Default Cover Image

2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

Sept. 24 2014 to Sept. 26 2014

Beijing, China

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xvi
Message from the TrustCom 2014 General ChairsFreely available from IEEE.pp. xvii-xvii
Message from the TrustCom 2014 Program ChairsFreely available from IEEE.pp. xviii-xviii
Message from the TrustCom 2014 Steering ChairsFreely available from IEEE.pp. xix-xix
Message from the BDSE 2014 ChairsFreely available from IEEE.pp. xxi-xxi
Message from the EFINS 2014 Workshop ChairsFreely available from IEEE.pp. xxii-xxii
Message from the SpaIoT 2014 Symposium ChairsFreely available from IEEE.pp. xxiii-xxiii
Message from the NOPE 2014 Workshop ChairsFreely available from IEEE.pp. xxiv-xxiv
Message from the UbiSafe 2014 Symposium ChairsFreely available from IEEE.pp. xxv-xxv
Message from the TSCloud 2014 Symposium ChairsFreely available from IEEE.pp. xxvi-xxvi
Message from the SPMBB 2014 Workshop ChairsFreely available from IEEE.pp. xxvii-xxvii
TrustCom 2014 Organizing and Program CommitteesFreely available from IEEE.pp. xxviii-xxxi
BDSE 2014 Organizing and Program CommitteesFreely available from IEEE.pp. xxxii-xxxiii
EFINS 2014 Organizing and Program CommitteesFreely available from IEEE.pp. xxxiv-xxxvi
SpaIoT 2014 Organizing and Program CommitteesFreely available from IEEE.pp. xxxvii-xxxviii
NOPE 2014 Organizing and Program CommitteesFreely available from IEEE.pp. xxxix-xxxix
UbiSafe 2014 Organizing and Program CommitteesFreely available from IEEE.pp. xl-xli
TSCloud 2014 Organizing and Program CommitteesFreely available from IEEE.pp. xlii-xlii
SPMBB 2014 Organizing and Program CommitteesFreely available from IEEE.pp. xliii-xliii
A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 9-17
Automated User Profiling in Location-Based Mobile Messaging ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 18-26
PrivateDroid: Private Browsing Mode for AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 27-36
TTPCookie: Flexible Third-Party Cookie Management for Increasing Online PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social BenefitFull-text access may be available. Sign in or learn about subscription options.pp. 45-52
Garbling in Reverse OrderFull-text access may be available. Sign in or learn about subscription options.pp. 53-60
Private Outsourcing of Polynomial FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 61-68
A Machine Learning Based Trust Evaluation Framework for Online Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 69-74
Multi-dimensions of Developer Trustworthiness Assessment in OSS CommunityFull-text access may be available. Sign in or learn about subscription options.pp. 75-81
An On-Line Anomaly Detection Method Based on a New Stationary Metric - Entropy-RatioFull-text access may be available. Sign in or learn about subscription options.pp. 90-97
Reaching Agreement in Security Policy NegotiationFull-text access may be available. Sign in or learn about subscription options.pp. 98-105
Remembrance of Local Information Status for Enforcing Robustness of Policy-Exchanged Strategies for Trust NegotiationFull-text access may be available. Sign in or learn about subscription options.pp. 106-113
Secure and Privacy-Friendly Public Key Generation and CertificationFull-text access may be available. Sign in or learn about subscription options.pp. 114-121
A Stateful Mechanism for the Tree-Rule FirewallFull-text access may be available. Sign in or learn about subscription options.pp. 122-129
CAFS: A Framework for Context-Aware Federated ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 130-139
Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 140-147
High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary FieldsFull-text access may be available. Sign in or learn about subscription options.pp. 148-155
A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 156-163
SIMS: A Comprehensive Approach for a Secure Instant Messaging SifterFull-text access may be available. Sign in or learn about subscription options.pp. 164-173
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised LearningFull-text access may be available. Sign in or learn about subscription options.pp. 174-181
Ultra High-Speed SM2 ASIC ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 182-188
Visual Similarity Based Anti-phishing with the Combination of Local and Global FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 189-196
A Practically Optimized Implementation of Attribute Based CryptosystemsFull-text access may be available. Sign in or learn about subscription options.pp. 197-204
Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 212-220
ToAuth: Towards Automatic Near Field Authentication for SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 229-236
One Kind of Cross-Domain DAA Scheme from Bilinear MappingFull-text access may be available. Sign in or learn about subscription options.pp. 237-243
Long Term Tracking and Characterization of P2P BotnetFull-text access may be available. Sign in or learn about subscription options.pp. 244-251
A Survey of Security Network Coding toward Various AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 252-259
Defensor: Lightweight and Efficient Security-Enhanced Framework for AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 260-267
Public-Key Encryption Resilient against Linear Related-Key Attacks RevisitedFull-text access may be available. Sign in or learn about subscription options.pp. 268-275
The Micro-architectural Support Countermeasures against the Branch Prediction Analysis AttackFull-text access may be available. Sign in or learn about subscription options.pp. 276-283
AHP-Based Quantitative Approach for Assessing and Comparing Cloud SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 284-291
Efficiently Attribute-Based Access Control for Mobile Cloud Storage SystemFull-text access may be available. Sign in or learn about subscription options.pp. 292-299
EqualVisor: Providing Memory Protection in an Untrusted Commodity HypervisorFull-text access may be available. Sign in or learn about subscription options.pp. 300-309
FEACS: A Flexible and Efficient Access Control Scheme for Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 310-319
ONHelp: Components in Building Secure Cloud Based on OpenNebulaFull-text access may be available. Sign in or learn about subscription options.pp. 320-327
Proofs of Ownership and Retrievability in Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 328-335
Temporal Access Control with User Revocation for Cloud DataFull-text access may be available. Sign in or learn about subscription options.pp. 336-343
Trust Enhanced Cloud Security for Healthcare ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 344-351
Trusted Geolocation-Aware Data Placement in Infrastructure CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 352-360
Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation ContextFull-text access may be available. Sign in or learn about subscription options.pp. 361-369
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 370-379
Attack Tree Based Android Malware Detection with Hybrid AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 380-387
Automatically Exploiting Potential Component Leaks in Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 388-397
Data-centric Rogue Node Detection in VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 398-405
Detect Android Malware Variants Using Component Based Topology GraphFull-text access may be available. Sign in or learn about subscription options.pp. 406-413
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDRFull-text access may be available. Sign in or learn about subscription options.pp. 422-431
Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 432-439
Synthesising End-to-End Security ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 440-447
Collaborative and Ubiquitous Consumer Oriented Trusted Service ManagerFull-text access may be available. Sign in or learn about subscription options.pp. 448-456
Design and Analysis of a New Feature-Distributed MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 457-464
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 473-480
BIBRM: A Bayesian Inference Based Road Message Trust Model in Vehicular Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 481-486
Convergence of True Cooperations in Bayesian Reputation GameFull-text access may be available. Sign in or learn about subscription options.pp. 487-494
Practical Assessment of Biba Integrity for TCG-Enabled PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 495-504
SigmoRep: A Robust Reputation Model for Open Collaborative EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 505-510
Towards Robust and Effective Trust Management for Security: A SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 511-518
Trust Mechanism for Enforcing Compliance to Secondary Data Use ContractsFull-text access may be available. Sign in or learn about subscription options.pp. 519-526
An Effective Path Load Balancing Mechanism Based on SDNFull-text access may be available. Sign in or learn about subscription options.pp. 527-533
Integrity Levels: A New Paradigm for Protecting Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 534-543
Overhead-Free In-Place Recovery Scheme for XOR-Based Storage CodesFull-text access may be available. Sign in or learn about subscription options.pp. 552-557
Untrusted User Detection in MicroblogsFull-text access may be available. Sign in or learn about subscription options.pp. 558-564
Anonymous Proxy Signature with Restricted TraceabilityFull-text access may be available. Sign in or learn about subscription options.pp. 575-581
Efficient Traceable Attribute-Based SignatureFull-text access may be available. Sign in or learn about subscription options.pp. 582-589
Computation Integrity Measurement Based on Branch TransferFull-text access may be available. Sign in or learn about subscription options.pp. 590-597
Emergency Key Rollover in DNSSECFull-text access may be available. Sign in or learn about subscription options.pp. 598-604
Crowd Sensing of Urban Emergency Events Based on Social Media Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 605-610
SocAware: A Middleware for Social Applications in Online Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 611-615
Showing 100 out of 155