default search action
12. SecureComm 2016: Guangzhou, China
- Robert H. Deng, Jian Weng, Kui Ren, Vinod Yegneswaran:
Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 198, Springer 2017, ISBN 978-3-319-59607-5
Mobile Security I
- Zhengyang Qu, Guanyu Guo, Zhengyue Shao, Vaibhav Rastogi, Yan Chen, Hao Chen, Wangjun Hong:
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management. 3-23 - Dong Shen, Zhangkai Zhang, Xuhua Ding, Zhoujun Li, Robert H. Deng:
H-Binder: A Hardened Binder Framework on Android Systems. 24-43 - Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li, Purui Su:
Exploiting Android System Services Through Bypassing Service Helpers. 44-62 - Shaoyong Du, Yue Gao, Jingyu Hua, Sheng Zhong:
Secure Keyboards Against Motion Based Keystroke Inference Attack. 63-81
Network Security
- Jianbing Ni, Kuan Zhang, Xiaodong Lin, Yong Yu, Xuemin (Sherman) Shen:
Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications. 85-103 - Nicolae Paladi, Christian Gehrmann:
TruSDN: Bootstrapping Trust in Cloud Network Infrastructure. 104-124 - Sang-Yoon Chang, Shaoying Cai, Hwajeong Seo, Yih-Chun Hu:
Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications. 125-143 - Wei Shi, Mengfei Peng, Jean-Pierre Corriveau, William Lee Croft:
Faulty Node Repair and Dynamically Spawned Black Hole Search. 144-162
Applied Cryptography
- Hui Cui, Robert H. Deng, Xuhua Ding, Yingjiu Li:
Attribute-Based Encryption with Granular Revocation. 165-181 - Assad Umar, Iakovos Gurulian, Keith Mayes, Konstantinos Markantonakis:
Tokenisation Blacklisting Using Linkable Group Signatures. 182-198 - Tao Zhang, Xiuhua Wang, Sherman S. M. Chow:
Privacy-Preserving Multi-pattern Matching. 199-218 - Russell W. F. Lai, Sherman S. M. Chow:
Parallel and Dynamic Structured Encryption. 219-238
ATCS Workshop - Session 1
- Pinaki Sarkar, Morshed Uddin Chowdhury:
Secure IoT Using Weighted Signed Graphs. 241-256 - Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
A Multi-protocol Security Framework to Support Internet of Things. 257-270 - Mark J. Carman, Kim-Kwang Raymond Choo:
Tinder Me Softly - How Safe Are You Really on Tinder? 271-286 - Mozammel Chowdhury, Junbin Gao, Rafiqul Islam:
Biometric Authentication Using Facial Recognition. 287-295 - Fidel Ikundi, Rafiqul Islam, Peter White:
Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy. 296-304
ATCS Workshop - Session 2
- Jiangyong Shi, Yuexiang Yang:
Architecture Support for Controllable VMI on Untrusted Cloud. 307-316 - Tianjun Wu, Yuexiang Yang:
IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data Leakage. 317-333 - Simi Kamini Bajaj:
A Multi-layer Model to Detect Spam Email at Client Side. 334-349
Cloud Security
- Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati:
Access Control Management for Secure Cloud Storage. 353-372 - Mohammad Karami, Songqing Chen:
Attribution of Economic Denial of Sustainability Attacks in Public Clouds. 373-391 - Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan:
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. 392-411 - Lorena González-Manzano, José María de Fuentes, Kim-Kwang Raymond Choo:
ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments. 412-428
Web Security and Privacy
- Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto:
Website Forensic Investigation to Identify Evidence and Impact of Compromise. 431-453 - Qian Wang, Xiao Lu, Yan Zhang, Zhibo Wang, Zhan Qin, Kui Ren:
SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy. 454-474 - Nicolas Van Balen, Christopher T. Ball, Haining Wang:
A Behavioral Biometrics Based Approach to Online Gender Classification. 475-495 - Zheng Xiao, Cheng Wang, Weili Han, Changjun Jiang:
Unique on the Road: Re-identification of Vehicular Location-Based Metadata. 496-513
System Security
- Nathaniel Lageman, Eric D. Kilmer, Robert J. Walls, Patrick D. McDaniel:
BinDNN: Resilient Function Matching Using Deep Learning. 517-537 - Yanhong He, Xianyi Zheng, Ziyuan Zhu, Gang Shi:
TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated Environment. 538-556 - Yao Liu, Ming Xu, Jian Xu, Ning Zheng, Xiaodong Lin:
SQLite Forensic Analysis Based on WAL. 557-574 - Jianming Fu, Yan Lin, Xu Zhang:
Impact of Environment on Branch Transfer of Software. 575-593
Mobile Security II
- Zhiqiang Li, Lichao Sun, Qiben Yan, Witawas Srisa-an, Zhenxiang Chen:
DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware. 597-616 - Chengyu Zheng, Nicola Dellarocca, Niccolò Andronio, Stefano Zanero, Federico Maggi:
GreatEatlon: Fast, Static Detection of Mobile Ransomware. 617-636 - Yongfeng Li, Jinbin Ouyang, Shanqing Guo, Bing Mao:
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling. 637-654 - Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu:
Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem. 655-672
Hardware Security
- Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Lingchen Zhang:
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. 675-693 - Jing Yang, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
Extracting More Entropy for TRNGs Based on Coherent Sampling. 694-709 - Hailiang Fu, Guoqiang Bai, Xingjun Wu:
A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite Field. 710-721 - Muqing Liu, Yuanyuan Zhang, Juanru Li, Junliang Shu, Dawu Gu:
Security Analysis of Vendor Customized Code in Firmware of Embedded Device. 722-739
Poster Session
- Peng Chen, Hao Chen:
POSTER: Security Analysis of Personal Unmanned Aerial Vehicles. 743-746 - TungNgai Miu, Chenxu Wang, Daniel Xiapu Luo, Jinhe Wang:
Modeling User Browsing Activity for Application Layer DDoS Attack Detection. 747-750 - Nian Xue, Lulu Liang, Jie Zhang, Xin Huang:
POSTER: A Framework for IoT Reprogramming. 751-754 - Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey:
Privacy Preserving Data Classification Using Inner Product Encryption. 755-757 - Peizhao Hu, Siyu Zhu:
POSTER: Location Privacy Using Homomorphic Encryption. 758-761 - Kailei Ren, Qiang Wei, Zehui Wu, Qingxian Wang:
SDNGuardian: Secure Your REST NBIs with API-Grained Permission Checking System. 762-765 - Juan Ai, Zhu Wang, Xinping Zhou, Changhai Ou:
POSTER: A Novel Wavelet Denoising Method Based on Robust Principal Component Analysis in Side Channel Attacks. 766-769 - Ivan Homoliak, Martin Teknos, Maros Barabas, Petr Hanácek:
Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. 770-773 - Fei Peng, Le Qin, Min Long:
POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis. 774-777
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.