Default Cover Image

2017 IEEE Trustcom/BigDataSE/ICESS

Aug. 1 2017 to Aug. 4 2017

Sydney, Australia

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xv
Message from the IEEE TrustCom 2017 Program ChairsFreely available from IEEE.pp. xvii-xvii
Organizers for IEEE TrustCom 2017Freely available from IEEE.pp. xviii-xix
Reviewers for IEEE TrustCom 2017Freely available from IEEE.pp. xx-xxiii
Message from the IEEE ICESS 2017 Program ChairsFreely available from IEEE.pp. xxiv-xxiv
Organizers for IEEE ICESS 2017Freely available from IEEE.pp. xxv-xxv
Reviewers for IEEE ICESS 2017Freely available from IEEE.pp. xxvi-xxvi
Message from the IEEE BigDataSE 2017 Program ChairsFreely available from IEEE.pp. xxvii-xxvii
Organizers for IEEE BigDataSE 2017Freely available from IEEE.pp. xxviii-xxviii
Reviewers for IEEE BigDataSE 2017Freely available from IEEE.pp. xxix-xxx
Message from the SECSOC 2017 Workshop ChairsFreely available from IEEE.pp. xxxi-xxxi
Organizers for SECSOC 2017Freely available from IEEE.pp. xxxii-xxxii
List of Reviewers for SECSOC 2017Freely available from IEEE.pp. xxxiii-xxxiii
Message from the SOWN 2017 Workshop ChairsFreely available from IEEE.pp. xxxiv-xxxiv
Organizers for SOWN 2017Freely available from IEEE.pp. xxxv-xxxv
Reviewers for SOWN 2017Freely available from IEEE.pp. xxxvi-xxxvi
Message from the TrustWSN 2017 Workshop ChairsFreely available from IEEE.pp. xxxvii-xxxvii
Organizers for TrustWSN 2017Freely available from IEEE.pp. xxxviii-xxxviii
Reviewers for TrustWSN 2017Freely available from IEEE.pp. xxxix-xxxix
Message from the SPTIoT 2017 Workshop ChairsFreely available from IEEE.pp. xl-xl
Organizers for SPTIoT 2017Freely available from IEEE.pp. xli-xli
Reviewers for IEEE SPTIoT 2017Freely available from IEEE.pp. xlii-xlii
Message from the WCSF 2017 Workshop ChairsFreely available from IEEE.pp. xliii-xliii
Organizers for WCSF 2017Freely available from IEEE.pp. xliv-xliv
Reviewers for WCSF 2017Freely available from IEEE.pp. xlv-xlvi
Evolution of Publicly Disclosed Information in Facebook ProfilesFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Practical Application-Level Dynamic Taint Analysis of Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 17-24
Authenticating Compromisable Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 25-32
Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access ControlFull-text access may be available. Sign in or learn about subscription options.pp. 33-40
WENC: HTTPS Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov ChainFull-text access may be available. Sign in or learn about subscription options.pp. 50-57
Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 58-64
A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic BehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 65-72
Detection of Single Event Transients Based on Compressed SensingFull-text access may be available. Sign in or learn about subscription options.pp. 83-88
Securing the Neighbour Discovery Protocol in IPv6 State-ful Address Auto-ConfigurationFull-text access may be available. Sign in or learn about subscription options.pp. 96-103
A Public Key Encryption Scheme for String IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 104-111
Insider Threat Detection Through Attributed Graph ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 112-119
Malware Discrimination Based on Reversed Association TaskFull-text access may be available. Sign in or learn about subscription options.pp. 120-127
Fine-Grained Fingerprinting Threats to Software-Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 128-135
SimiDroid: Identifying and Explaining Similarities in Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 136-143
A Self-healing Key Pre-distribution Scheme for Multi-phase Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 144-151
TransCrypt: Transparent Main Memory Encryption Using a Minimal ARM HypervisorFull-text access may be available. Sign in or learn about subscription options.pp. 152-161
On Designing Collusion-Resistant Incentive Mechanisms for Mobile Crowdsensing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 162-169
A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECCFull-text access may be available. Sign in or learn about subscription options.pp. 170-176
CSCdroid: Accurately Detect Android Malware via Contribution-Level-Based System Call CategorizationFull-text access may be available. Sign in or learn about subscription options.pp. 193-200
Secure and Light Weight Fine-grained Access Mechanism for Outsourced DataFull-text access may be available. Sign in or learn about subscription options.pp. 201-209
Viability of Using Shadows Cast by Vehicles for Position Verification in Vehicle PlatooningFull-text access may be available. Sign in or learn about subscription options.pp. 210-217
FEPDF: A Robust Feature Extractor for Malicious PDF DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 218-224
Discovering Malicious Domains through Alias-Canonical GraphFull-text access may be available. Sign in or learn about subscription options.pp. 225-232
A Passive Client-based Approach to Detect Evil Twin AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 233-239
T2Droid: A TrustZone-Based Dynamic Analyser for Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 240-247
Hidden-Token Searchable Public-Key EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 248-254
A High-Speed and SPA-Resistant Implementation of ECC Point Multiplication Over GF(p)Full-text access may be available. Sign in or learn about subscription options.pp. 255-260
Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 269-276
Evaluating the Effectiveness of Security Metrics for Dynamic NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 277-284
SneakLeak: Detecting Multipartite Leakage Paths in Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 285-292
Grouping-Proofs Based Access Control Using KP-ABE for IoT ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 301-308
Mediator-Based Immediate Attribute Revocation Mechanism for CP-ABE in Multicast Group CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 309-314
One-Round Provably Secure Yoking-Proof for RFID ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 315-322
Network Traffic Classification Using Tri-training Based on Statistical Flow CharacteristicsFull-text access may be available. Sign in or learn about subscription options.pp. 323-330
SniffDroid: Detection of Inter-App Privacy Leaks in AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 331-338
Detecting DNS Tunnel through Binary-Classification Based on Behavior FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 339-346
A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in CloudFull-text access may be available. Sign in or learn about subscription options.pp. 347-354
Improving Leakage Path Coverage in Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 355-362
A Traceable Outsourcing CP-ABE Scheme with Attribute RevocationFull-text access may be available. Sign in or learn about subscription options.pp. 363-370
Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 371-378
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 386-393
A Relative Privacy Model for Effective Privacy Preservation in Transactional DataFull-text access may be available. Sign in or learn about subscription options.pp. 394-401
A Dual Privacy Preserving Scheme in Continuous Location-Based ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 402-408
A Near-Optimal Source Location Privacy Scheme for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 409-416
Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss TransformFull-text access may be available. Sign in or learn about subscription options.pp. 417-424
An Efficient Disjunctive Query Enabled Ranked Searchable Encryption SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 425-432
An Efficient and Secure Itinerary-Based Data Aggregation Algorithm for WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 433-440
Dummy Location Selection Scheme for K-Anonymity in Location Based ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 441-448
Secure FPGA as a Service — Towards Secure Data Processing by Physicalizing the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 449-455
Privacy-Preserving Mechanisms for Parametric Survival Analysis with Weibull DistributionFull-text access may be available. Sign in or learn about subscription options.pp. 456-463
Privacy-Preserving Aggregation of Smart Metering via Transformation and EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 472-479
Privacy-Preserving and Collusion-aware k-NN Query Processing in Two-tiered Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 480-486
NodeLeaper: Lower Overhead Oblivious AVL TreeFull-text access may be available. Sign in or learn about subscription options.pp. 487-493
Assessing the Privacy Cost in Centralized Event-Based Demand Response for MicrogridsFull-text access may be available. Sign in or learn about subscription options.pp. 494-501
A Trajectory Privacy-Preserving Algorithm Based on Road Networks in Continuous Location-Based ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 510-516
Deformable Template Matching Using Proposal-Based Best-Buddies SimilarityFull-text access may be available. Sign in or learn about subscription options.pp. 517-521
Anonymous CoinJoin Transactions with Arbitrary ValuesFull-text access may be available. Sign in or learn about subscription options.pp. 522-529
SOMR: Towards a Security-Oriented MapReduce InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 530-537
Beyond the Hype: On Using Blockchains in Trust Management for AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 546-553
Showing 100 out of 184