掌桥科研
一站式科研服务平台
科技查新
收录引用
专题文献检索
外文数据库(机构版)
更多产品
首页
成为会员
我要充值
退出
我的积分:
中文会员
开通
中文文献批量获取
外文会员
开通
外文文献批量获取
我的订单
会员中心
我的包量
我的余额
登录/注册
文献导航
中文期刊
>
中文会议
>
中文学位
>
中国专利
>
外文期刊
>
外文会议
>
外文学位
>
外国专利
>
外文OA文献
>
外文科技报告
>
中文图书
>
外文图书
>
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
美国国防部AD报告
美国能源部DE报告
美国航空航天局NASA报告
美国商务部PB报告
外军国防科技报告
美国国防部
美国参联会主席指示
美国海军
美国空军
美国陆军
美国海军陆战队
美国国防技术信息中心(DTIC)
美军标
美国航空航天局(NASA)
战略与国际研究中心
美国国土安全数字图书馆
美国科学研究出版社
兰德公司
美国政府问责局
香港科技大学图书馆
美国海军研究生院图书馆
OALIB数据库
在线学术档案数据库
数字空间系统
剑桥大学机构知识库
欧洲核子研究中心机构库
美国密西根大学论文库
美国政府出版局(GPO)
加利福尼亚大学数字图书馆
美国国家学术出版社
美国国防大学出版社
美国能源部文献库
美国国防高级研究计划局
美国陆军协会
美国陆军研究实验室
英国空军
美国国家科学基金会
美国战略与国际研究中心-导弹威胁网
美国科学与国际安全研究所
法国国际关系战略研究院
法国国际关系研究所
国际宇航联合会
美国防务日报
国会研究处
美国海运司令部
北约
盟军快速反应部队
北约浅水行动卓越中心
北约盟军地面部队司令部
北约通信信息局
北约稳定政策卓越中心
美国国会研究服务处
美国国防预算办公室
美国陆军技术手册
一般OA
科技期刊论文
科技会议论文
图书
科技报告
科技专著
标准
其它
美国卫生研究院文献
分子生物学
神经科学
药学
外科
临床神经病学
肿瘤学
细胞生物学
遗传学
公共卫生&环境&职业病
应用微生物学
全科医学
免疫学
动物学
精神病学
兽医学
心血管
放射&核医学&医学影像学
儿科
医学进展
微生物学
护理学
生物学
牙科&口腔外科
毒理学
生理学
医院管理
妇产科学
病理学
生化技术
胃肠&肝脏病学
运动科学
心理学
营养学
血液学
泌尿科学&肾病学
生物医学工程
感染病
生物物理学
矫形
外周血管病
药物化学
皮肤病学
康复学
眼科学
行为科学
呼吸学
进化生物学
老年医学
耳鼻喉科学
发育生物学
寄生虫学
病毒学
医学实验室检查技术
生殖生物学
风湿病学
麻醉学
危重病护理
生物材料
移植
医学情报
其他学科
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
主题
主题
题名
作者
关键词
摘要
高级搜索 >
外文期刊
外文会议
外文学位
外国专利
外文图书
外文OA文献
中文期刊
中文会议
中文学位
中国专利
中文图书
外文科技报告
清除
历史搜索
清空历史
首页
>
外文会议
>
计算机、自动化
>
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
召开年:
召开地:
出版时间:
-
会议文集:
-
会议论文
热门论文
全部论文
相关中文期刊
集成技术
光盘技术
课堂内外·中学生电脑
微型计算机
电脑爱好者
传感技术学报
计算机研究与发展
程序员
个人电脑
铁路计算机应用
更多>>
相关外文期刊
International journal of knowledge-based and intelligent engineering systems
European journal of information systems
International journal of art, culture and design technologies
Foundations and trends in electronic design automation
Algorithmica
Network
Natural language semantics
Journal of High Speed Networks
Ingenierie des Systemes d'Information
Systems, Man and Cybernetics, Part A, IEEE Transactions on
更多>>
相关中文会议
全国第六届计算语言学联合学术会议
第十八届全国计算机信息管理学术研讨会
第十九届全国网络与数据通信学术会议
第七届全国信息隐藏暨多媒体信息安全学术大会
第五届科学数据库与信息技术学术研讨会
第十二届全国自动化应用技术学术交流会
第四届国防科技工业试验与测试技术发展战略高层论坛
2007全国计算机实践教学学术研讨会
第十八届计算机工程与工艺年会暨第四届微处理器技术论坛
第十二届全国软件与应用学术会议(NASAC2012)
更多>>
相关外文会议
Proceedings of the Seventh annual conference on SIGCPR
4th International Workshop on Algorithm Engineering and Experiments ALENEX 2002, Jan 4-5, 2002, San Francisco, CA, USA
International Workshop on Types for Proofs and Programs(TYPES 2007); 20060418-21; Nottingham(GB)
Advances in computer science and engineering
International Workshop on Argumentation in Multi-Agent Systems(ArgMAS 2006); 20060508; Hakodate(JP)
Current trends in web engineering
Polarization Science and Remote Sensing III; Proceedings of SPIE-The International Society for Optical Engineering; vol.6682
European Symposium on Ambient Intelligence(EUSAI 2004); 20041108-11; Eindhoven(NL)
Formal methods in Computer-Aided design
Verification, model checking, and abstract interpretation.
更多>>
热门会议
Meeting of the internet engineering task force;IETF
日本建築学会;日本建築学会大会
日本建築学会(Architectural Institute of Japan);日本建築学会年度大会
日本建築学会学術講演会;日本建築学会
日本建築学会2010年度大会(北陸)
Korean Society of Noise & Vibration Control;Institute of Noise Control Engineering;International congress and exposition on noise control engineering;ASME Noise Control & Acoustics Division
土木学会;土木学会全国大会年次学術講演会
応用物理学会秋季学術講演会;応用物理学会
総合大会;電子情報通信学会
The 4th International Conference on Wireless Communications, Networking and Mobile Computing(第四届IEEE无线通信、网络技术及移动计算国际会议)论文集
更多>>
最新会议
2011 IEEE Cool Chips XIV
International workshop on Java technologies for real-time and embedded systems
Supercomputing '88. [Vol.1]. Proceedings.
RILEM Proceedings PRO 40; International RILEM Conference on the Use of Recycled Materials in Buildings and Structures vol.1; 20041108-11; Barcelona(ES)
International Workshop on Hybrid Metaheuristics(HM 2007); 20071008-09; Dortmund(DE)
The 57th ARFTG(Automatic RF Techniques Group) Conference, May 25, 2001, Phoenix, AZ
Real Time Systems Symposium, 1989., Proceedings.
Conference on Chemical and Biological Sensing V; 20040412-20040413; Orlando,FL; US
American Filtration and Separations Society conference
Combined structures congress;North American steel construction conference;NASCC
更多>>
全选(
0
)
清除
导出
1.
Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud
机译:
在Android外部存储上执行文件系统权限:Android文件系统权限(AFP)原型和ownCloud
作者:
Quang Do
;
Martini Ben
;
Choo Kim-Kwang Raymond
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Android (operating system);
cloud computing;
data privacy;
mobile computing;
storage management;
AFP prototype;
Android external storage;
Android file system permission;
cloud based storage services;
corporate confidential data;
critical information management tools;
external file system;
mobile device operating system;
ownCloud app;
personal confidential data;
privacy protection;
Conferences;
Privacy;
Security;
Android;
SD card;
external storage;
file system;
file system permissions;
mobile device;
mobile security;
priv;
2.
Automatically Exploiting Potential Component Leaks in Android Applications
机译:
在Android应用程序中自动利用潜在的组件泄漏
作者:
Li Li
;
Bartel Alexandre
;
Klein John
;
le Traon Yves
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Android (operating system);
data flow analysis;
invasive software;
smart phones;
Android applications;
Google Play store;
ICC vulnerabilities;
PCLeaks tool;
PCLeaksValidator;
automatic potential-component leak exploitation;
data-flow analysis;
intercomponent communication vulnerabilities;
Androids;
Humanoid robots;
Malware;
Mobile communication;
Receivers;
Smart phones;
3.
Long Term Tracking and Characterization of P2P Botnet
机译:
P2P僵尸网络的长期跟踪和表征
作者:
Jia Yan
;
Lingyun Ying
;
Yi Yang
;
Purui Su
;
Dengguo Feng
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
IP networks;
Internet;
invasive software;
peer-to-peer computing;
statistical analysis;
AS border;
IP dynamic allocation;
Internet;
P2P botnet characterization;
P2P botnet victims;
autonomous system border;
centralized network;
descriptive characterization;
long term tracking;
network dynamic analysis;
payload updates;
security community;
statistical characterization;
Crawlers;
IP networks;
Internet;
Measurement;
Peer-to-peer computing;
Protocols;
Routing;
4.
SARAH - Statistical Analysis for Resource Allocation in Hadoop
机译:
SARAH-Hadoop中资源分配的统计分析
作者:
Martin Benoit
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Big Data;
file servers;
resource allocation;
statistical analysis;
Apache Hadoop;
Big Data applications;
SARAH;
Web server log file data;
configuration settings;
performance optimizations;
reduce workload balancing;
resource settings;
statistical analysis for resource allocation in Hadoop;
Conferences;
Privacy;
Security;
Hadoop;
Map-Reduce;
big data;
performance tuning;
statistical analysis;
5.
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs
机译:
基于节点行为评估的MANET信任增强型组播路由协议
作者:
Hui Xia
;
Jia Yu
;
Zhi-Yong Zhang
;
Xiang-Guo Cheng
;
Zhen-Kuan Pan
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
decision making;
mobile ad hoc networks;
multicast protocols;
quality of service;
radio links;
routing protocols;
MANET;
cryptosystem;
decision making;
group-shared tree strategy;
malicious node detection;
malicious nodes;
mobile ad hoc network;
mobile nodes;
packet routing;
quality of service;
trust constraint;
trust inference model;
trust-enhanced multicast routing protocol;
wireless links;
Ad hoc networks;
Mobile computing;
Monitoring;
Peer-to-peer computing;
Routing;
Routing protocols;
Ad Hoc Network;
Malicious Node;
R;
6.
Attacks on Physically-Embedded Data Encryption for Embedded Devices
机译:
针对嵌入式设备的物理嵌入式数据加密的攻击
作者:
Chaohui Du
;
Guoqiang Bai
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cryptography;
PEDE architecture;
arithmetic computations;
cipher text;
embedded devices;
known-plaintext attack;
logical computations;
modeling attack;
physically-embedded data encryption;
secret key;
Computer architecture;
Delays;
Encryption;
Generators;
Robustness;
Embedded device;
Encryption;
Known-plaintext attack;
Modeling attack;
Physical effect;
Physical unclonable function;
Reliability;
Security;
7.
Anonymous Proxy Signature with Restricted Traceability
机译:
具有受限可追溯性的匿名代理签名
作者:
Jiannan Wei
;
Guomin Yang
;
Yi Mu
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cryptographic protocols;
data privacy;
digital signatures;
anonymity property;
anonymous authentication protocols;
anonymous proxy signature scheme;
anonymous voting schemes;
digital signature schemes;
proxy signature scheme;
proxy signer;
proxy signer identity protection;
restricted traceability;
security requirement;
signer anonymity;
user privacy;
Computers;
Educational institutions;
Games;
Information security;
Privacy;
Public key;
8.
Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems
机译:
单点登录移动系统中持久身份验证的乘法属性图方法
作者:
Premarathne Uthpala Subodhani
;
Khalil Issa
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
authorisation;
biometrics (access control);
graph theory;
mobile computing;
SSO based mobile collaborative applications;
SSO global logout management;
activity specific information;
contextual variations;
facial biometrics;
location information;
membership based session management technique;
mobility variations;
multiple attribute based persistent authentication model;
multiplicative attribute graph approach;
robust persistent authentications;
secure session termination management;
single-sign-on mobile systems;
9.
Attack Tree Based Android Malware Detection with Hybrid Analysis
机译:
基于混合分析的基于攻击树的Android恶意软件检测
作者:
Shuai Zhao
;
Xiaohong Li
;
Guangquan Xu
;
Lei Zhang
;
Zhiyong Feng
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
invasive software;
smart phones;
tree data structures;
AMDetector;
Android malware detection approach;
application capability;
attack goals;
attack tree structure;
behavior rules;
comprehensive static capability estimation;
fine-grained estimation;
hybrid dynamic analysis method;
runtime behaviors;
Androids;
Feature extraction;
Humanoid robots;
Malware;
Privacy;
Runtime;
Vegetation;
Android;
attack tree;
detection;
hybrid analysis;
malware;
10.
Trust Mechanism for Enforcing Compliance to Secondary Data Use Contracts
机译:
强制遵守次级数据使用合同的信任机制
作者:
Noorian Zeinab
;
Iyilade Johnson
;
Mohkami Mohsen
;
Vassileva Julita
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
contracts;
data privacy;
trusted computing;
business domains;
contractual agreements;
data consumer compliance monitoring;
data sources;
data use contract enforcement;
errant data consumers;
secondary user data sharing;
suspected privacy violations;
trust management mechanism;
user complaints;
user data aggregation;
user data marketplace;
Context;
Contracts;
Data privacy;
Electronic mail;
Predictive models;
Regression tree analysis;
Reliability;
compliance monitoring;
data use contract;
privacy policy enforcement;
reput;
11.
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR
机译:
使用CasperFDR正式分析了启用NFC的手机上的安全移动支付
作者:
Abughazalah Sarah
;
Markantonakis Kostantinos
;
Mayes Keith
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
financial data processing;
mobile computing;
near-field communication;
security of data;
CasperFDR;
NFC enabled mobile phones;
credit cards;
mobile handset;
mobile user requirements;
near field communication;
payment devices;
payment transaction;
secure mobile payment;
Authentication;
Mobile communication;
Mobile handsets;
Protocols;
Public key;
Mobile payment;
NFC-enabled mobile phone;
Privacy;
Security protocol;
12.
Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart Posters
机译:
轻型安全中间件,可检测NFC标签或智能海报中的恶意内容
作者:
Hameed Shahul
;
Hameed Bilal
;
Hussain Syed Asad
;
Khalid Waqas
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
middleware;
radiofrequency identification;
security of data;
NFC-based security vulnerabilities;
RFID;
lightweight security middleware;
malicious content;
smart posters;
Androids;
Internet;
Middleware;
Mobile communication;
Security;
Smart phones;
Uniform resource locators;
Malicious URL Filtering;
NFC;
NFC Security;
Near Field Communication;
Security Middleware;
13.
The Evaluation of Emulab as an Environment for Bio-Informatics Research
机译:
Emulab作为生物信息学研究环境的评估
作者:
Kyungwoo Kang
;
Yunhee Kang
;
Sungjin Sul
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
bioinformatics;
computer network security;
data handling;
parallel processing;
DNA sequence alignment;
DNA sequence search;
Emulab evaluation;
NCBI database;
bioinformatics research;
computer network;
emulation-based network test-bed;
high-performance computing;
information security;
mpiBLAST;
mr-mpi-blast;
parallel computer;
parallel processing;
scientific data;
Clustering algorithms;
DNA;
Databases;
Educational institutions;
Graphical user interfaces;
Parallel processing;
BLAST;
Emulab;
MapReduce;
mr-mpi;
14.
A Compact Hardware Implementation of SM3 Hash Function
机译:
SM3哈希函数的紧凑硬件实现
作者:
Tianyong Ao
;
Zhangqing He
;
Jinli Rao
;
Kui Dai
;
Xuecheng Zou
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
SRAM chips;
cryptography;
mobile computing;
shift registers;
SM3 hash function;
SRAM;
compact hardware implementation;
message expansion function;
mobile devices;
security functions;
shift registers;
wireless devices;
Adders;
Computer architecture;
Hardware;
Multiplexing;
Random access memory;
Registers;
Security;
ASIC;
Low-cost;
SM3 hash;
15.
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures
机译:
SSO系统中基于名义签名的隐私增强的访问日志管理机制
作者:
Nakagawa Sachiko
;
Emura Keita
;
Hanaoka Goichiro
;
Kodate Akihisa
;
Nishide Takashi
;
Okamoto Eiji
;
Sakai Yoshiki
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Internet;
cryptography;
customer relationship management;
data privacy;
digital signatures;
user interfaces;
PBC library;
SP;
Schuldt-Hanaoka nominative signature scheme;
Wang-Wang-Susilo SSO system;
computation time;
customer buying histories;
nominative signatures;
online services;
online shopping;
pairing-based cryptography;
plural access logs;
privacy infringement problem;
privacy-enhanced access log management mechanism;
service provider;
single sign on systems;
user information;
user personal information;
Authen;
16.
A Survey of Security Network Coding toward Various Attacks
机译:
针对各种攻击的安全网络编码调查
作者:
Shixiong Yao
;
Jing Chen
;
Ruiying Du
;
Lan Deng
;
Chiheng Wang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
network coding;
telecommunication security;
Byzantine attack;
NC;
eavesdropping attack;
encode-and-forward model;
entropy attack;
network coding mode;
network coding security;
pollution attack;
store-and-forward mode;
Cryptography;
Encoding;
Entropy;
Network coding;
Pollution;
Vectors;
Network coding;
defense schemes;
four forms of attacks;
17.
Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit
机译:
在线社交网络的自适应共享:隐私风险与社会利益之间的权衡
作者:
Mu Yang
;
Yijun Yu
;
Bandara Arosha K.
;
Nuseibeh Bashar
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data privacy;
social networking (online);
Facebook;
adaptive sharing;
laborious process;
numerical simulation;
online social networks;
privacy control;
privacy risk;
social benefit;
utility-based trade-off framework;
Adaptation models;
Educational institutions;
Privacy;
Receivers;
Sensitivity;
Social network services;
18.
A Machine Learning Based Trust Evaluation Framework for Online Social Networks
机译:
基于机器学习的在线社交网络信任评估框架
作者:
Kang Zhao
;
Li Pan
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
learning (artificial intelligence);
pattern classification;
social networking (online);
trusted computing;
classification problem;
e-commerce;
friend recommendation system;
machine learning based trust evaluation framework;
machine learning method;
network-level trust evaluation;
online social networks;
social computing;
social network users;
trust computing methods;
trust evaluation method;
trust feature vector;
trust related factors;
trust-based access control system;
Accuracy;
Computational modeling;
Predictive;
19.
Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited
机译:
重新讨论了针对线性相关密钥攻击的弹性公共密钥加密
作者:
Hui Cui
;
Yi Mu
;
Man Ho Au
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
public key cryptography;
Asiacrypt12;
CC-RKA security;
PKC12;
chosen-cipher text;
decisional BDH assumption;
decryption oracle;
linear related-key secure cryptographic primitives;
multielement private keys;
nonlinear related-key derivation functions;
public-key encryption;
standard model;
Encryption;
Hardware;
Identity-based encryption;
Resistance;
CC-RKA security;
Linear related-key attack;
Public-key encryption;
20.
A Proposal for a Reference Architecture for Long-Term Archiving, Preservation, and Retrieval of Big Data
机译:
关于长期归档,保存和检索大数据的参考体系结构的建议
作者:
Viana Phillip
;
Sato Liria
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Big Data;
computer centres;
information retrieval;
storage management;
corporate data centers;
data storage systems;
data volume;
government regulations;
long-term Big Data archiving;
long-term Big Data preservation;
long-term Big Data retrieval;
reference architecture;
structured data;
structured data archiving;
structured data preservation;
Conferences;
Privacy;
Security;
E-Discovery;
archiving;
big data;
data preservation;
reference architecture;
retrieval;
21.
BIBRM: A Bayesian Inference Based Road Message Trust Model in Vehicular Ad Hoc Networks
机译:
BIBRM:车辆自组织网络中基于贝叶斯推理的道路消息信任模型
作者:
Guanghao Wang
;
Yue Wu
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
belief networks;
inference mechanisms;
information dissemination;
road traffic;
security of data;
telecommunication network routing;
telecommunication security;
traffic information systems;
vehicular ad hoc networks;
BIBRM;
Bayesian inference based road message trust model;
VANET;
data centric trust model;
dynamic routing;
false road information dissemination;
intelligent transport system;
malicious fake road message avoidance;
road congestion;
traffic jam;
travelling time performance improvement;
vehicular ad hoc;
22.
Multi-dimensions of Developer Trustworthiness Assessment in OSS Community
机译:
OSS社区中开发者可信度评估的多维
作者:
Yu Bai
;
Gang Yin
;
Huaimin Wang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
groupware;
public domain software;
security of data;
social aspects of automation;
software metrics;
trusted computing;
OSS community;
collaboration index;
community influence;
developer trustworthiness assessment;
development contribution;
distributed software development;
open source software;
question answering;
real-world online software community;
social collaboration aspects;
technical skill;
Collaboration;
Communities;
Educational institutions;
Equations;
Indexes;
Mathematical model;
Software;
Developer assessme;
23.
Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs
机译:
VANET中基于阈值的安全和隐私保护消息验证
作者:
Wei Gao
;
Mingzhong Wang
;
Liehuang Zhu
;
Xiaoping Zhang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
protocols;
telecommunication security;
vehicular ad hoc networks;
VANET;
posteriori process;
privacy-preserving message verification;
protocol;
threshold-based secure message verification;
vehicular ad hoc networks;
Authentication;
Privacy;
Protocols;
Public key;
Servers;
Vehicles;
Group Signature;
Privacy;
Threshold Verification;
Vehicular Communication;
24.
Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services
机译:
基于位图索引的个人存储服务加密关键字搜索机制
作者:
Yong Ho Hwang
;
Jae Woo Seo
;
Il Joo Kim
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
SQL;
cloud computing;
cryptography;
outsourcing;
Bitmap index;
NoSQL database;
bitmap index;
cloud services;
couch base;
encrypted keyword search mechanism;
encrypted keyword search problem;
keyword search mechanism;
outsourcing;
personal data;
personal storage services;
privacy issue;
private information;
remote storage service;
searchable symmetric encryption;
Arrays;
Cloud computing;
Encryption;
Indexes;
Keyword search;
encryption;
searchable;
symmetric;
25.
Trusted Geolocation-Aware Data Placement in Infrastructure Clouds
机译:
基础架构云中受信任的地理位置感知数据放置
作者:
Paladi Nicolae
;
Aslam Mudassar
;
Gehrmann Christian
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Global Positioning System;
cloud computing;
mobile computing;
trusted computing;
cloud host geolocation;
commodity hardware;
decryption keys;
geographical location;
infrastructure clouds;
infrastructure-as-a service cloud providers;
open source cloud infrastructure platform;
plaintext data;
trusted computing principles;
trusted geolocation-aware data placement;
Cloud computing;
Computer architecture;
Cryptography;
Distributed databases;
Geology;
IP networks;
Protocols;
GPS;
IaaS;
cloud computing;
data geolocation;
rever;
26.
MapReduce for Large-Scale Monitor Data Analyses
机译:
MapReduce用于大型监控器数据分析
作者:
Jianwei Ding
;
Yingbo Liu
;
Li Zhang
;
Jianmin Wang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Internet of Things;
condition monitoring;
construction equipment;
data analysis;
database management systems;
machinery production industries;
maintenance engineering;
mechanical engineering computing;
parallel processing;
product design;
Internet of Things;
IoT;
MapReduce;
construction machinery manufacturer condition monitoring system;
data management systems;
large-scale monitor data analysis;
manufacturing enterprises;
parallel monitor data analysis;
product design;
product maintenance;
product manufacturing;
st;
27.
FedLoop: Looping on Federated MapReduce
机译:
FedLoop:在联合MapReduce上循环
作者:
Chun-Yu Wang
;
Tzu-Li Tai
;
Kuan-Chieh Huang
;
Tse-En Liu
;
Jyh-Biau Chang
;
Ce-Kuen Shieh
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Big Data;
data handling;
distributed databases;
parallel programming;
pattern clustering;
public domain software;
Big Data;
FedLoop;
K-Means;
MapReduce/Hadoop clusters;
PageRank;
cluster processing;
composite system;
data processing;
data storage;
distributed-large-scale processing platforms;
execution efficiency;
federated MapReduce;
geographically distributed data;
iterative MapReduce computation;
iterative MapReduce jobs;
iterative multicluster computation systems;
multicluster MapReduce;
noniterative MapReduce job;
28.
Synthesising End-to-End Security Protocols
机译:
合成端到端安全协议
作者:
Thevathayan Charles
;
Bertok Peter
;
Fernandez George
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cryptographic protocols;
electronic commerce;
SET purchase protocol;
e-commerce transactions;
end-to-end security properties;
end-to-end security protocol synthesis;
entity security requirements;
fine-grained security properties;
propagation rules;
security primitives;
standard security properties;
Authentication;
Cryptography;
Finite element analysis;
Knowledge based systems;
Logic gates;
Protocols;
End-to-end security;
Security Protocols;
Synthesis;
29.
CAFS: A Framework for Context-Aware Federated Services
机译:
CAFS:上下文感知联合服务框架
作者:
Ferdous Md Sadek
;
Poet Ron
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
authorisation;
data privacy;
ubiquitous computing;
CAFS;
SAML;
XACML;
context-aware federated services;
extensible access control markup language;
federated identity management;
privacy issues;
security assertion markup language;
security issues;
Authentication;
Authorization;
Context;
Context-aware services;
Databases;
Privacy;
Attribute Aggregation;
Context-Aware Services;
Federated Identity Management;
GeoXACML;
SAML;
XACML;
30.
Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation Context
机译:
用于安全定位器/标识符分离上下文的认知自适应访问控制系统
作者:
Yuanlong Cao
;
Jianfeng Guan
;
Changqiao Xu
;
Wei Quan
;
Hongke Zhang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
authorisation;
cognitive systems;
parallel processing;
peer-to-peer computing;
telecommunication network routing;
APG;
CAAC;
CDM module;
LISC;
STag;
TAC module;
UTag;
adaptive policy generation paradigm;
cognitive adaptive access-control system;
cooperative decision making module;
identifier-based network platform;
intelligent access control;
multipeer parallel cooperation;
routing;
secure locator-identifier separation context;
service tag;
tag-aware access-control module;
user tag;
Access control;
Adaptive systems;
Con;
31.
BIG DATA: Preconditions to Productivity
机译:
大数据:生产力的前提条件
作者:
Hallman Steve
;
Rakhimov Jasur
;
Plaisent Michel
;
Bernard Prosper
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Big Data;
innovation management;
productivity;
Big Data technology;
IT investment;
IT-enabled innovation;
complementary management innovations;
consumer savvy transactions;
consumer transactions insights;
power productivity;
technology innovations;
Big data;
Companies;
Databases;
Real-time systems;
Security;
Apache Hadoop;
Big Data;
RFID data;
32.
Design and Analysis of a New Feature-Distributed Malware
机译:
一种新的功能分布式恶意软件的设计和分析
作者:
Byungho Min
;
Varadharajan Vijay
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
invasive software;
antivirus solutions;
application whitelisting;
application-based permission;
computing platforms;
feature-distributed malware analysis;
feature-distributed malware design;
security policies;
security tools;
software components;
Browsers;
Data collection;
Feature extraction;
Libraries;
Malware;
Software;
Feature Distribution;
Malware;
Security;
Software Component;
33.
A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data
机译:
不确定轨迹数据的基于聚类的隐私保护方法
作者:
Zhou-Fu Cai
;
He-Xing Yang
;
Wang Shuang
;
Xu Jian
;
Wang-Ming Wei
;
Wu-Li Na
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data acquisition;
data mining;
data privacy;
pattern clustering;
probability;
publishing;
statistics;
clustering-based privacy-preserving method;
data acquisition;
data mining;
personal privacy information;
probability statistics;
publishing;
uncertain trajectory data;
Data models;
Data privacy;
Global Positioning System;
Markov processes;
Mathematical model;
Trajectory;
Uncertainty;
(k;
Restore Its True;
anonymous clustering;
d) anonymity model;
privacy preserving;
uncertain trajectory data;
34.
Trust Enhanced Cloud Security for Healthcare Services
机译:
信任用于医疗保健服务的增强型云安全性
作者:
Tupakula Udaya
;
Varadharajan Vijay
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cloud computing;
health care;
trusted computing;
healthcare service providers;
trust enhanced cloud security model;
Cloud computing;
Computational modeling;
Hardware;
Medical services;
Operating systems;
Security;
Virtual machining;
Cloud security;
Healthcare security;
trusted computing;
35.
High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields
机译:
二进制域上椭圆曲线密码的高性能FPGA实现。
作者:
Shuai Liu
;
Lei Ju
;
Xiaojun Cai
;
Zhiping Jia
;
Zhiyong Zhang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Galois fields;
circuit optimisation;
field programmable gate arrays;
polynomials;
public key cryptography;
FF multiplication;
FPGA implementation;
Karatsuba multiplier;
Montgomery ladder method;
NIST;
Xilinx Virtex-4 XC4VLX200;
binary field;
circuit optimisation;
elliptic curve cryptography;
elliptic curve scalar multiplication;
field programmable gate array;
finite field arithmetic;
hardware implementation architecture;
national institute of standards and technology;
polynomial basis;
time 9.0 mus;
Clocks;
Computer;
36.
Reaching Agreement in Security Policy Negotiation
机译:
安全策略协商达成协议
作者:
Yanhuang Li
;
Cuppens-Boulahia Nora
;
Crom Jean-Michel
;
Cuppens Frederic
;
Frey Vincent
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
contracts;
security of data;
e-contract;
secure interaction;
security policy contract;
security policy negotiation;
Abstracts;
Concrete;
Context;
Contracts;
Organizations;
Protocols;
Security;
37.
Escrow: A Large-Scale Web Vulnerability Assessment Tool
机译:
托管:大型Web漏洞评估工具
作者:
Delamore Baden
;
Ko Ryan K. L.
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Internet;
SQL;
graphical user interfaces;
program diagnostics;
security of data;
Escrow;
SQL injection detection tool;
Web application flaw;
application security vulnerabilities;
custom search implementation;
defensive coding practice;
exploitation module;
graphical user interface;
large-scale Web vulnerability assessment tool;
server-side implementation;
static code analysis module;
vulnerable remote database;
Databases;
Google;
Graphical user interfaces;
Search engines;
Security;
Servers;
Uniform resource locators;
38.
Computation Integrity Measurement Based on Branch Transfer
机译:
基于分支转移的计算完整性度量
作者:
Jianming Fu
;
Yan Lin
;
Xu Zhang
;
Pengwei Li
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cloud computing;
data integrity;
trusted computing;
CIMB;
Pin dynamic binary instrumentation tool;
address space layout randomization;
branch transfer;
cloud computing platform;
cloud users;
computation integrity measurement;
control-flow hijacking attack detection;
fine-grained instruction-level integrity measurement;
instruction addresses;
instruction machine code;
measurement inconsistency;
program execution control flow;
program execution integrity verification;
shellcode detection;
tampered tasks;
ubuntu12.04;
39.
Overhead-Free In-Place Recovery Scheme for XOR-Based Storage Codes
机译:
基于XOR的存储代码的无开销就地恢复方案
作者:
Ximing Fu
;
Zhiqing Xiao
;
Shenghao Yang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
computational complexity;
decoding;
XOR-based storage codes;
bitwise exclusive-OR;
data collector;
decoding computational complexity;
in-place decoding algorithm;
increasing-difference property;
overhead-free in-place recovery scheme;
storage nodes;
Complexity theory;
Decoding;
Educational institutions;
Encoding;
Generators;
Iterative decoding;
Vectors;
Distributed storage system;
in-place decoding;
maximum distance separable code;
recovery scheme;
40.
PrivateDroid: Private Browsing Mode for Android
机译:
PrivateDroid:Android的专用浏览模式
作者:
Su Mon Kywe
;
Landis Christopher
;
Yutong Pei
;
Satterfield Justin
;
Yuan Tian
;
Tague Patrick
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Android (operating system);
data privacy;
mobile computing;
online front-ends;
Android applications;
Android platform;
Linux container approach;
PrivateDroid;
code instrumentation;
computer browsers;
mobile devices;
mobile private browsing mode;
mobile users;
privacy feature;
sandbox;
third-party applications;
Androids;
Browsers;
Containers;
Humanoid robots;
Mobile communication;
Security;
Usability;
Mobile Privacy;
Private Browsing Mode;
41.
Emergency Key Rollover in DNSSEC
机译:
DNSSEC中的紧急密钥过渡
作者:
Zheng Wang
;
Liyuan Xiao
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data integrity;
message authentication;
DNSSEC system;
TLD;
authenticated denial of existence;
data integrity;
data origin authentication;
domain name system security extensions;
emergency key rollover;
transition delays;
trust chain;
Authentication;
Delays;
Public key;
Redundancy;
Servers;
DNS Security Extensions;
emergency key rollover;
key compromise;
parent-child interactions;
transition delay;
42.
Proofs of Ownership and Retrievability in Cloud Storage
机译:
云存储中的所有权和可检索性证明
作者:
Ruiying Du
;
Lan Deng
;
Jing Chen
;
Kun He
;
Minghui Zheng
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
client-server systems;
cloud computing;
formal verification;
storage management;
tree data structures;
Merkle tree;
PoOR scheme;
client-side deduplication;
cloud computing technology;
cloud servers;
cloud storage;
communication cost;
computation performance;
erasure code;
file downloading;
file encoding;
file ownership;
file recoverability;
file retrievability verification;
file security;
file size;
file storage;
file uploading;
homomorphic verifiable tags;
mutual validation;
proofs-of-ownership-and-retrievability;
stora;
43.
A Secure Authentication Protocol for IP-Based Wireless Sensor Communications Using the Location/ID Split Protocol (LISP)
机译:
使用位置/ ID拆分协议(LISP)的基于IP的无线传感器通信的安全身份验证协议
作者:
Raheem Ali
;
Lasebae Aboubaker
;
Loo Jonathan
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Internet;
cryptographic protocols;
routing protocols;
transport protocols;
AVISPA;
IP addressing;
Internet backbone;
Internet of Things;
IoT;
LISP;
automated validation Internet security protocols and applications;
key exchange scheme;
location-ID split protocol;
locator-ID separation protocol;
machine-to-machine pattern;
network infrastructure burden;
push button tool;
routing protocols;
routing tables;
security authentication;
wireless sensors;
Authentication;
Internet;
Peer-to-peer computing;
Routing protocols;
Wirel;
44.
SocAware: A Middleware for Social Applications in Online Social Networks
机译:
SocAware:在线社交网络中社交应用程序的中间件
作者:
Liang Chen
;
Kan Chen
;
Chengcheng Shao
;
Peidong Zhu
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Internet;
middleware;
social networking (online);
API;
OSN activities;
OSN middlewares;
OSN services;
SocAware;
heterogeneous networks;
information sharing;
online social networks;
social applications;
social information;
social network applications;
third-party application development;
Access control;
Data mining;
Middleware;
Mobile communication;
Mobile computing;
Prototypes;
Social network services;
middleware;
online social network;
social applications;
social relation strength;
45.
Secure and Privacy-Friendly Public Key Generation and Certification
机译:
安全和隐私友好的公钥生成和认证
作者:
Borges Fabio
;
Martucci Leonardo /A/.
;
Beato Filipe
;
Mühlhäuser Max
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cryptographic protocols;
data privacy;
private key cryptography;
public key cryptography;
telecommunication security;
bootstrap process;
certificate authorities;
certificate enrollment protocols;
certification environment;
constrained Diffie-Hellman;
digital societies;
key agreement protocols;
out-of-band verification;
privacy-friendly public key generation;
public key certificates;
secret information;
secret keys;
secure communication channels;
secure public-private key pair;
Complexity theory;
DH-HEMTs;
Protocols;
46.
Continuous Certification of Non-repudiation in Cloud Storage Services
机译:
持续认证云存储服务中的不可否认性
作者:
Krotsiani Maria
;
Spanoudakis George
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
certification;
cloud computing;
security of data;
NR;
cloud data storage services;
cloud security alliance;
cloud storage services;
continuous certification model;
continuous monitoring;
nonrepudiation;
reference certification framework;
security property;
Bismuth;
Certification;
Cloud computing;
Clouds;
Monitoring;
Protocols;
Security;
cloud;
continuous monitoring;
non-repudiation;
security certification;
47.
EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor
机译:
EqualVisor:在不受信任的商品虚拟机管理程序中提供内存保护
作者:
Liang Deng
;
Qingkai Zeng
;
Weiguang Wang
;
Yao Liu
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cloud computing;
storage management;
trusted computing;
virtual machines;
EqualVisor;
TCB;
address space;
cloud computing;
hypervisor privilege actions;
memory protection;
memory security policies;
privilege level;
trusted computing base;
untrusted commodity hypervisor;
x86 platforms;
Hardware;
Logic gates;
Registers;
Security;
Software;
Virtual machine monitors;
Virtualization;
cloud computing;
hypervisor;
memory protection;
48.
Performance Evaluation of the SSD-Based Swap System for Big Data Processing
机译:
基于SSD的大数据处理交换系统的性能评估
作者:
Jaehun Lee
;
Sungmin Park
;
Minsoo Ryu
;
Sooyong Kang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Big Data;
disc drives;
flash memories;
performance evaluation;
DRAM;
NAND flash memory;
SSD-based swap system;
big data processing systems;
enterprise SSD;
memory extension;
performance enhancement;
performance evaluation;
physical memory;
solid state drives;
swap device;
Ash;
Big data;
Memory management;
Operating systems;
Performance evaluation;
Random access memory;
Runtime;
Big Data Processing;
MapReduce;
Solid State Drive;
Storage;
Swap;
49.
A Novel Public Key Encryption Scheme for Large Image
机译:
一种新的大图像公钥加密方案
作者:
Lingjiao Chen
;
Xinji Chen
;
Zhigang Peng
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
image processing;
public key cryptography;
ECC;
ECDLP;
elliptic curve cryptography;
elliptic curve discrete logarithm problem;
large image encryption;
public key encryption scheme;
Correlation;
Elliptic curve cryptography;
Elliptic curves;
Encryption;
Cryptography;
Elliptic curve;
Image encryption;
Public key;
50.
SIMS: A Comprehensive Approach for a Secure Instant Messaging Sifter
机译:
SIMS:一种安全的即时消息筛选器的综合方法
作者:
Fahrnberger Gunter
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
client-server systems;
data integrity;
data protection;
e-mail filters;
electronic messaging;
private key cryptography;
IM architecture kit;
IM clients;
IM platforms;
SIMS;
abusive language prevention;
censored IM traffic;
child molesters;
comprehensive threat model;
cyberbullying prevention;
data authenticity;
data integrity;
data privacy;
data resilience;
exploitable private data;
molestation prevention;
protection properties;
realtime responses;
secure IM filter;
secure instant messaging sifter;
security policy;
trans;
51.
Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept
机译:
远程程序化vCloud Forensics:六步收集过程和概念证明
作者:
Martini Ben
;
Choo Kim-Kwang Raymond
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cloud computing;
computer crime;
digital forensics;
VMware vCloud;
cloud computing;
cybercrime activity;
evidential data;
organizational cloud services;
proof of concept;
remote programmatic vCloud forensics;
Catalogs;
Cloud computing;
Forensics;
Organizations;
Ports (Computers);
Servers;
Standards organizations;
Cloud forensics;
Remote cloud forensic process;
Remote evidence collection;
Remote evidence preservation;
vCloud;
52.
Improved 2DLDA Algorithm and Its Application in Face Recognition
机译:
改进的2DLDA算法及其在人脸识别中的应用
作者:
Dong Wang
;
Shunfang Wang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
face recognition;
feature extraction;
matrix algebra;
MF2DLDA algorithm;
between-class scatter matrix;
discriminative features;
face recognition;
feature extraction;
high-dimensional small sample size problem;
image matrix;
image processing;
mean matrix;
median matrix;
two-dimensional linear discriminant analysis;
Algorithm design and analysis;
Face;
Face recognition;
Feature extraction;
Linear discriminant analysis;
Optimized production technology;
Training;
between-class scatter matrix;
face recognition;
locally wei;
53.
Big Data Analyses for Collective Opinion Elicitation in Social Networks
机译:
社交网络中大数据分析对集体意见的启发
作者:
Yingxu Wang
;
Wiebe Victor J.
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Big Data;
cloud computing;
computer science;
data mining;
fuzzy set theory;
politics;
social networking (online);
Big Data analysis;
Web-based computing;
cloud computing;
cognitive informatics;
collective opinion determination;
collective opinion elicitation;
computational intelligence;
computer science;
digital democracy;
fuzzy analysis;
large-scaled data;
poll data mining;
quantitative electoral data processing;
social networks;
Algorithm design and analysis;
Benchmark testing;
Big data;
Data models;
Nominations and e;
54.
A High Speed Lossless Compression Algorithm Based on CPU and GPU Hybrid Platform
机译:
基于CPU和GPU混合平台的高速无损压缩算法
作者:
Bin Zhou
;
Hai Jin
;
Ran Zheng
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data compression;
graphics processing units;
parallel algorithms;
parallel architectures;
BZIP2 compression algorithm;
CPU;
CUDA framework;
GPU hybrid platform;
LZSS compression algorithm;
PMLZSS algorithm;
compression rate;
dictionary strings;
high speed lossless data compression algorithm;
parallel matching Lempel-Ziv-Storer-Szymanski algorithm;
paralleled matrix matching;
preread strings;
serial LZSS;
Algorithm design and analysis;
Compression algorithms;
Data compression;
Dictionaries;
Graphics processing units;
55.
A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform
机译:
一种基于DAA的轻量级匿名移动购物方案,用于可信移动平台
作者:
Bo Yang
;
Dengguo Feng
;
Yu Qin
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Internet;
electronic commerce;
mobile computing;
public key cryptography;
retail data processing;
DAA;
ECC-DAA schemes;
Trust Zone;
central trusted party;
e-commerce platform;
elliptic curve based DAA;
lightweight anonymous mobile shopping scheme;
mobile applications;
mobile device manufacturer;
mobile platforms;
purchasing anonymity;
sensitive data management;
trusted mobile platform;
Computer architecture;
Cryptography;
Kernel;
Mobile communication;
Mobile handsets;
Privacy;
TPM;
TrustZone;
mobile platform;
mobile shopp;
56.
Data Interface All-iN-A-Place (DIANA) for Big Data
机译:
大数据的数据接口全功能(DIANA)
作者:
Wang Frank Z.
;
Dimitrakos Theo
;
Na Helian
;
Sining Wu
;
Yuhui Deng
;
Ling Li
;
Yates Rodric
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Big Data;
Unix;
cloud computing;
electronic data interchange;
indexing;
storage management;
DIANA-based cloud storage system;
POSIX;
data interface all-in-a-place;
data types;
data-accessing interfaces;
database systems;
dynamic multistream-multipath engine;
file systems;
indexing;
large volume big data accessing operations;
portable operating system interface;
Big data;
Educational institutions;
File systems;
Indexes;
Kernel;
Standards;
big data;
database systems;
file systems;
service-oriented architecture;
variety;
velo;
57.
Adding Privacy to Multicast DNS Service Discovery
机译:
为多播DNS服务发现添加隐私
作者:
Kaiser Daniel
;
Waldvogel Marcel
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Internet;
Internet telephony;
data privacy;
electronic messaging;
local area networks;
public domain software;
Apple Bonjour;
VoIP;
Zeroconf;
device synchronization;
instant messaging;
local networks;
mDNS-SD privacy extension;
multicast DNS service discovery;
network configuration;
open-source Avahi daemon;
privacy extension;
privacy problems;
public exposure;
screen sharing;
service distribution;
Data privacy;
Encryption;
IP networks;
Ports (Computers);
Privacy;
Receivers;
DNS;
Multicast;
Privacy;
Service Discovery;
58.
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features
机译:
结合本地和全局特征的基于视觉相似度的反网络钓鱼
作者:
Yu Zhou
;
Yongzheng Zhang
;
Jun Xiao
;
Yipeng Wang
;
Weiyao Lin
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Web sites;
computer crime;
feature extraction;
HTML contents;
Internet service provider;
Web page image;
credit card numbers;
fake Web page;
global features;
image level;
large-scale dataset;
legitimate target Web page;
local features;
nontext phishing tricks;
online transaction security;
passwords;
personal sensitive information stealing;
phishing attacks;
protected Web page;
snapshot image pair;
suspected Web page;
target logo detection;
true negative rate;
true positive rate;
user privacy protection;
visual character;
59.
On the Application and Performance of MongoDB for Climate Satellite Data
机译:
MongoDB在气候卫星数据中的应用和性能
作者:
Ameri Parinaz
;
Grabowski Udo
;
Meyer Jorg
;
Streit Achim
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
SQL;
artificial satellites;
distributed databases;
file organisation;
geophysics computing;
multi-threading;
NoSQL database MongoDB;
climate satellite data;
distributed databases;
file hierarchies;
meta-data search;
multithreaded approach;
single-threaded approach;
Atmospheric measurements;
Databases;
Extraterrestrial measurements;
Instruction sets;
Meteorology;
Satellites;
Servers;
MongoDB;
MySQL;
NoSQL;
geospatial;
performance;
60.
FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing
机译:
FEACS:一种灵活高效的云计算访问控制方案
作者:
Yu Zhang
;
Jing Chen
;
Ruiying Du
;
Lan Deng
;
Yang Xiang
;
Qing Zhou
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
authorisation;
cloud computing;
cryptography;
decision making;
network servers;
outsourcing;
FEACS;
IT industry;
attribute-based encryption;
cloud computing;
cloud environment;
data security;
data sharing confidentiality;
decisional bilinear Diffie-Hellman assumption;
fine-grained access control;
flexible and efficient access control scheme;
full logic expression;
sensitive data outsourcing;
untrusted cloud servers;
Access control;
Cloud computing;
Encryption;
Games;
Registers;
attribute-based encryption;
cloud computin;
61.
VALID: A Web Framework for Visual Analytics of Large Streaming Data
机译:
有效:用于大型流数据的可视化分析的Web框架
作者:
Chenhui Li
;
Baciu George
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Big Data;
Internet;
client-server systems;
data analysis;
data visualisation;
interactive systems;
media streaming;
Big Data visualization;
VALID;
Web framework;
data streaming generator model;
dynamic data visualization;
interactive visualization;
server-client model;
streaming architecture;
visual analytics;
Conferences;
Privacy;
Security;
big data;
dynamic visualization;
streaming data;
visual analytics;
62.
Privacy Aware Non-linear Support Vector Machine for Multi-source Big Data
机译:
多源大数据的隐私感知非线性支持向量机
作者:
Yunmei Lu
;
Phoungphol Piyaphol
;
Yanqing Zhang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
approximation theory;
data privacy;
matrix algebra;
support vector machines;
Nystrom low-rank approximation;
PAN-SVM classifier;
assembling datasets;
cutting plane technique;
distributed data sources;
global SVM classifier;
kernel matrix decomposition techniques;
multiple databases;
multisource big data;
privacy aware nonlinear support vector machine;
secure sum protocol;
Accuracy;
Data models;
Data privacy;
Distributed databases;
Kernel;
Support vector machines;
Training;
Cutting-plane Method;
Distributed data-mining;
63.
Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager
机译:
面向消费者的协作和无处不在的可信服务经理
作者:
Akram Raja Naeem
;
Markantonakis Kostantinos
;
Sauveron Damien
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
near-field communication;
protocols;
smart cards;
telecommunication computing;
telecommunication security;
trusted computing;
CO-TSM;
ICOM;
NFC-based smart card;
UCOM;
collaborative consumer oriented trusted service manager;
contactless smart card;
issuer centric smart card ownership model;
multiapplication smart card initiative;
near field communication;
secure channel protocol;
ubiquitous consumer oriented trusted service manager;
user centric smart card ownership model;
Collaboration;
Industries;
Mobile communic;
64.
A Study on Recursive Neural Network Based Sentiment Classification of Sina Weibo
机译:
基于递归神经网络的新浪微博情感分类研究
作者:
Chen Fu
;
Bai Xue
;
Zhan Shaobin
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
neural nets;
social networking (online);
Sina Weibo messages sentiment;
branding;
customer relationship management;
online marketing;
public opinion monitoring;
recursive neural network;
sentiment classification model;
sentiment dictionary;
Analytical models;
Computational linguistics;
Neural networks;
Semantics;
Support vector machine classification;
Syntactics;
Vectors;
Word2vec;
autoencoder;
recursive neural network;
sentiment analysis;
65.
Ultra High-Speed SM2 ASIC Implementation
机译:
超高速SM2 ASIC实现
作者:
Zhenwei Zhao
;
Guoqiang Bai
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
CMOS logic circuits;
application specific integrated circuits;
multiplying circuits;
pipeline processing;
public key cryptography;
CMOS standard cell library;
SCA-256 prime field;
high-performance elliptic curve cryptographic architecture;
one cycle full precision multiplier;
size 0.13 mum;
two stage pipeline;
ultrahigh speed SM2 ASIC;
Algorithm design and analysis;
Computer architecture;
Elliptic curve cryptography;
Elliptic curves;
Jacobian matrices;
Optimization;
Pipelines;
ASIC;
Elliptic Curve Cryptography;
High;
66.
A Semantic Knowledge Base Construction Method for Information Security
机译:
信息安全的语义知识库构建方法
作者:
Yuangang Yao
;
Xiaoyu Ma
;
Hui Liu
;
Jin Yi
;
Xianghui Zhao
;
Lin Liu
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
knowledge based systems;
ontologies (artificial intelligence);
risk analysis;
security of data;
formal semantic model;
information security analysis;
information security knowledge base construction;
information security knowledge base development;
information technology;
knowledge entities;
ontology construction processes;
ontology knowledge base construction method;
risk evaluation;
security analysis applications;
security management applications;
semantic knowledge base construction method;
shareable semanti;
67.
Crowd Sensing of Urban Emergency Events Based on Social Media Big Data
机译:
基于社交媒体大数据的城市突发事件的人群感知
作者:
Zheng Xu
;
Hui Zhang
;
Yunhuai Liu
;
Lin Mei
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Big Data;
emergency services;
geographic information systems;
social networking (online);
GIS based annotation;
crowd sensing;
real-time detection;
social media Big Data;
urban emergency events;
Cities and towns;
Event detection;
Fires;
Media;
Real-time systems;
Sensors;
Twitter;
big data;
crowd sensing;
emergency events;
social media;
urban computing;
68.
Efficient Traceable Attribute-Based Signature
机译:
高效的可追踪的基于属性的签名
作者:
Shenglong Ding
;
Yiming Zhao
;
Yuyang Liu
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data privacy;
digital signatures;
TABS;
malicious signature;
privacy;
q-augmented Diffie-Hellman exponent assumption;
selective predicate security model;
signing predicate;
traceable attribute-based signature;
unforgeability;
Cryptography;
Educational institutions;
Generators;
Privacy;
Syntactics;
Vectors;
Access Structure;
Attribute-Based Signature;
Existential Unforgeability;
Privacy;
Selective Predicate Model;
Traceability;
69.
Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN
机译:
WSN中基于Count-Min Sketch的异常检测方案分析
作者:
Guorui Li
;
Ying Liu
;
Ying Wang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
security of data;
telecommunication security;
wireless sensor networks;
WSN;
anomaly data value detection;
count-min sketch based anomaly detection scheme;
higher detection accuracy ratio;
lower false alarm ratio;
sensor nodes;
wireless sensor network;
Accuracy;
Clustering algorithms;
Correlation;
Energy consumption;
Partitioning algorithms;
Wireless communication;
Wireless sensor networks;
anomaly detection;
count-min sketch;
security;
wireless sensor network;
70.
On Energy Efficient Scheduling and Load Distribution Based on Renewable Energy for Wireless Mesh Network in Disaster Area
机译:
基于可再生能源的灾区无线网状网络高效节能调度与负荷分配
作者:
Meng Li
;
Nishiyama Hiroki
;
Owada Yasunori
;
Hamaguchi Kiyoshi
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
emergency management;
energy harvesting;
integer programming;
linear programming;
load distribution;
telecommunication power supplies;
tree searching;
wireless mesh networks;
MILP problem;
REBS;
WMN;
branch-and-bound algorithm;
communication interruption;
disaster area;
energy consumption;
energy usage;
load distribution;
maximal network throughput;
network data distribution;
post-disaster recovery;
power shortage;
renewable energy;
renewable energy-enabled base station;
throughput-maximization problem;
two-stage energ;
71.
Modeling of Data Provenance on Space and Time Based on OPM
机译:
基于OPM的时空数据源建模
作者:
Kang Jiehua
;
Xu Guoyan
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data handling;
information retrieval systems;
query processing;
OPM;
archiving;
credibility verification;
data application;
data deduction;
data management;
data provenance;
data query;
description model;
modeling;
open provenance model;
space provenance information;
Analytical models;
Cognition;
Computational modeling;
Data models;
Process control;
Semantics;
Water conservation;
Annotation Model;
Data Provenance;
Spatial;
Time;
72.
Data Mining Application of Decision Trees for Student Profiling at the Open University of China
机译:
开放大学学生分析中决策树的数据挖掘应用
作者:
Fok Wilton W. T.
;
Haohua Chen
;
Jiaqu Yi
;
Sizhe Li
;
Au Yeung H.H.
;
Wang Ying
;
Liu Fang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
computer aided instruction;
data mining;
decision trees;
distance learning;
educational institutions;
teaching;
Open University of China;
data mining application;
decision tree algorithm;
distance education institution;
educational data analysis;
online teaching improvement;
rule classification;
student achievement data analysis;
student profiling;
Algorithm design and analysis;
Classification algorithms;
Data mining;
Data visualization;
Decision trees;
Educational institutions;
MDL;
Student profiling;
decision tree;
e;
73.
A Novel Feature Selection Approach for Intrusion Detection Data Classification
机译:
一种新的入侵检测数据分类特征选择方法
作者:
Ambusaidi Mohammed /A/.
;
Xiangjian He
;
Zhiyuan Tan
;
Nanda Priyadarsi
;
Liang Fu Lu
;
Nagar Upasana T.
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
feature selection;
filtering theory;
least squares approximations;
pattern classification;
security of data;
support vector machines;
IDS;
LSSVM;
feature selection approach;
filter selection process;
intrusion detection data classification;
least square support vector machine;
wrapper selection process;
Accuracy;
Feature extraction;
Intrusion detection;
Mutual information;
Redundancy;
Support vector machines;
Training;
Feature selection;
Floating search;
Intrusion detection;
Least square support vector machines;
Mutual;
74.
Data-centric Rogue Node Detection in VANETs
机译:
VANET中以数据为中心的恶意节点检测
作者:
Zaidi Kamran
;
Milojevic Milos
;
Rakocevic Veselin
;
Rajarajan Muttukrishnan
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cooperative communication;
cryptography;
electronic data interchange;
fault tolerant computing;
telecommunication security;
traffic information systems;
vehicular ad hoc networks;
VANET;
cooperative data exchange;
cryptography;
data centric rogue node detection;
emergency messages;
false data injection;
fault tolerance;
traffic information systems;
vehicular ad hoc networks;
vehicular technology;
Accidents;
Cryptography;
Roads;
Vehicles;
Vehicular ad hoc networks;
Security;
VANETs;
ad-hoc;
cryptography;
fault tolerance;
v;
75.
Detection of Android Malicious Apps Based on the Sensitive Behaviors
机译:
基于敏感行为的Android恶意应用检测
作者:
Daiyong Quan
;
Lidong Zhai
;
Fan Yang
;
Peng Wang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Android (operating system);
feature extraction;
invasive software;
mobile computing;
API calls;
Android Malicious Apps detection;
Android malware;
behavior-based malware detection technique;
feature extraction;
high-level application-specific behaviors;
low-level OS-specific behaviors;
native code dynamic execution;
sensitive behaviors;
smart phones;
system calls;
Androids;
Feature extraction;
Humanoid robots;
Malware;
Monitoring;
Smart phones;
Vectors;
Android;
Malware detection;
Sensitive behavior feature vector;
76.
JVM-Based Dynamic Attestation in Cloud Computing
机译:
云计算中基于JVM的动态证明
作者:
Haihe Ba
;
Zhiying Wang
;
Jiangchun Ren
;
Huaizhe Zhou
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Java;
cloud computing;
risk management;
trusted computing;
virtual machines;
DTEM;
JVM-based dynamic attestation;
Java virtual machine;
cloud computing;
cloud platform;
integrity proof;
remote attestation;
trust risk;
trusted computing;
trusted-degree estimate;
unchartered cloud threats;
Cloud computing;
Computer architecture;
Fingerprint recognition;
Java;
Loading;
Runtime;
Security;
DTEM;
JVM;
cloud computing;
dynamic remote attestation;
trusted computing;
77.
Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments
机译:
基于微内核的运行时环境的完整性验证和远程二进制文件的安全加载
作者:
Weiss Michael
;
Wagner Steffen
;
Hellman Roland
;
Wessel S.
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Android (operating system);
data integrity;
operating system kernels;
program verification;
software architecture;
trusted computing;
ARM-based developer boards;
Android;
GNU;
IMA;
L4/Fiasco.OC;
L4Re loader service;
Linux-based systems;
TCB reduction;
TPM;
code size;
integrity measurement architecture;
integrity verification mechanism;
microkernel-based runtime environments;
microkernel-based system architecture;
nonessential software components;
operating system;
performance analysis;
secure remote binary loading;
sec;
78.
Integrity Levels: A New Paradigm for Protecting Computing Systems
机译:
完整性级别:保护计算系统的新范例
作者:
Jenkins Christipher
;
Pierson Lyndon
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
authorisation;
data integrity;
data privacy;
invasive software;
operating system kernels;
trusted computing;
OS kernel;
computer platforms;
computer system behavior;
computer system functionality;
computing system protection;
data access;
data accessibility;
data storage;
data vulnerabilities;
functionality degradation;
integrity levels;
integrity risk;
malware attacks;
operating system kernel;
rootkit;
security anomalies;
security policy specification;
system integrity;
ubiquitous connectivity;
Computational modeling;
C;
79.
Personal Data Access Based on Trust Assessment in Mobile Social Networking
机译:
移动社交网络中基于信任评估的个人数据访问
作者:
Zheng Yan
;
Xueyun Li
;
Kantola Raimo
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
authorisation;
cloud computing;
mobile computing;
social networking (online);
trusted computing;
CSP;
cloud computing;
cloud service provider;
mobile social networking;
trust assessment;
trustworthy personal data access control;
Access control;
Complexity theory;
Context;
Cryptography;
Mobile communication;
Mobile computing;
Social network services;
Trust;
access control;
cloud computing;
reputation;
social networking;
trust assessment;
80.
Towards Policy Retrieval for Provenance Based Access Control Model
机译:
基于源的访问控制模型的策略检索
作者:
Jisheng Pei
;
Xiaojun Ye
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Big Data;
authorisation;
information retrieval;
PBAC policy retrieval research;
PBAC rules;
access control mechanism;
baseline retrieval;
big data applications;
candidate classification features;
candidate rules;
decision tree classifier;
provenance based access control model;
provenance based security policies;
provenance entity types;
Access control;
Big data;
Data mining;
Decision trees;
Manuals;
Training;
Access Control;
Big Data;
Data Provenance;
Policy Retrieval;
Provenance Based Access Control;
81.
A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks
机译:
移动自组织网络的高性能分布式证书吊销方案
作者:
Chongxian Guo
;
Huaqiang Xu
;
Lei Ju
;
Zhiping Jia
;
Jihai Xu
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
mobile ad hoc networks;
telecommunication security;
MANET;
high-performance distributed certificate revocation scheme;
malicious nodes;
mobile ad hoc networks;
Accuracy;
Communication networks;
Educational institutions;
Mobile ad hoc networks;
Mobile computing;
Security;
accusation function;
certificate revocation;
mobile ad hoc networks (MANETs);
trust;
82.
A Practically Optimized Implementation of Attribute Based Cryptosystems
机译:
基于属性的密码系统的实用优化实现
作者:
Chunqiang Hu
;
Fan Zhang
;
Tao Xiang
;
Hongjuan Li
;
Xiao Xiao
;
Guilin Huang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
authorisation;
optimisation;
public key cryptography;
ABE;
LSSS matrix;
access structures;
attribute based cryptosystems;
decentralized attribute based encryption scheme optimization;
decryption operation;
encryption computational cost;
encryption operation;
fine-grained access control;
linear secret-sharing scheme;
multipairing;
offline pool tuples;
optimized implementation;
real-time operation improvement;
real-time optimization technique evaluation;
receiver end;
scalar multiplication preprocessing;
scalar pairi;
83.
Defensor: Lightweight and Efficient Security-Enhanced Framework for Android
机译:
Defensor:适用于Android的轻巧高效的安全性增强框架
作者:
Xuerui Pan
;
Yibing Zhongyang
;
Zhi Xin
;
Bing Mao
;
Hao Huang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Android (operating system);
invasive software;
operating system kernels;
Android platform;
Defensor;
Linux kernel;
TCB;
context-based information;
high level behaviors;
limited security protection;
malicious behaviors;
malicious native code;
malware detection;
security-enhanced framework;
system calls;
system-wide lightweight inspecting framework;
Androids;
Humanoid robots;
Kernel;
Malware;
Monitoring;
Smart phones;
Malware;
framework;
monitor;
system call;
84.
Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain
机译:
在JPEG2000压缩域中使用指纹和加密来保护社交网络中的多媒体大数据安全共享
作者:
Conghuan Ye
;
Zenggang Xiong
;
Yaoming Ding
;
Jiping Li
;
Guangwei Wang
;
Xuemin Zhang
;
Kaibing Zhang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Big Data;
cryptography;
data compression;
data protection;
image coding;
multimedia computing;
social networking (online);
transforms;
JPEG2000 coding;
JPEG2000 compressed domain;
TSH transform;
fingerprint code;
fingerprinting;
hierarchical community structure;
homomorphic encryption;
hybrid multicast-unicast;
media distribution protection;
secure multimedia big data sharing;
social network analysis;
tree-structured Harr transform;
Communities;
Encryption;
Multimedia communication;
Social network services;
Transforms;
85.
Private Outsourcing of Polynomial Functions
机译:
多项函数的私人外包
作者:
Peili Li
;
Haixia Xu
;
Jiaqi Hong
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data privacy;
outsourcing;
polynomials;
public key cryptography;
computational weak client;
outsourced data privacy;
polynomial functions;
private outsourcing computation scheme;
public key;
verification process;
verify-method;
Data privacy;
Encryption;
Outsourcing;
Polynomials;
Servers;
Zinc;
correctness;
outsourcing computation;
privacy;
public verification;
86.
ToAuth: Towards Automatic Near Field Authentication for Smartphones
机译:
ToAuth:面向智能手机的自动近场身份验证
作者:
Weixi Gu
;
Zheng Yang
;
Longfei Shangguan
;
Xiaoyu Ji
;
Yiyang Zhao
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Android (operating system);
cryptography;
smart phones;
user interfaces;
Android platform;
ToAuth;
automatic near field authentication;
cryptographic keys;
random vibration patterns;
smartphones;
user assistance;
Acceleration;
Authentication;
Engines;
Force;
Image edge detection;
Smart phones;
Vibrations;
87.
One Kind of Cross-Domain DAA Scheme from Bilinear Mapping
机译:
一种基于双线性映射的跨域DAA方案
作者:
Xiaoming Wang
;
Heyou Cheng
;
Ruihua Zhang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data privacy;
digital signatures;
trusted computing;
CL-LRSW signature;
TCG organization;
bilinear mapping;
cross-domain DAA scheme;
direct anonymous attestation;
platform masquerading attacks;
platform privacy;
remote trusted computing platform;
unidirectional authentication security flaws;
Authentication;
Computer science;
Conferences;
Privacy;
Public key;
Resists;
bilinear;
cross domain;
direct anonymous;
88.
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation
机译:
针对Dalvik字节码混淆的Android反恶意软件技术评估
作者:
Faruki Parvez
;
Bharmal Ammar
;
Laxmi V.
;
Gaur M.S.
;
Conti Marco
;
Rajarajan Muttukrishnan
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Android (operating system);
invasive software;
source code (software);
statistical analysis;
AndroSimilar robust statistical feature signature evaluation;
Androguard code similarity resilience evaluation;
Android antimalware technique evaluation;
Android mobile devices;
Dalvik bytecode obfuscation identifies;
Dalvik bytecode transformation methods;
antimalware technique resilience;
antimalware technique testing;
code obfuscated malware;
code wrapping;
register renaming;
variable compression;
Androids;
Google;
Hum;
89.
Garbling in Reverse Order
机译:
反向颠倒
作者:
Meskanen Tommi
;
Niemi Valtteri
;
Nieminen Noora
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cryptography;
adaptivity;
garbled circuits;
garbling practicality;
network-based solutions;
networked computing;
reusability;
security concepts;
Adaptation models;
Encryption;
Games;
Integrated circuit modeling;
Privacy;
adaptive security;
garbling schemes;
reusability;
secure multiparty computations;
90.
An Improved Image File Storage Method Using Data Deduplication
机译:
一种使用重复数据删除的改进的图像文件存储方法
作者:
Zhou Lei
;
Zhaoxin Li
;
Yu Lei
;
Yanling Bi
;
Luokai Hu
;
Wenfeng Shen
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cloud computing;
image segmentation;
meta data;
visual databases;
data deduplication;
fingerprint library;
fixed-size block image segmentation method;
image file blocks;
image file fingerprint;
image file storage method;
metadata format;
modified fixed-size block scheme;
transmission time reduction;
Educational institutions;
Fingerprint recognition;
Image storage;
Libraries;
Operating systems;
Servers;
Virtual machining;
cloud computing;
data deduplication;
image files;
91.
The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack
机译:
分支预测分析攻击的微架构支持对策
作者:
Ya Tan
;
Jizeng Wei
;
Wei Guo
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data protection;
program compilers;
public key cryptography;
BPA attack;
BTB;
ECC;
RSA;
antiBPA attack scheme;
architectural support scheme;
branch prediction analysis attack;
branch target buffers;
commodity PC platform;
conditional branch;
conditional branch loophole;
cryptography algorithms;
encryption process;
key-centric sequence;
legitimate spy-process;
lock-based BTB scheme;
microarchitectural side-channel analysis attacks;
microarchitectural support countermeasures;
security key bits;
software-based methods;
w;
92.
SigmoRep: A Robust Reputation Model for Open Collaborative Environments
机译:
SigmoRep:开放式协作环境的稳健声誉模型
作者:
Kardan Ahmad
;
Salarmehr Reza
;
Farshad Azade
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Internet;
Web sites;
encyclopaedias;
groupware;
innovation management;
open systems;
SigmoRep;
Wikipedia articles;
artworks;
author reputation values;
collaborative Web applications;
collaborative information repositories;
constructive behaviors;
controlled influence function;
encyclopedias;
innovative reputation svstem;
learning-objects;
malicious users;
open collaborative environments;
robust reputation model;
trust system;
untrusted users;
Bismuth;
Conferences;
Privacy;
Security;
Open Collaboration;
Reputation System;
T;
93.
A Stateful Mechanism for the Tree-Rule Firewall
机译:
树规则防火墙的状态机制
作者:
Chomsiri Thawatchai
;
Xiangjian He
;
Nanda Priyadarsi
;
Zhiyuan Tan
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Linux;
firewalls;
IPTABLES;
Linux Cent OS 6.3;
Netfilter ConnTrack module;
Netfilter model;
connection tracking mechanism;
designated tree structure;
firewall rules;
generation commercial;
hashing bits;
memory space;
open source firewalls;
stateful mechanism;
tree-rule firewall model;
Computational modeling;
Filtering;
Firewalls (computing);
IP networks;
Memory management;
Ports (Computers);
Connection Tracking;
Firewall;
Network Security;
Stateful firewall;
Tree-rule firewall;
94.
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security
机译:
基于AHP的量化和比较云安全性的量化方法
作者:
Taha Ahmed
;
Trapero Ruben
;
Luna Jesus
;
Suri Neeraj
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
analytic hierarchy process;
cloud computing;
contracts;
security of data;
trusted computing;
AHP-based quantitative approach;
CSP;
SecLA;
analytic hierarchy process;
cloud security;
cloud security alliance;
cloud service level agreements;
cloud service provider;
cloud usage;
security SLA;
security trust and assurance registry;
Analytic hierarchy process;
Benchmark testing;
Europe;
Measurement;
Privacy;
Security;
95.
A Evaluation Method for Web Service with Large Numbers of Historical Records
机译:
具有大量历史记录的Web服务的评估方法
作者:
Lianyong Qi
;
Jiancheng Ni
;
Xiaona Xia
;
Chao Yan
;
Hua Wang
;
Wanli Huang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Web services;
quality of service;
QoS data;
Web service evaluation method;
Web service providers;
historical QoS records;
lagging effect;
network environment;
partial historical record-based service evaluation method;
partial-HR;
quality of service data;
service composition;
subsequent service selection;
Accuracy;
Equations;
Mathematical model;
Proposals;
Quality of service;
Time complexity;
Web services;
historical QoS record;
large numbers;
quality evaluation;
web service;
96.
A Load Balancing Strategy of SDN Controller Based on Distributed Decision
机译:
基于分布式决策的SDN控制器负载均衡策略
作者:
Yuanhao Zhou
;
Mingfa Zhu
;
Limin Xiao
;
Li Ruan
;
Wenbo Duan
;
Deguo Li
;
Rui Liu
;
Mingming Zhu
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Internet;
centralised control;
distributed control;
floodlighting;
lighting control;
resource allocation;
software defined networking;
DALB;
Open Flow;
SDN controller;
adaptive algorithm;
adjustable load collection threshold;
centralized controller;
decision delay reduction;
distributed architecture;
distributed controllers;
distributed decision;
dynamic algorithm;
election locality;
floodlight;
future Internet;
load balancing strategy;
load collection;
network transmission;
policy locality;
software-defined networking;
97.
Modeling Degrees of Fairness for Collaborations
机译:
协作公平程度的建模
作者:
Volk Florian
;
Pelevina Maria
;
Habib Sheikh Mahbub
;
Hauke Sascha
;
Muhlhauser Max
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
retail data processing;
binary fairness model;
business collaboration;
degree modeling;
distributing revenue;
e-business retailing;
fair future behavior;
formal reasoning;
open-ended fund;
Adaptation models;
Collaboration;
Investment;
Resource management;
Semantics;
Vectors;
collaboration;
degrees of fairness;
distribution of revenue;
gradual fairness;
98.
Detect Android Malware Variants Using Component Based Topology Graph
机译:
使用基于组件的拓扑图检测Android恶意软件变体
作者:
Tong Shen
;
Yibing Zhongyang
;
Zhi Xin
;
Bing Mao
;
Hao Huang
会议名称:
《》
|
2014年
关键词:
graph theory;
invasive software;
program testing;
smart phones;
Android Malware Genome Project;
Android components;
Android malware variants detection;
component based topology graph;
malicious payloads;
obfuscated malware;
security tools;
stress test;
Androids;
Humanoid robots;
Malware;
Payloads;
Receivers;
Smart phones;
Topology;
component;
malware;
obfuscation;
topology graph;
99.
Automated User Profiling in Location-Based Mobile Messaging Applications
机译:
基于位置的移动消息应用程序中的自动用户配置文件
作者:
Yao Cheng
;
Chang Xu
;
Yi Yang
;
Lingyun Ying
;
Purui Su
;
Dengguo Feng
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data privacy;
electronic messaging;
inference mechanisms;
mobile computing;
protocols;
reverse engineering;
social networking (online);
telecommunication security;
LMA;
automated user profiling;
based instant messaging;
geographical locations;
life profile;
location-based mobile messaging applications;
mobile devices;
people nearby;
personal information;
protocol reverse engineering;
social ties;
spatio-temporal privacy leakage;
Clustering algorithms;
Data mining;
Educational institutions;
Mobile communication;
Mobile;
100.
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps
机译:
AppCaulk:通过向Android应用程序注入目标污点跟踪来防止数据泄漏
作者:
Schutte Julian
;
Titze Dennis
;
de Fuentes J.M.
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Android (operating system);
authorisation;
middleware;
Android apps;
Android middleware;
AppCaulk;
Taintdroid;
business domain;
business-critical information leaks;
context-insensitive Android permission model;
critical data flows;
data leak blockage;
data leak detection;
data leak prevention;
data propagation paths;
dynamic taint analysis;
information flow blockage;
information flow policies;
information flow tracking;
personal information leaks;
register level;
static taint analysis;
stock Android installation;
tain;
意见反馈
回到顶部
回到首页