default search action
10. SpaCCS 2017: Guangzhou, China
- Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings. Lecture Notes in Computer Science 10656, Springer 2017, ISBN 978-3-319-72388-4 - Zhenlan Liu, Jian-Bin Li, Qiang Song:
Optimized Analysis Based on Improved Mutation and Crossover Operator for Differential Evolution Algorithm. 1-16 - Jialin Wang, Hanni Cheng, Minhui Xue, Xiaojun Hei:
Revisiting Localization Attacks in Mobile App People-Nearby Services. 17-30 - Yu Cao, Jianwu Liang, Ying Guo:
Lengthening Unidimensional Continuous-Variable Quantum Key Distribution with Noiseless Linear Amplifier. 31-41 - Qifan Wang, Guihua Duan, Entao Luo, Guojun Wang:
Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext. 42-55 - Xuefei Cao, Lanjun Dang, Kai Fan, Yulong Fu:
An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement. 56-69 - Daxin Zhu, Xiaodong Wang:
A Space Efficient Algorithm for LCIS Problem. 70-77 - Xiaodong Wang, Daxin Zhu:
Improving the Efficiency of Dynamic Programming in Big Data Computing. 78-86 - Yanmei Li, Fang Qi, Zhe Tang:
Traceable and Complete Fine-Grained Revocable Multi-authority Attribute-Based Encryption Scheme in Social Network. 87-92 - Efthimios Alepis, Constantinos Patsakis:
The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android. 93-107 - Yuanlong Li, Fang Qi, Zhe Tang:
An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow. 108-120 - Xianfei Huang, Nao Wang, Gaocai Wang:
An Improved Pre-copy Transmission Algorithm in Mobile Cloud Computing. 121-130 - Sameer Ali, Saw Chin Tan, Ching Kwang Lee, Zulfadzli Yusoff, Muhammad Reazul Haque, Ir. Rizaludin Kaspin, Salvatore Renato Ziri:
Motivation of DDOS Attack-Aware Link Assignment between Switches to SDN Controllers. 131-138 - Guangwu Xu, Yankun Tang, Zheng Yan, Peng Zhang:
TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing. 139-152 - Mengzhen Xu, Hongyun Xu, Cheng Xu:
Personalized Semantic Location Privacy Preservation Algorithm Based on Query Processing Cost Optimization. 153-168 - Haroon Elahi, Guojun Wang, Xu Li:
Smartphone Bloatware: An Overlooked Privacy Problem. 169-185 - Zhibin Zhou, Pin Liu, Qin Liu, Guojun Wang:
An ECC-Based Off-line Anonymous Grouping-Proof Protocol. 186-200 - Bo Leng, Jianbin Li, Yang Xu, Liang She, Wuqiang Gao, Quanrun Zeng:
PCSD: A Tool for Android Malware Detection. 201-211 - Athira Usha, Sabu M. Thampi:
Authorship Analysis of Social Media Contents Using Tone and Personality Features. 212-228 - Changji Wang, Shengyi Jiang, Yuan Yuan:
Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks. 229-240 - Zhaoyu Shou, Akang Liu, Simin Li, Xiawei Cheng:
Spatial Outlier Information Hiding Algorithm Based on Complex Transformation. 241-255 - Yuan Liu, Jin Bai, Guibing Guo, Xingwei Wang, Zhenhua Tan:
A Reputation Model Considering Repurchase Behavior and Mechanism Design to Promote Repurchase. 256-268 - Liubo Ouyang, Yuan Tian, Hui Tang, Boyun Zhang:
Chinese Named Entity Recognition Based on B-LSTM Neural Network with Additional Features. 269-279 - Lianyong Qi, Wanchun Dou, Xuyun Zhang, Shui Yu:
Amplified Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation. 280-297 - Weiwei Gong, Gen Zhang, Xu Zhou:
Learn to Accelerate Identifying New Test Cases in Fuzzing. 298-307 - Mingdong Tang, Sumeng Zeng, Jianxun Liu, Buqing Cao:
Service Selection Based on User Privacy Risk Evaluation. 308-320 - Faguo Wu, Wang Yao, Xiao Zhang, Zhiming Zheng:
An Efficient Lattice-Based Proxy Signature with Message Recovery. 321-331 - Yang Xu, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, Yaoxue Zhang:
FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism. 332-343 - Hongjian Yin, Leyou Zhang:
Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption. 344-352 - Songjie Wei, Qianqian Wu, Milin Ren:
Relacha: Using Associative Meaning for Image Captcha Understandability. 353-367 - Fei Peng, Xiao-hua Hu, Min Long:
Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces. 368-380 - Lu Ren, Rui Chang, Qing Yin, Yujia Man:
A Formal Android Permission Model Based on the B Method. 381-394 - Jian Shen, Tiantian Miao, Qi Liu, Sai Ji, Chen Wang, Dengzhi Liu:
S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks. 395-408 - Jijun Zeng, Zhenyue Long, Guiquan Shen, Lihao Wei, Yunkui Song:
MCloud: Efficient Monitoring Framework for Cloud Computing Platforms. 409-419 - Jiantao Li, Hua Deng, Wenjun Jiang:
Secure Vibration Control of Flexible Arms Based on Operators' Behaviors. 420-431 - Chong Fu, Gao-yuan Zhang, Bei-li Gao, Jing Sun, Xue Wang:
A New Color Image Encryption Scheme Based on Chaotic Hénon Map and Lü System. 432-445 - Shuai Li, Meilin Liu, Songjie Wei:
A Distributed Authentication Protocol Using Identity-Based Encryption and Blockchain for LEO Network. 446-460 - Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation. 461-473 - Xueqi Ren, Xinming Wang, Hua Tang, Zhaohui Ma, Jiechao Wu, Gansen Zhao:
A Unified Model for Detecting Privacy Leakage on Android. 474-486 - Ping Li, Heng Ye, Jin Li:
Multi-party Security Computation with Differential Privacy over Outsourced Data. 487-500 - Ha Xuan Son, Tran Khanh Dang, Fabio Massacci:
REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies. 501-515 - Huaizhe Zhou, Haihe Ba, Jiangchun Ren, Yongjun Wang, Zhiying Wang, Yunshi Li:
Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection. 516-529 - Mina Sheikhalishahi, Fabio Martinelli:
Privacy Preserving Hierarchical Clustering over Multi-party Data Distribution. 530-544 - Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino:
Improving MQTT by Inclusion of Usage Control. 545-560 - Que Nguyet Tran Thi, Tran Khanh Dang, Huy Luong Van, Ha Xuan Son:
Using JSON to Specify Privacy Preserving-Enabled Attribute-Based Access Control Policies. 561-570 - Tranos Zuva, Raoul Kwuimi:
Comprehensive Diversity in Recommender Systems. 571-583 - Li Weigang, Alessandro Ferreira Leite, Vitor Filincowsky Ribeiro, Jose Alexandre T. G. Fregnani, Ítalo Romani de Oliveira:
Towards Intelligent System Wide Information Management for Air Traffic Management. 584-593 - Mouna Jouini, Latifa Ben Arfa Rabai:
A Security Risk Management Model for Cloud Computing Systems: Infrastructure as a Service. 594-608
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.