Login / Signup
TrustCom/ISPA/IUCC
2013
2013
2013
Keyphrases
Publications
2013
Ahmad Samer Wazan
,
Gregory Blanc
,
Hervé Debar
,
Joaquín García-Alfaro
Attribute-Based Mining Process for the Organization-Based Access Control Model.
TrustCom/ISPA/IUCC
(2013)
Xiaochen Yuan
,
Chi-Man Pun
Feature Based Video Watermarking Resistant to Geometric Distortions.
TrustCom/ISPA/IUCC
(2013)
Chi-Hsien Wang
,
Gwo-Jong Yu
Power Control and Channel Assignment Mechanisms for Cluster-Based Multichannel Vehicular Ad-Hoc Networks.
TrustCom/ISPA/IUCC
(2013)
Alasdair Thomason
,
Matthew Leeke
,
Matthew Bradbury
,
Arshad Jhumka
Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy.
TrustCom/ISPA/IUCC
(2013)
Mohd Izuan Hafez Ninggal
,
Jemal H. Abawajy
Preserving Utility in Social Network Graph Anonymization.
TrustCom/ISPA/IUCC
(2013)
Adrian J. Duncan
,
Sadie Creese
,
Michael Goldsmith
,
Jamie S. Quinton
Cloud Computing: Insider Attacks on Virtual Machines during Migration.
TrustCom/ISPA/IUCC
(2013)
Miroslaw Kutylowski
,
Piotr Lipiak
Disability Parking Permit - Lightweight But Trustworthy Identity Documents.
TrustCom/ISPA/IUCC
(2013)
Aarthi Krishna
,
Vijay Varadharajan
,
Nathan Tarr
On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures.
TrustCom/ISPA/IUCC
(2013)
Luke Mirowski
Exposing Clone RFID Tags at the Reader.
TrustCom/ISPA/IUCC
(2013)
Chuanhao Qu
,
Lei Ju
,
Zhiping Jia
,
Huaqiang Xu
,
Longpeng Zheng
Light-Weight Trust-Based On-Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.
TrustCom/ISPA/IUCC
(2013)
Isredza Rahmi A. Hamid
,
Jemal H. Abawajy
Profiling Phishing Email Based on Clustering Approach.
TrustCom/ISPA/IUCC
(2013)
Servesh Muralidharan
,
Kevin Casey
,
David Gregg
A Parallel Runtime Framework for Communication Intensive Stream Applications.
TrustCom/ISPA/IUCC
(2013)
Adam Muhlbauer
,
Timothy Zelinsky
,
Salil S. Kanhere
Platform Zero: A Context-Based Computing Platform for Collaboration.
TrustCom/ISPA/IUCC
(2013)
Raihana Ferdous
,
Vallipuram Muthukkumarasamy
,
Elankayer Sithirasenan
Determining Similar Recommenders Using Improved Collaborative Filtering in MANETs.
TrustCom/ISPA/IUCC
(2013)
Carlos Domínguez
,
Houcine Hassan
,
Vicent Mayans
,
Alfons Crespo
Multicore Parallel Implementation of Agent Emotional Processes.
TrustCom/ISPA/IUCC
(2013)
Toru Nakamura
,
Shinsaku Kiyomoto
,
Ryu Watanabe
,
Yutaka Miyake
P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering.
TrustCom/ISPA/IUCC
(2013)
Harini Ragavan
,
Brajendra Panda
Mitigating Malicious Updates: Prevention of Insider Threat to Databases.
TrustCom/ISPA/IUCC
(2013)
Aftab Ahmed Chandio
,
Cheng-Zhong Xu
,
Nikos Tziritas
,
Kashif Bilal
,
Samee Ullah Khan
A Comparative Study of Job Scheduling Strategies in Large-Scale Parallel Computational Systems.
TrustCom/ISPA/IUCC
(2013)
Ahmad A. Alzahrani
,
Seng W. Loke
,
Hongen Lu
Conflict and Interference Resolution for Physical Annotation Systems.
TrustCom/ISPA/IUCC
(2013)
Daniele Apiletti
,
Elena Baralis
,
Tania Cerquitelli
,
Silvia Chiusano
,
Luigi Grimaudo
SeaRum: A Cloud-Based Service for Association Rule Mining.
TrustCom/ISPA/IUCC
(2013)
Soufiene Ben Othman
,
Abdelbasset Trad
,
Habib Youssef
,
Hani Alzaid
Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks.
TrustCom/ISPA/IUCC
(2013)
Mahmood A. Rashid
,
M. A. Hakim Newton
,
Md. Tamjidul Hoque
,
Abdul Sattar
Collaborative Parallel Local Search for Simplified Protein Structure Prediction.
TrustCom/ISPA/IUCC
(2013)
Shaahin Madani
,
Ibrahim Khalil
Garbled Routing (GR): Towards Unification of Anonymous Networks.
TrustCom/ISPA/IUCC
(2013)
João Salada
,
João Pedro Barreto
TurboSockets: Democratizing Distributed Deduplication.
TrustCom/ISPA/IUCC
(2013)
Dan Zhao
,
Chunqing Wu
,
Xiaofeng Hu
,
Xiaofeng Wang
,
Baokang Zhao
Characterization of OSPF Convergence with Correlated Failures.
TrustCom/ISPA/IUCC
(2013)
Younchan Jung
,
Marnel Peradilla
,
J. William Atwood
Securing Domain Name System Combined with MIPv6 for Mobile Hosts.
TrustCom/ISPA/IUCC
(2013)
Xuyun Zhang
,
Chang Liu
,
Surya Nepal
,
Chi Yang
,
Wanchun Dou
,
Jinjun Chen
Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud.
TrustCom/ISPA/IUCC
(2013)
Talal H. Noor
,
Quan Z. Sheng
,
Abdullah Alfazi
Reputation Attacks Detection for Effective Trust Assessment among Cloud Services.
TrustCom/ISPA/IUCC
(2013)
Jurairat Phuttharak
,
Seng W. Loke
LogicCrowd: A Declarative Programming Platform for Mobile Crowdsourcing.
TrustCom/ISPA/IUCC
(2013)
T. Raghu Vamsi Krishna
,
Rajesh P. Barnwal
,
Soumya K. Ghosh
MDS-Based Trust Estimation of Event Reporting Node in VANET.
TrustCom/ISPA/IUCC
(2013)
Tianqing Zhu
,
Ping Xiong
,
Yang Xiang
,
Wanlei Zhou
An Effective Deferentially Private Data Releasing Algorithm for Decision Tree.
TrustCom/ISPA/IUCC
(2013)
Juan Li
,
Yan Bai
,
Nazia Zaman
A Fuzzy Modeling Approach for Risk-Based Access Control in eHealth Cloud.
TrustCom/ISPA/IUCC
(2013)
Paul Robertson
,
Robert Laddaga
,
Mark H. Burstein
Trust and Adaptation in STRATUS.
TrustCom/ISPA/IUCC
(2013)
Fu-Kuo Tseng
,
Rong-Jaye Chen
,
Bao-Shuh Paul Lin
iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search.
TrustCom/ISPA/IUCC
(2013)
Qihui Zhou
,
Dan Wang
,
Yan Zhang
,
Bo Qin
,
Aimin Yu
,
Baohua Zhao
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain.
TrustCom/ISPA/IUCC
(2013)
Chen Chen
,
Yao Wu
,
Joshua Suetterlein
,
Long Zheng
,
Minyi Guo
,
Guang R. Gao
Automatic Locality Exploitation in the Codelet Model.
TrustCom/ISPA/IUCC
(2013)
Tao Feng
,
Xi Zhao
,
Bogdan Carbunar
,
Weidong Shi
Continuous Mobile Authentication Using Virtual Key Typing Biometrics.
TrustCom/ISPA/IUCC
(2013)
Nelcileno Virgilio de Souza Araújo
,
Ruy de Oliveira
,
Ed Wilson Tavares Ferreira
,
Valtemir Emerencio do Nascimento
,
Ailton Akira Shinoda
,
Bharat K. Bhargava
Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks.
TrustCom/ISPA/IUCC
(2013)
Wagner Medeiros dos Santos
,
Ruy J. G. B. de Queiroz
,
Carlos E. R. Saraiva
,
Gleudson P. V. Junior
Toward Coercion-Resistant End-to-End Verifiable Electronic Voting Systems.
TrustCom/ISPA/IUCC
(2013)
Chung Hwan Lee
,
Peter Strazdins
An Analysis of Driver Domain Offload for Paravirtualized Communication.
TrustCom/ISPA/IUCC
(2013)
Mingzhe Zhang
,
Da Wang
,
Xiaochun Ye
,
Liqiang He
,
Dongrui Fan
,
Zhiyong Liu
A Path-Adaptive Opto-electronic Hybrid NoC for Chip Multi-processor.
TrustCom/ISPA/IUCC
(2013)
Burkhard Englert
,
Reza Gheissari
Multivalued and Deterministic Peer-to-Peer Polling in Social Networks with Reputation Conscious Participants.
TrustCom/ISPA/IUCC
(2013)
Sascha Hauke
,
Sebastian Biedermann
,
Max Mühlhäuser
,
Dominik Heider
On the Application of Supervised Machine Learning to Trustworthiness Assessment.
TrustCom/ISPA/IUCC
(2013)
Vasiliki Kalavri
,
Vladimir Vlassov
MapReduce: Limitations, Optimizations and Open Issues.
TrustCom/ISPA/IUCC
(2013)
Yi-Hsueh Tsai
,
Yi-Ting Lin
,
Kanchei Loa
,
Tsung-Yu Tsai
,
Chun-Che Chien
,
Dun-Cheih Huang
,
Shiann-Tsong Sheu
Proximity-Based Service beyond 4G Network: Peer-Aware Discovery and Communication Using E-UTRAN and WLAN.
TrustCom/ISPA/IUCC
(2013)
Dirar Abu-Saymeh
,
Dhiah el Diehn I. Abou-Tair
,
Ahmad Zmily
An Application Security Framework for Near Field Communication.
TrustCom/ISPA/IUCC
(2013)
Junrui Zhou
,
Hong An
,
Yanyan Zou
,
Tao Sun
Quantitative Analysis of Inter-block Dependence in Speculative Execution.
TrustCom/ISPA/IUCC
(2013)
Min Zheng
,
Mingshen Sun
,
John C. S. Lui
Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware.
TrustCom/ISPA/IUCC
(2013)
Muhammad Khurram Khan
,
Debiao He
Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard".
TrustCom/ISPA/IUCC
(2013)
M. Manzur Murshed
,
Tishna Sabrina
,
Anindya Iqbal
,
Mortuza Ali
Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines.
TrustCom/ISPA/IUCC
(2013)