW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLSY13, author = {Yinbo Liu and Xingang Liu and Zhixin Shen and Laurence T. Yang}, title = {Fast Intra Mode Decision Algorithm Based on Spatial-Domain Energy for {H.264/AVC}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1357--1361}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.163}, doi = {10.1109/TRUSTCOM.2013.163}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuXJXW13, author = {Xuejiao Liu and Yingjie Xia and Shasha Jiang and Fubiao Xia and Yanbo Wang}, title = {Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {477--484}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.60}, doi = {10.1109/TRUSTCOM.2013.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuXJXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZHL13, author = {Xiaoxian Liu and Rongcai Zhao and Lin Han and Peng Liu}, title = {An Automatic Parallel-Stage Decoupled Software Pipelining Parallelization Algorithm Based on OpenMP}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1825--1831}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.227}, doi = {10.1109/TRUSTCOM.2013.227}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZLYRGC13, author = {Chang Liu and Xuyun Zhang and Chengfei Liu and Yun Yang and Rajiv Ranjan and Dimitrios Georgakopoulos and Jinjun Chen}, title = {An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.65}, doi = {10.1109/TRUSTCOM.2013.65}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZLYRGC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LomoteyD13, author = {Richard K. Lomotey and Ralph Deters}, title = {Real-Time Effective Framework for Unstructured Data Mining}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1081--1088}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.131}, doi = {10.1109/TRUSTCOM.2013.131}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LomoteyD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoS13, author = {Cheng Luo and Reiji Suda}, title = {An Efficient Task Partitioning and Scheduling Method for Symmetric Multiple {GPU} Architecture}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1133--1142}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.137}, doi = {10.1109/TRUSTCOM.2013.137}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LuoS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaPWZSW13, author = {Yanpeng Ma and Wei Peng and Xiaofeng Wang and Baokang Zhao and Jinshu Su and Chunqing Wu}, title = {A Location Management Algorithm for {LEO} Satellite Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1362--1366}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.164}, doi = {10.1109/TRUSTCOM.2013.164}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaPWZSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaPYSWZ13, author = {Yanpeng Ma and Wei Peng and Wanrong Yu and Jinshu Su and Chunqing Wu and Guohong Zhao}, title = {A Distributed Routing Algorithm for {LEO} Satellite Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1367--1371}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.165}, doi = {10.1109/TRUSTCOM.2013.165}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaPYSWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MadaniK13, author = {Shaahin Madani and Ibrahim Khalil}, title = {Garbled Routing {(GR):} Towards Unification of Anonymous Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {50--57}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.10}, doi = {10.1109/TRUSTCOM.2013.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MadaniK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MamunM13, author = {Mohammad Saiful Islam Mamun and Atsuko Miyaji}, title = {A Fully-Secure {RFID} Authentication Protocol from Exact {LPN} Assumption}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {102--109}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.17}, doi = {10.1109/TRUSTCOM.2013.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MamunM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MatamT13, author = {Rakesh Matam and Somanath Tripathy}, title = {{AFC:} An Effective Metric for Reliable Routing in Wireless Mesh Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {73--80}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.13}, doi = {10.1109/TRUSTCOM.2013.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MatamT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MengK13, author = {Yuxin Meng and Lam{-}for Kwok}, title = {Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {241--248}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.33}, doi = {10.1109/TRUSTCOM.2013.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MengK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MeyerMRL13, author = {Hugo Meyer and Ronal Muresano and Dolores Rexachs and Emilio Luque}, title = {Tuning {SPMD} Applications in Order to Increase Performability}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1170--1178}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.141}, doi = {10.1109/TRUSTCOM.2013.141}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MeyerMRL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MigaultSFHL13, author = {Daniel Migault and St{\'{e}}phane S{\'{e}}n{\'{e}}cal and Stanislas Francfort and Emmanuel Herbert and Maryline Laurent}, title = {PREFETCHing to Overcome {DNSSEC} Performance Issue on Large Resolving Platform}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {694--703}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.84}, doi = {10.1109/TRUSTCOM.2013.84}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MigaultSFHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MirheidariAKJ13, author = {Seyed Ali Mirheidari and Sajjad Arshad and Saeidreza Khoshkdahan and Rasool Jalili}, title = {A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1620--1625}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.200}, doi = {10.1109/TRUSTCOM.2013.200}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MirheidariAKJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Mirowski13, author = {Luke Mirowski}, title = {Exposing Clone {RFID} Tags at the Reader}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1669--1674}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.207}, doi = {10.1109/TRUSTCOM.2013.207}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Mirowski13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MiyakeN13, author = {Yohei Miyake and Hiroshi Nakashima}, title = {Low-Cost Load Balancing for Parallel Particle-in-Cell Simulations with Thick Overlapping Layers}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1107--1114}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.134}, doi = {10.1109/TRUSTCOM.2013.134}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MiyakeN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MoonL13, author = {Aekyung Moon and Sangho Lee}, title = {Design of the Farmer's Experience Based Greenhouse Operating Systems}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1407--1411}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.170}, doi = {10.1109/TRUSTCOM.2013.170}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MoonL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MorshedAD13, author = {Ahsan Morshed and Jagannath Aryal and Ritaban Dutta}, title = {Environmental Spatio-temporal Ontology for the Linked Open Data Cloud}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1907--1912}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.279}, doi = {10.1109/TRUSTCOM.2013.279}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MorshedAD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MuhlbauerZK13, author = {Adam Muhlbauer and Timothy Zelinsky and Salil S. Kanhere}, title = {Platform Zero: {A} Context-Based Computing Platform for Collaboration}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1420--1427}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.172}, doi = {10.1109/TRUSTCOM.2013.172}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MuhlbauerZK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MuralidharanCG13, author = {Servesh Muralidharan and Kevin Casey and David Gregg}, title = {A Parallel Runtime Framework for Communication Intensive Stream Applications}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1179--1187}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.142}, doi = {10.1109/TRUSTCOM.2013.142}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MuralidharanCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MuralidharanVMG13, author = {Servesh Muralidharan and Aravind Vasudevan and Avinash Malik and David Gregg}, title = {Heterogeneous Multiconstraint Application Partitioner {(HMAP)}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {999--1007}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.122}, doi = {10.1109/TRUSTCOM.2013.122}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MuralidharanVMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MurshedSIA13, author = {M. Manzur Murshed and Tishna Sabrina and Anindya Iqbal and Mortuza Ali}, title = {Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {798--804}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.97}, doi = {10.1109/TRUSTCOM.2013.97}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MurshedSIA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NakamuraKWM13, author = {Toru Nakamura and Shinsaku Kiyomoto and Ryu Watanabe and Yutaka Miyake}, title = {{P3MCF:} Practical Privacy-Preserving Multi-domain Collaborative Filtering}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {354--361}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.271}, doi = {10.1109/TRUSTCOM.2013.271}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NakamuraKWM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NinggalA13, author = {Mohd Izuan Hafez Ninggal and Jemal H. Abawajy}, title = {Preserving Utility in Social Network Graph Anonymization}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {226--232}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.31}, doi = {10.1109/TRUSTCOM.2013.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NinggalA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NoorSA13, author = {Talal H. Noor and Quan Z. Sheng and Abdullah Alfazi}, title = {Reputation Attacks Detection for Effective Trust Assessment among Cloud Services}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {469--476}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.59}, doi = {10.1109/TRUSTCOM.2013.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NoorSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NurseACGL13, author = {Jason R. C. Nurse and Ioannis Agrafiotis and Sadie Creese and Michael Goldsmith and Koen Lamberts}, title = {Building Confidence in Information-Trustworthiness Metrics for Decision Support}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {535--543}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.6}, doi = {10.1109/TRUSTCOM.2013.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NurseACGL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OglazaLZ13, author = {Arnaud Oglaza and Romain Laborde and Pascale Zarat{\'{e}}}, title = {Authorization Policies: Using Decision Support System for Context-Aware Protection of User's Private Data}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1639--1644}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.202}, doi = {10.1109/TRUSTCOM.2013.202}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/OglazaLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OkaforKWA13, author = {Uzo Okafor and Ramesh K. Karne and Alexander L. Wijesinha and Patrick Appiah{-}Kubi}, title = {A Methodology to Transform an OS-Based Application to a Bare Machine Application}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1428--1433}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.173}, doi = {10.1109/TRUSTCOM.2013.173}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/OkaforKWA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OliveiraQ13, author = {Maria das Gracas da Silva Oliveira and Ruy J. G. B. de Queiroz}, title = {Scheme of User Privacy Protection Applied to Online Marketing}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {380--387}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.48}, doi = {10.1109/TRUSTCOM.2013.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/OliveiraQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OthmanTYA13, author = {Soufiene Ben Othman and Abdelbasset Trad and Habib Youssef and Hani Alzaid}, title = {Secure Data Aggregation with {MAC} Authentication in Wireless Sensor Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {188--195}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.252}, doi = {10.1109/TRUSTCOM.2013.252}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/OthmanTYA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Paintsil13, author = {Ebenezer Paintsil}, title = {Towards Automation of Privacy and Security Risks Analysis in Identity Management Systems}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {720--727}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.87}, doi = {10.1109/TRUSTCOM.2013.87}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Paintsil13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PanZ13, author = {Lei Pan and Yan Zhou}, title = {Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation Attacks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {636--643}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.77}, doi = {10.1109/TRUSTCOM.2013.77}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PanZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ParkCO13, author = {Dae{-}Ha Park and Eun{-}Ae Cho and Byung{-}Won On}, title = {Social Spam Discovery Using Bayesian Network Classifiers Based on Feature Extractions}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1808--1811}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.274}, doi = {10.1109/TRUSTCOM.2013.274}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ParkCO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ParkSWASM13, author = {HeeJong Park and Zoran Salcic and Kevin I{-}Kai Wang and Udayanto Dwi Atmojo and Wei{-}Tsun Sun and Avinash Malik}, title = {A New Design Paradigm for Designing Reactive Pervasive Concurrent Systems with an Ambient Intelligence Example}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1188--1197}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.143}, doi = {10.1109/TRUSTCOM.2013.143}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ParkSWASM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ParraMR13, author = {Octavio J. Salcedo Parra and Neil Orlando Diaz Martinez and Gustavo L{\'{o}}pez Rubio}, title = {Comparison {SIP} and {IAX} to Voice Packet Signaling over {VOIP}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1442--1449}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.174}, doi = {10.1109/TRUSTCOM.2013.174}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ParraMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PattersonHP13, author = {Nicholas Charles Patterson and Michael Hobbs and Darren Palmer}, title = {A Direct Insight into Victims of Cybercrime}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {603--610}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.74}, doi = {10.1109/TRUSTCOM.2013.74}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PattersonHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengH13, author = {Manman Peng and Yan Hu}, title = {A Power Model Combined of Architectural Level and Gate Level for Multicore Processors}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1652--1655}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.204}, doi = {10.1109/TRUSTCOM.2013.204}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PengH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengWY13, author = {Sancheng Peng and Guojun Wang and Shui Yu}, title = {Modeling Malware Propagation in Smartphone Social Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {196--201}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.28}, doi = {10.1109/TRUSTCOM.2013.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PengWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PhuttharakL13, author = {Jurairat Phuttharak and Seng W. Loke}, title = {LogicCrowd: {A} Declarative Programming Platform for Mobile Crowdsourcing}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1323--1330}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.158}, doi = {10.1109/TRUSTCOM.2013.158}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PhuttharakL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PykaRU13, author = {Arthur Pyka and Mathias Rohde and Sascha Uhrig}, title = {Performance Evaluation of the Time Analysable On-Demand Coherent Cache}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1887--1892}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.250}, doi = {10.1109/TRUSTCOM.2013.250}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PykaRU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiaoYJH13, author = {Yong Qiao and Yuexiang Yang and Lin Ji and Jie He}, title = {Analyzing Malware by Abstracting the Frequent Itemsets in {API} Call Sequences}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {265--270}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.36}, doi = {10.1109/TRUSTCOM.2013.36}, timestamp = {Tue, 20 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiaoYJH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiaoYJTH13, author = {Yong Qiao and Yuexiang Yang and Lin Ji and Chuan Tang and Jie He}, title = {A Lightweight Design of Malware Behavior Representation}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1607--1612}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.198}, doi = {10.1109/TRUSTCOM.2013.198}, timestamp = {Tue, 20 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiaoYJTH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiuCLZ13, author = {Xiaofeng Qiu and Lei Cao and Pengfei Li and Liang Zhao}, title = {A Trust Evaluation Method for Supplier Selection}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1498--1503}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.182}, doi = {10.1109/TRUSTCOM.2013.182}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QiuCLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QuJJXZ13, author = {Chuanhao Qu and Lei Ju and Zhiping Jia and Huaqiang Xu and Longpeng Zheng}, title = {Light-Weight Trust-Based On-Demand Multipath Routing Protocol for Mobile Ad Hoc Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {42--49}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.9}, doi = {10.1109/TRUSTCOM.2013.9}, timestamp = {Tue, 07 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QuJJXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QuesnelLPSB13, author = {Flavien Quesnel and Adrien Lebre and Jonathan Pastor and Mario S{\"{u}}dholt and Daniel Balouek}, title = {Advanced Validation of the {DVMS} Approach to Fully Distributed {VM} Scheduling}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1249--1256}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.150}, doi = {10.1109/TRUSTCOM.2013.150}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QuesnelLPSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QureshiE13, author = {Athar Mahmood Ahmed Qureshi and Nina Evans}, title = {The Role of Trust in Absorptive Capacity Operationalization}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1812--1816}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.225}, doi = {10.1109/TRUSTCOM.2013.225}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QureshiE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RagavanP13, author = {Harini Ragavan and Brajendra Panda}, title = {Mitigating Malicious Updates: Prevention of Insider Threat to Databases}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {781--788}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.95}, doi = {10.1109/TRUSTCOM.2013.95}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RagavanP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RamachandranLP13, author = {Karthick Ramachandran and Hanan Lutfiyya and Mark Perry}, title = {On Subjective Trust for Privacy Policy Enforcement in Cloud Computing}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1573--1580}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.193}, doi = {10.1109/TRUSTCOM.2013.193}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RamachandranLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RamaiahK13, author = {Y. Govinda Ramaiah and G. Vijaya Kumari}, title = {Complete Privacy Preserving Auditing for Data Integrity in Cloud Computing}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1559--1566}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.191}, doi = {10.1109/TRUSTCOM.2013.191}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RamaiahK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RameshRV13, author = {Bharath Ramesh and Calvin J. Ribbens and Srinidhi Varadarajan}, title = {Regional Consistency: Programmability and Performance for Non-cache-coherent Systems}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {941--948}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.115}, doi = {10.1109/TRUSTCOM.2013.115}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RameshRV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RamezaniSM13, author = {Khosrow Ramezani and Elankayer Sithirasenan and Vallipuram Muthukkumarasamy}, title = {Formal Verification of the Coordinated Robust Authentication Protocol for Wireless Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1735--1740}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.239}, doi = {10.1109/TRUSTCOM.2013.239}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RamezaniSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RashidNHS13, author = {Mahmood A. Rashid and M. A. Hakim Newton and Md. Tamjidul Hoque and Abdul Sattar}, title = {Collaborative Parallel Local Search for Simplified Protein Structure Prediction}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {966--973}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.118}, doi = {10.1109/TRUSTCOM.2013.118}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RashidNHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RifaiV13, author = {Mayssaa El Rifai and Pramode K. Verma}, title = {An Algorithmic Approach to Securing the Three-Stage Quantum Cryptography Protocol}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1803--1807}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.224}, doi = {10.1109/TRUSTCOM.2013.224}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RifaiV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RobertsonLB13, author = {Paul Robertson and Robert Laddaga and Mark H. Burstein}, title = {Trust and Adaptation in {STRATUS}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1711--1716}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.213}, doi = {10.1109/TRUSTCOM.2013.213}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RobertsonLB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RuanFZHL13, author = {Ou Ruan and Cai Fu and Jing Zhou and Lansheng Han and Xiaoyang Liu}, title = {Efficient Fair UC-Secure Two-Party Computation on Committed Inputs}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {544--551}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.7}, doi = {10.1109/TRUSTCOM.2013.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RuanFZHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SaadACJ13, author = {Walid Saad and Heithem Abbes and Christophe C{\'{e}}rin and Mohamed Jemni}, title = {A Data Prefetching Model for Desktop Grids and the Condor Use Case}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1065--1072}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.130}, doi = {10.1109/TRUSTCOM.2013.130}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SaadACJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SaccoBD13, author = {Owen Sacco and John G. Breslin and Stefan Decker}, title = {Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {218--225}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.30}, doi = {10.1109/TRUSTCOM.2013.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SaccoBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SaladaB13, author = {Jo{\~{a}}o Salada and Jo{\~{a}}o Pedro Barreto}, title = {TurboSockets: Democratizing Distributed Deduplication}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1291--1298}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.154}, doi = {10.1109/TRUSTCOM.2013.154}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SaladaB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SaleemKFAO13, author = {Kashif Saleem and Mohammed Sayim Khalil and Norsheila Fisal and Adel Ali Ahmed and Mehmet Ali Orgun}, title = {Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1662--1668}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.206}, doi = {10.1109/TRUSTCOM.2013.206}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SaleemKFAO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SamadLR13, author = {Javeria Samad and Seng W. Loke and Karl Reed}, title = {Quantitative Risk Analysis for Mobile Cloud Computing: {A} Preliminary Approach and a Health Application Case Study}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1378--1385}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.166}, doi = {10.1109/TRUSTCOM.2013.166}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SamadLR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SanchezGML13, author = {Felipe D{\'{\i}}az S{\'{a}}nchez and Maurice Gagnaire and Iain James Marshall and Jean{-}Pierre Laisn{\'{e}}}, title = {{COSCHED:} {A} Scheduling Agent Maximizing Cloud Broker's Revenues under the CompatibleOne Architecture}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1862--1867}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.230}, doi = {10.1109/TRUSTCOM.2013.230}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SanchezGML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SantosQSJ13, author = {Wagner Medeiros dos Santos and Ruy J. G. B. de Queiroz and Carlos E. R. Saraiva and Gleudson P. V. Junior}, title = {Toward Coercion-Resistant End-to-End Verifiable Electronic Voting Systems}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1696--1703}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.278}, doi = {10.1109/TRUSTCOM.2013.278}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SantosQSJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Sarnowska-UptonG13, author = {Karolina Sarnowska{-}Upton and Andrew S. Grimshaw}, title = {The Value of Automation: {A} Study of {MPI} Application Migration Methods}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1241--1248}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.149}, doi = {10.1109/TRUSTCOM.2013.149}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Sarnowska-UptonG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SeredynskiASK13, author = {Marcin Seredynski and Riad Aggoune and Krzysztof Szczypiorski and Djamel Khadraoui}, title = {Performance Evaluation of Trust-Based Collaborative Sanctioning in MANETs}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {81--88}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.14}, doi = {10.1109/TRUSTCOM.2013.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SeredynskiASK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShanLH13, author = {Rui Shan and Tao Li and Jungang Han}, title = {The Buffered Edge Reconfigurable Cell Array and Its Applications}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1023--1030}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.125}, doi = {10.1109/TRUSTCOM.2013.125}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShanLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SiWZ13, author = {Xiaolin Si and Pengpian Wang and Liwu Zhang}, title = {{KP-ABE} Based Verifiable Cloud Access Control Scheme}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {34--41}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.68}, doi = {10.1109/TRUSTCOM.2013.68}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SiWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Soria-ComasDSM13, author = {Jordi Soria{-}Comas and Josep Domingo{-}Ferrer and David S{\'{a}}nchez and Sergio Mart{\'{\i}}nez}, title = {Improving the Utility of Differentially Private Data Releases via k-Anonymity}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {372--379}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.47}, doi = {10.1109/TRUSTCOM.2013.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Soria-ComasDSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SouzaLC13, author = {Rick Lopes de Souza and Lau Cheuk Lung and Ricardo Felipe Cust{\'{o}}dio}, title = {Multi-factor Authentication in Key Management Systems}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {746--752}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.90}, doi = {10.1109/TRUSTCOM.2013.90}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SouzaLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuenKTJL13, author = {Chun Hui Suen and Ryan K. L. Ko and Yu Shyang Tan and Peter Jagadpramana and Bu{-}Sung Lee}, title = {S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {594--602}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.73}, doi = {10.1109/TRUSTCOM.2013.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SuenKTJL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunGZSZ13, author = {Meng Sun and Weidong Gu and Xinchang Zhang and Huiling Shi and Wei Zhang}, title = {A Matrix Transformation Algorithm for Virtual Machine Placement in Cloud}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1778--1783}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.221}, doi = {10.1109/TRUSTCOM.2013.221}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SunGZSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunLKY13, author = {Chao Sun and Xingang Liu and Kai Kang and Laurence T. Yang}, title = {Quality Assessment for Stereoscopic Image Based on {DCT} Frequency Information}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1394--1398}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.168}, doi = {10.1109/TRUSTCOM.2013.168}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SunLKY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TaiCLZ13, author = {Yunfang Tai and Wanwei Cai and Qi Liu and Ge Zhang}, title = {KVM-Loongson: An Efficient Hypervisor on {MIPS}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1016--1022}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.124}, doi = {10.1109/TRUSTCOM.2013.124}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TaiCLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TaoY13, author = {Yuan Tao and Shui Yu}, title = {DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {233--240}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.32}, doi = {10.1109/TRUSTCOM.2013.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TaoY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ThevathayanHB13, author = {Charles Thevathayan and James Harland and Peter Bert{\'{o}}k}, title = {An Endorsement Trust Model}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {829--836}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.101}, doi = {10.1109/TRUSTCOM.2013.101}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ThevathayanHB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ThomasonLBJ13, author = {Alasdair Thomason and Matthew Leeke and Matthew Bradbury and Arshad Jhumka}, title = {Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {667--674}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.81}, doi = {10.1109/TRUSTCOM.2013.81}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ThomasonLBJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TitzeHS13, author = {Dennis Titze and Hans Hofinger and Peter Schoo}, title = {Using Secure Multiparty Computation for Collaborative Information Exchange}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1717--1722}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.214}, doi = {10.1109/TRUSTCOM.2013.214}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TitzeHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TranLHB13, author = {Nhat{-}Phuong Tran and Myungho Lee and Sugwon Hong and Jongwoo Bae}, title = {Performance Optimization of Aho-Corasick Algorithm on a {GPU}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1143--1152}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.138}, doi = {10.1109/TRUSTCOM.2013.138}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TranLHB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TsaiLLTCHS13, author = {Yi{-}Hsueh Tsai and Yi{-}Ting Lin and Kanchei Loa and Tsung{-}Yu Tsai and Chun{-}Che Chien and Dun{-}Cheih Huang and Shiann{-}Tsong Sheu}, title = {Proximity-Based Service beyond 4G Network: Peer-Aware Discovery and Communication Using {E-UTRAN} and {WLAN}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1345--1350}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.161}, doi = {10.1109/TRUSTCOM.2013.161}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TsaiLLTCHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Tse13, author = {Savio S. H. Tse}, title = {Bicriteria Load Balancing for Online Placement in Heterogeneous Servers with Pareto Upper Bounds}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {958--965}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.117}, doi = {10.1109/TRUSTCOM.2013.117}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Tse13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TsengCL13, author = {Fu{-}Kuo Tseng and Rong{-}Jaye Chen and Bao{-}Shuh Paul Lin}, title = {iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {452--458}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.57}, doi = {10.1109/TRUSTCOM.2013.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TsengCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TudoranCA13, author = {Radu Tudoran and Alexandru Costan and Gabriel Antoniu}, title = {DataSteward: Using Dedicated Compute Nodes for Scalable Data Management on Public Clouds}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1057--1064}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.129}, doi = {10.1109/TRUSTCOM.2013.129}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TudoranCA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TupakulaV13, author = {Udaya Kiran Tupakula and Vijay Varadharajan}, title = {Trust Enhanced Security Architecture for Detecting Insider Threats}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {552--559}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.8}, doi = {10.1109/TRUSTCOM.2013.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TupakulaV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TurnerW13, author = {Hamilton A. Turner and Jules White}, title = {Multi-core Deployment Optimization Using Simulated Annealing and Ant Colony Optimization}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1216--1223}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.146}, doi = {10.1109/TRUSTCOM.2013.146}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TurnerW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/UllahAY13, author = {Kazi Wali Ullah and Abu Shohel Ahmed and Jukka Ylitalo}, title = {Towards Building an Automated Security Compliance Tool for the Cloud}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1587--1593}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.195}, doi = {10.1109/TRUSTCOM.2013.195}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/UllahAY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/VolkSHM13, author = {Florian Volk and Florian Sokoli and Sascha Hauke and Max M{\"{u}}hlh{\"{a}}user}, title = {Formalizing and Modeling Fairness for Benefit Distribution in Collaborations}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {412--420}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.52}, doi = {10.1109/TRUSTCOM.2013.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/VolkSHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WahidP13, author = {Norfaradilla Wahid and Eric Pardede}, title = {Protecting Cumulative Node Constraint during {XML} Update}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1795--1802}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.223}, doi = {10.1109/TRUSTCOM.2013.223}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WahidP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangDLLHCB13, author = {Long Wang and Rubing Duan and Xiaorong Li and Sifei Lu and Terence Hung and Rodrigo N. Calheiros and Rajkumar Buyya}, title = {An Iterative Optimization Framework for Adaptive Workflow Management in Computational Clouds}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1049--1056}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.128}, doi = {10.1109/TRUSTCOM.2013.128}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangDLLHCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangHFHXY13, author = {Wencan Wang and Xiaomeng Huang and Haohuan Fu and Yong Hu and Shizhen Xu and Guangwen Yang}, title = {{CFIO:} {A} Fast {I/O} Library for Climate Models}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {911--918}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.111}, doi = {10.1109/TRUSTCOM.2013.111}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangHFHXY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangL13, author = {Zhiwei Wang and Wei Lv}, title = {Server-Aided Verification Proxy Re-signature}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1704--1707}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.211}, doi = {10.1109/TRUSTCOM.2013.211}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLWG13, author = {Pingjian Wang and Zongbin Liu and Lei Wang and Neng Gao}, title = {High Radix Montgomery Modular Multiplier on Modern {FPGA}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1484--1489}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.180}, doi = {10.1109/TRUSTCOM.2013.180}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangLWG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWLS13, author = {Tianzuo Wang and Huaimin Wang and Bo Liu and Peichang Shi}, title = {What is the Pattern of a Botnet?}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {257--264}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.35}, doi = {10.1109/TRUSTCOM.2013.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangWLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWS13, author = {Jingquan Wang and Guilin Wang and Willy Susilo}, title = {Secure Single Sign-On Schemes Constructed from Nominative Signatures}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {620--627}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.238}, doi = {10.1109/TRUSTCOM.2013.238}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangY13, author = {Chi{-}Hsien Wang and Gwo{-}Jong Yu}, title = {Power Control and Channel Assignment Mechanisms for Cluster-Based Multichannel Vehicular Ad-Hoc Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1762--1767}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.218}, doi = {10.1109/TRUSTCOM.2013.218}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZCJ13, author = {Wei Wang and Ruihua Zhang and Zhongwei Chen and Lei Ju}, title = {Normal Vector Based Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1339--1344}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.160}, doi = {10.1109/TRUSTCOM.2013.160}, timestamp = {Tue, 07 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangZCJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZWSL13, author = {Yong Wang and Nan Zhang and Yan{-}mei Wu and Bin{-}bin Su and Yong{-}jian Liao}, title = {Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {134--141}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.21}, doi = {10.1109/TRUSTCOM.2013.21}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangZWSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WazanBDG13, author = {Ahmad Samer Wazan and Gregory Blanc and Herv{\'{e}} Debar and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Attribute-Based Mining Process for the Organization-Based Access Control Model}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {421--430}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.53}, doi = {10.1109/TRUSTCOM.2013.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WazanBDG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WongRL13, author = {Alvaro Wong and Dolores Rexachs and Emilio Luque}, title = {Enhanced Method for the Signature Adaptability to the Application Behavior}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1265--1273}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.152}, doi = {10.1109/TRUSTCOM.2013.152}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WongRL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuLRL13, author = {Guowei Wu and Ying Li and Jiankang Ren and Chi Lin}, title = {Partitioned Fixed-Priority Real-Time Scheduling Based on Dependent Task-Split on Multicore Platform}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1257--1264}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.151}, doi = {10.1109/TRUSTCOM.2013.151}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuLRL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuTL13, author = {Wenkang Wu and Zhuo Tang and Renfa Li}, title = {On the Complexity of Authorization of Temporal {RBAC} in Cloud Computing Service}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1567--1572}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.192}, doi = {10.1109/TRUSTCOM.2013.192}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuWYL13, author = {Guowei Wu and Jia Wang and Lin Yao and Chi Lin}, title = {A Secure Social-Aware Incentive Scheme for Delay Tolerant Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {813--820}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.99}, doi = {10.1109/TRUSTCOM.2013.99}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuWYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuXZC13, author = {Qiong Wu and Pingping Xu and Suheng Zhang and Hongyun Chu}, title = {A Distributed Localization Algorithm Based on Random Diffusion in {WSN}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1774--1777}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.220}, doi = {10.1109/TRUSTCOM.2013.220}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuXZC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiangLB13, author = {Ming Xiang and William Liu and Quan Bai}, title = {{TIGER:} {A} Trust-based Intelligent Geographical Energy-aware Routing for Smart Grid Communication Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {65--72}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.12}, doi = {10.1109/TRUSTCOM.2013.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XiangLB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiangY013, author = {Dong Xiang and Zhigang Yu and Jie Wu}, title = {Deadlock-Free Fully Adaptive Routing in Irregular Networks without Virtual Channels}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {983--990}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.120}, doi = {10.1109/TRUSTCOM.2013.120}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XiangY013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuCZ13, author = {Pingping Xu and Hongyun Chu and Suheng Zhang}, title = {A Novel Device-Device Beam Discovery Scheme with Cross-Layer Design for Millimeter-Wave {WPAN}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1768--1773}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.219}, doi = {10.1109/TRUSTCOM.2013.219}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XuCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YamagiwaZ13, author = {Shinichi Yamagiwa and Shixun Zhang}, title = {Scenario-Based Execution Method for Massively Parallel Accelerators}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1039--1048}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.127}, doi = {10.1109/TRUSTCOM.2013.127}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YamagiwaZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanHYZ13, author = {Rongjie Yan and Kai Huang and Min Yu and Xiaomeng Zhang}, title = {Communication Pipelining for Code Generation from Simulink Models}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1893--1900}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.251}, doi = {10.1109/TRUSTCOM.2013.251}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YanHYZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanJJXX13, author = {Chong Yan and Zhiping Jia and Lei Ju and Hui Xia and Huaqiang Xu}, title = {TimSim: {A} Timestep-Based Wireless Ad-Hoc Network Simulator}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1741--1746}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.216}, doi = {10.1109/TRUSTCOM.2013.216}, timestamp = {Tue, 07 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YanJJXX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanKSZ13, author = {Zheng Yan and Raimo Kantola and Gaowa Shi and Peng Zhang}, title = {Unwanted Content Control via Trust Management in Pervasive Social Networking}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {202--209}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.29}, doi = {10.1109/TRUSTCOM.2013.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YanKSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanZNK13, author = {Zheng Yan and Peng Zhang and Valtteri Niemi and Raimo Kantola}, title = {A Research Model for Trustworthy Pervasive Social Networking}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1522--1527}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.186}, doi = {10.1109/TRUSTCOM.2013.186}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YanZNK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangLZY13, author = {Wenjie Yang and Xingang Liu and Lan Zhang and Laurence T. Yang}, title = {Big Data Real-Time Processing Based on Storm}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1784--1787}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.247}, doi = {10.1109/TRUSTCOM.2013.247}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangLZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangLZZ13, author = {Shouwen Yang and Hui Li and Xiaotao Zhang and Gang Zhao}, title = {Celerity Hardware Implementation of the {AES} with Data Parallel and Pipelining Architecture inside the Round Function}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1690--1695}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.210}, doi = {10.1109/TRUSTCOM.2013.210}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangLZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YeLL13, author = {Wei Ye and Ruixuan Li and Huaqing Li}, title = {Role Mining Using Boolean Matrix Decomposition with Hierarchy}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {805--812}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.98}, doi = {10.1109/TRUSTCOM.2013.98}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YeLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YeZ13, author = {Xinfeng Ye and Jupeng Zheng}, title = {An Adaptive Rating System for Service Computing}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1817--1824}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.226}, doi = {10.1109/TRUSTCOM.2013.226}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YeZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YiWN13, author = {Xun Yi and Jan Willemson and Farid Na{\"{\i}}t{-}Abdesselam}, title = {Privacy-Preserving Wireless Medical Sensor Network}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {118--125}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.19}, doi = {10.1109/TRUSTCOM.2013.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YiWN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YonezawaKKW13, author = {Naoki Yonezawa and Ken'ichi Katou and Issei Kino and Koichi Wada}, title = {Probabilistic Analysis of Parallel Program with Partially Eliminated Barriers}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1840--1847}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.228}, doi = {10.1109/TRUSTCOM.2013.228}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YonezawaKKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuC13, author = {Xiaochuan Yu and Alvin Chan Toong Shoon}, title = {A Hypercubic Overlay Using Bloom-Filter Based Addressing for a Non-dedicated Distributed Tag-Based Pub/Sub System}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1008--1015}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.123}, doi = {10.1109/TRUSTCOM.2013.123}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YuC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuC13a, author = {Xiaochuan Yu and Alvin Chan Toong Shoon}, title = {Hope: {A} Fault-Tolerant Distributed Pub/Sub Architecture for Large-Scale Dynamic Network Environment}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1399--1406}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.169}, doi = {10.1109/TRUSTCOM.2013.169}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YuC13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuCMZH13, author = {Qingfeng Yu and Yijiao Chen and Xilong Mao and Baokang Zhao and Jinfeng Huang}, title = {{SMC:} {A} Shared Memory Based SpaceWire Controller Solution}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1315--1322}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.157}, doi = {10.1109/TRUSTCOM.2013.157}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YuCMZH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuWLY13, author = {Yue Yu and Huaimin Wang and Bo Liu and Gang Yin}, title = {A Trusted Remote Attestation Model Based on Trusted Computing}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1504--1509}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.183}, doi = {10.1109/TRUSTCOM.2013.183}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YuWLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuZ13, author = {Yang Yu and Zhanfei Zhou}, title = {Rational Secret Sharing Information - Theoretically Secure against Adaptive Adversaries}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {249--256}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.34}, doi = {10.1109/TRUSTCOM.2013.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YuZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuanP13, author = {Xiaochen Yuan and Chi{-}Man Pun}, title = {Feature Based Video Watermarking Resistant to Geometric Distortions}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {763--767}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.92}, doi = {10.1109/TRUSTCOM.2013.92}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YuanP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuanXZC13, author = {Luechao Yuan and Zuocheng Xing and Yang Zhang and Xiaobao Chen}, title = {An Optimizing Strategy Research of {LDPC} Decoding Based on {GPGPU}}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1901--1906}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.233}, doi = {10.1109/TRUSTCOM.2013.233}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YuanXZC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangH13, author = {Jinson Zhang and Mao Lin Huang}, title = {Visual Analytics Model for Intrusion Detection in Flood Attack}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {277--284}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.38}, doi = {10.1109/TRUSTCOM.2013.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLFSZ13, author = {Shuai Zhang and Zhiyong Liu and Dongrui Fan and Fenglong Song and Mingzhe Zhang}, title = {Energy-Performance Modeling and Optimization of Parallel Computing in On-Chip Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {879--886}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.107}, doi = {10.1109/TRUSTCOM.2013.107}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLFSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLNYDC13, author = {Xuyun Zhang and Chang Liu and Surya Nepal and Chi Yang and Wanchun Dou and Jinjun Chen}, title = {Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {501--508}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.235}, doi = {10.1109/TRUSTCOM.2013.235}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLNYDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangWS13, author = {Xuemeng Zhang and Hui Wu and Haiyan Sun}, title = {Register Allocation by Incremental Graph Colouring for Clustered {VLIW} Processors}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {927--934}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.113}, doi = {10.1109/TRUSTCOM.2013.113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangWYHFL13, author = {Mingzhe Zhang and Da Wang and Xiaochun Ye and Liqiang He and Dongrui Fan and Zhiyong Liu}, title = {A Path-Adaptive Opto-electronic Hybrid NoC for Chip Multi-processor}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1198--1205}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.144}, doi = {10.1109/TRUSTCOM.2013.144}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangWYHFL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangWZT13, author = {Shuo Zhang and Baosheng Wang and Baokang Zhao and Jing Tao}, title = {An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1471--1477}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.178}, doi = {10.1109/TRUSTCOM.2013.178}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangWZT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangYC13, author = {Gaofeng Zhang and Yun Yang and Jinjun Chen}, title = {A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.64}, doi = {10.1109/TRUSTCOM.2013.64}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangYC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoLJJZ13, author = {Yanheng Zhao and Xin Li and Zhiping Jia and Lei Ju and Ziliang Zong}, title = {Dependency-Based Energy-Efficient Scheduling for Homogeneous Multi-core Clusters}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1299--1306}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.155}, doi = {10.1109/TRUSTCOM.2013.155}, timestamp = {Tue, 07 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoLJJZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoWHWZ13, author = {Dan Zhao and Chunqing Wu and Xiaofeng Hu and Xiaofeng Wang and Baokang Zhao}, title = {Characterization of {OSPF} Convergence with Correlated Failures}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1351--1356}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.162}, doi = {10.1109/TRUSTCOM.2013.162}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoWHWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengCC13, author = {Minghui Zheng and Yongquan Cui and Liang Chen}, title = {Security Analysis of a Paillier-Based Threshold Proxy Signature Scheme}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {683--687}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.83}, doi = {10.1109/TRUSTCOM.2013.83}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengJZXJQ13, author = {Longpeng Zheng and Zhiping Jia and Ruihua Zhang and Hui Xia and Lei Ju and Chuanhao Qu}, title = {Context-Aware Routing Algorithm for WSNs Based on Unequal Clustering}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1307--1314}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.156}, doi = {10.1109/TRUSTCOM.2013.156}, timestamp = {Tue, 07 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengJZXJQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengSL13, author = {Min Zheng and Mingshen Sun and John C. S. Lui}, title = {Droid Analytics: {A} Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {163--171}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.25}, doi = {10.1109/TRUSTCOM.2013.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengWD13, author = {Ming Zheng and Jianping Wu and Hai{-}Xin Duan}, title = {Research on the Anti-attack Design Principles of Low-Latency Anonymous Communication}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {651--658}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.79}, doi = {10.1109/TRUSTCOM.2013.79}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengWD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouAZS13, author = {Junrui Zhou and Hong An and Yanyan Zou and Tao Sun}, title = {Quantitative Analysis of Inter-block Dependence in Speculative Execution}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {991--998}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.121}, doi = {10.1109/TRUSTCOM.2013.121}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouAZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouMSA13, author = {Miao Zhou and Yi Mu and Willy Susilo and Man Ho Au}, title = {Privacy-Enhanced Keyword Search in Clouds}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {447--451}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.56}, doi = {10.1109/TRUSTCOM.2013.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouMSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouVH13, author = {Lan Zhou and Vijay Varadharajan and Michael Hitchens}, title = {Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {560--569}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.69}, doi = {10.1109/TRUSTCOM.2013.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouVH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouW13, author = {Ying Zhou and Chen Wang}, title = {An Online Query Authentication System for Outsourced Databases}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {570--577}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.70}, doi = {10.1109/TRUSTCOM.2013.70}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouWZQYZ13, author = {Qihui Zhou and Dan Wang and Yan Zhang and Bo Qin and Aimin Yu and Baohua Zhao}, title = {ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {156--162}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.24}, doi = {10.1109/TRUSTCOM.2013.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouWZQYZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouXW13, author = {Wei Zhou and Yang Xu and Guojun Wang}, title = {Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {644--650}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.78}, doi = {10.1109/TRUSTCOM.2013.78}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuXXZ13, author = {Tianqing Zhu and Ping Xiong and Yang Xiang and Wanlei Zhou}, title = {An Effective Deferentially Private Data Releasing Algorithm for Decision Tree}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {388--395}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.49}, doi = {10.1109/TRUSTCOM.2013.49}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuXXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZwattendorferS13, author = {Bernd Zwattendorfer and Daniel Slamanig}, title = {Scalable and Privacy-Preserving Variants of the Austrian Electronic Mandate System in the Public Cloud}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {24--33}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.67}, doi = {10.1109/TRUSTCOM.2013.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZwattendorferS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustcom/2013, title = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6679587/proceeding}, isbn = {978-0-7695-5022-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.