


default search action
14th SecureComm 2018: Singapore
- Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:

Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 254, Springer 2018, ISBN 978-3-030-01700-2
IoT Security
- Yaxing Chen

, Wenhai Sun
, Ning Zhang, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou
:
A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT. 3-21 - Devkishen Sisodia, Samuel Mergendahl, Jun Li, Hasan Cam:

Securing the Smart Home via a Two-Mode Security Framework. 22-42 - Suhas Setikere, Vinay Sachidananda, Yuval Elovici:

Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things. 43-52 - Sophie Dramé-Maigné, Maryline Laurent

, Laurent Castillo, Hervé Ganem:
Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain. 53-68
User and Data Privacy
- Katchaguy Areekijseree, Yuzhe Richard Tang, Ju Chen, Shuang Wang, Arun Iyengar, Balaji Palanisamy:

Secure and Efficient Multi-Party Directory Publication for Privacy-Preserving Data Sharing. 71-94 - Abhishek Tiwari

, Fabian Bendun, Christian Hammer
:
A Formal Logic Framework for the Automation of the Right to Be Forgotten. 95-111 - Yangguang Tian, Yingjiu Li, Rongmao Chen, Nan Li

, Ximeng Liu, Bing Chang, Xingjie Yu:
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience. 112-132 - Fengqiong Wei, Wei Zhang, Yunfang Chen, Jingwen Zhao:

Differentially Private High-Dimensional Data Publication via Markov Network. 133-148
Mobile Security
- Ziqi Yang, Zhenkai Liang:

Automated Identification of Sensitive Data via Flexible User Requirements. 151-171 - Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang:

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. 172-192 - Martin Byrenheid, Stefan Köpsell

, Alexander Naumenko, Thorsten Strufe:
Transparent Low-Latency Network Anonymisation for Mobile Devices. 193-209 - Yao Guo

, Junming Ma, Wenjun Wu, Xiangqun Chen:
Inferring UI States of Mobile Applications Through Power Side Channel Exploitation. 210-226 - Ang Li, Wei Du, Qinghua Li:

PoliteCamera: Respecting Strangers' Privacy in Mobile Photographing. 227-247 - Shanshan Wang, Qiben Yan

, Zhenxiang Chen, Lin Wang, Riccardo Spolaor, Bo Yang, Mauro Conti:
Lexical Mining of Malicious URLs for Classifying Android Malware. 248-263 - Zhiqiang Li, Jun Sun, Qiben Yan

, Witawas Srisa-an
, Shakthi Bachala:
GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android Applications. 264-280 - Chao Liu, Jianan Li, Min Yu, Bo Luo

, Song Li, Kai Chen, Weiqing Huang, Bin Lv:
FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection. 281-293
Wireless Security
- Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng, Roger Zimmermann:

An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio Networks. 297-317 - Rens W. van der Heijden

, Thomas Lukaseder, Frank Kargl:
VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs. 318-337 - Chitra Javali, Girish Revadigar:

Birds of a Feather Flock Together: Fuzzy Extractor and Gait-Based Robust Group Secret Key Generation for Smart Wearables. 338-357 - Arne Bochem

, Benjamin Leiding
, Dieter Hogrefe:
Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks. 358-374
Software Security
- Afsah Anwar, Aminollah Khormali, DaeHun Nyang, Aziz Mohaisen:

Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. 377-395 - Daniel Arp, Erwin Quiring

, Tammo Krueger, Stanimir Dragiev, Konrad Rieck:
Privacy-Enhanced Fraud Detection with Bloom Filters. 396-415 - Sungjin Kim, Brent ByungHoon Kang:

FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity Matching. 416-432 - Tommy Chin, Kaiqi Xiong, Chengbin Hu, Yi Li:

A Machine Learning Framework for Studying Domain Generation Algorithm (DGA)-Based Malware. 433-448
Cloud Security
- Weizhong Qiang, Zezhao Dong, Hai Jin:

Se-Lambda: Securing Privacy-Sensitive Serverless Applications Using SGX Enclave. 451-470 - Kennedy A. Torkura, Muhammad I. H. Sukmana

, Feng Cheng, Christoph Meinel:
CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era. 471-490 - Li Liu, An Wang, Wanyu Zang, Meng Yu, Menbai Xiao, Songqing Chen:

Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling. 491-511 - Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan

, Jingqiang Lin, Huorong Li, Bingyu Li:
Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs. 512-528 - Shiran Pan, Wen-Tao Zhu, Qiongxiao Wang, Bing Chang:

Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations. 529-548 - Wei Du, Ang Li, Qinghua Li:

Privacy-Preserving Multiparty Learning for Logistic Regression. 549-568 - Ang Li, Wei Du, Qinghua Li:

Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud. 569-587 - Qi Zhang, Shaojing Fu, Nan Jia, Ming Xu:

A Verifiable and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data with Accuracy Improvement. 588-604

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














