Default Cover Image

2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

July 16 2013 to July 18 2013

Melbourne, Australia

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xxiii
TrustCom 2013: Message from the General ChairsFreely available from IEEE.pp. xxiv-xxiv
TrustCom 2013: Message from the Program ChairsFreely available from IEEE.pp. xxv-xxv
TrustCom 2013: Message from the Steering ChairsFreely available from IEEE.pp. xxvi-xxvi
TrustCom 2013: Message from the Workshop/Symposium ChairsFreely available from IEEE.pp. xxvii-xxvii
TrustCom 2013: Organizing and Program CommitteesFreely available from IEEE.pp. xxviii-xxxii
ISPA 2013: Message from the General ChairsFreely available from IEEE.pp. xxxiii-xxxiii
ISPA 2013: Message from the Program ChairsFreely available from IEEE.pp. xxxiv-xxxiv
ISPA 2013: Organizing and Program CommitteesFreely available from IEEE.pp. xxxv-xxxviii
IUCC 2013: Message from the General ChairsFreely available from IEEE.pp. xxxix-xxxix
IUCC 2013: Message from the Program ChairsFreely available from IEEE.pp. xl-xl
IUCC 2013: Organizing and Program CommitteesFreely available from IEEE.pp. xli-xliii
TrustID 2013: Message from the Symposium ChairsFreely available from IEEE.pp. xliv-xliv
TrustID 2013: Organizing and Program CommitteesFreely available from IEEE.pp. xlv-xlv
TSCloud 2013: Message from the ChairsFreely available from IEEE.pp. xlvi-xlvi
TSCloud 2013: Organizing and Program CommitteesFreely available from IEEE.pp. xlvii-xlviii
WNM 2013: Message from the Workshop ChairsFreely available from IEEE.pp. xlvix-xlvix
WNM 2013: Organizing and Program CommitteesFreely available from IEEE.pp. l-l
A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Fuzzy Modeling Approach for Risk-Based Access Control in eHealth CloudFull-text access may be available. Sign in or learn about subscription options.pp. 17-23
Scalable and Privacy-Preserving Variants of the Austrian Electronic Mandate System in the Public CloudFull-text access may be available. Sign in or learn about subscription options.pp. 24-33
KP-ABE Based Verifiable Cloud Access Control SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 34-41
Light-Weight Trust-Based On-Demand Multipath Routing Protocol for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 42-49
Garbled Routing (GR): Towards Unification of Anonymous NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 50-57
Secure Routing Based on Network Coding in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 58-64
TIGER: A Trust-based Intelligent Geographical Energy-aware Routing for Smart Grid Communication NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 65-72
AFC: An Effective Metric for Reliable Routing in Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 73-80
Performance Evaluation of Trust-Based Collaborative Sanctioning in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 81-88
Novel Physically-Embedded Data Encryption for Embedded DeviceFull-text access may be available. Sign in or learn about subscription options.pp. 89-93
Server Assisted Key Establishment for WSN: A MIKEY-Ticket ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 94-101
A Fully-Secure RFID Authentication Protocol from Exact LPN AssumptionFull-text access may be available. Sign in or learn about subscription options.pp. 102-109
Determining Similar Recommenders Using Improved Collaborative Filtering in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 110-117
Privacy-Preserving Wireless Medical Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 118-125
Protocol Formats Reverse Engineering Based on Association Rules in Wireless EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 134-141
Power Based Malicious Code Detection Techniques for SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 142-149
A Privacy-Preserved Joint Group Time Scheduling Mechanism for Mobile Social ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 150-155
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call ChainFull-text access may be available. Sign in or learn about subscription options.pp. 156-162
Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 163-171
Securing Domain Name System Combined with MIPv6 for Mobile HostsFull-text access may be available. Sign in or learn about subscription options.pp. 172-179
Securing Mobile Mashups with SCCMFull-text access may be available. Sign in or learn about subscription options.pp. 180-187
Secure Data Aggregation with MAC Authentication in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 188-195
Modeling Malware Propagation in Smartphone Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 196-201
Unwanted Content Control via Trust Management in Pervasive Social NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 202-209
Trust Inference Computation for Online Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 210-217
Fine-Grained Trust Assertions for Privacy Management in the Social Semantic WebFull-text access may be available. Sign in or learn about subscription options.pp. 218-225
Preserving Utility in Social Network Graph AnonymizationFull-text access may be available. Sign in or learn about subscription options.pp. 226-232
DDoS Attack Detection at Local Area Networks Using Information Theoretical MetricsFull-text access may be available. Sign in or learn about subscription options.pp. 233-240
Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 241-248
Rational Secret Sharing Information -- Theoretically Secure against Adaptive AdversariesFull-text access may be available. Sign in or learn about subscription options.pp. 249-256
What is the Pattern of a Botnet?Full-text access may be available. Sign in or learn about subscription options.pp. 257-264
Analyzing Malware by Abstracting the Frequent Itemsets in API Call SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 265-270
Visual Analytics Model for Intrusion Detection in Flood AttackFull-text access may be available. Sign in or learn about subscription options.pp. 277-284
A Regional Statistics Detection Scheme against Sybil Attacks in WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 285-291
A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 292-301
Security Aspects of Military Sensor-Based Defence SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 302-309
A Secure and Efficient Fault-Tolerant Group Key Agreement ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 310-314
MDS-Based Trust Estimation of Event Reporting Node in VANETFull-text access may be available. Sign in or learn about subscription options.pp. 315-320
sEncrypt: An Encryption Algorithm Inspired from Biological ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 321-327
A Scalable Architecture for Highly Reliable CertificationFull-text access may be available. Sign in or learn about subscription options.pp. 328-335
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership ModelFull-text access may be available. Sign in or learn about subscription options.pp. 336-345
A Model for Context-Aware Location Identity Preservation Using Differential PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 346-353
P3MCF: Practical Privacy-Preserving Multi-domain Collaborative FilteringFull-text access may be available. Sign in or learn about subscription options.pp. 354-361
On the Use of LSH for Privacy Preserving PersonalizationFull-text access may be available. Sign in or learn about subscription options.pp. 362-371
Improving the Utility of Differentially Private Data Releases via k-AnonymityFull-text access may be available. Sign in or learn about subscription options.pp. 372-379
Scheme of User Privacy Protection Applied to Online MarketingFull-text access may be available. Sign in or learn about subscription options.pp. 380-387
An Effective Deferentially Private Data Releasing Algorithm for Decision TreeFull-text access may be available. Sign in or learn about subscription options.pp. 388-395
An Application Security Framework for Near Field CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 396-403
Scalable Attack Representation Model Using Logic Reduction TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 404-411
Formalizing and Modeling Fairness for Benefit Distribution in CollaborationsFull-text access may be available. Sign in or learn about subscription options.pp. 412-420
Attribute-Based Mining Process for the Organization-Based Access Control ModelFull-text access may be available. Sign in or learn about subscription options.pp. 421-430
Private Multiparty Set Intersection Protocol in Rational ModelFull-text access may be available. Sign in or learn about subscription options.pp. 431-438
Privacy-Enhanced Keyword Search in CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 447-451
iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword SearchFull-text access may be available. Sign in or learn about subscription options.pp. 452-458
Reputation Attacks Detection for Effective Trust Assessment among Cloud ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 469-476
Access Control Management for CloudFull-text access may be available. Sign in or learn about subscription options.pp. 485-492
Cloud Computing: Insider Attacks on Virtual Machines during MigrationFull-text access may be available. Sign in or learn about subscription options.pp. 493-500
On the Application of Supervised Machine Learning to Trustworthiness AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 525-534
Efficient Fair UC-Secure Two-Party Computation on Committed InputsFull-text access may be available. Sign in or learn about subscription options.pp. 544-551
Trust Enhanced Security Architecture for Detecting Insider ThreatsFull-text access may be available. Sign in or learn about subscription options.pp. 552-559
Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data StorageFull-text access may be available. Sign in or learn about subscription options.pp. 560-569
An Online Query Authentication System for Outsourced DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 570-577
Word N-Gram Based Classification for Data Leakage PreventionFull-text access may be available. Sign in or learn about subscription options.pp. 578-585
Privacy Protected Data Forwarding in Human Associated Delay Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 586-593
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data ProvenanceFull-text access may be available. Sign in or learn about subscription options.pp. 594-602
A Direct Insight into Victims of CybercrimeFull-text access may be available. Sign in or learn about subscription options.pp. 603-610
Card-Present Transactions on the Internet Using the Smart Card Web ServerFull-text access may be available. Sign in or learn about subscription options.pp. 611-619
Secure Single Sign-On Schemes Constructed from Nominative SignaturesFull-text access may be available. Sign in or learn about subscription options.pp. 620-627
Showing 100 out of 279