Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Dirar Abu-Saymeh, Dhiah el Diehn I. Abou-Tair, Ahmad Zmily |
An Application Security Framework for Near Field Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 396-403, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Burkhard Englert, Reza Gheissari |
Multivalued and Deterministic Peer-to-Peer Polling in Social Networks with Reputation Conscious Participants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 895-902, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Junrui Zhou, Hong An, Yanyan Zou, Tao Sun |
Quantitative Analysis of Inter-block Dependence in Speculative Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 991-998, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin |
iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 452-458, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad A. Alzahrani, Seng W. Loke, Hongen Lu |
Conflict and Interference Resolution for Physical Annotation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1331-1338, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shaahin Madani, Ibrahim Khalil |
Garbled Routing (GR): Towards Unification of Anonymous Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 50-57, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Min Zheng, Mingshen Sun, John C. S. Lui |
Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 163-171, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | T. Raghu Vamsi Krishna, Rajesh P. Barnwal, Soumya K. Ghosh 0001 |
MDS-Based Trust Estimation of Event Reporting Node in VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 315-320, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Domínguez, Houcine Hassan, Vicent Mayans, Alfons Crespo |
Multicore Parallel Implementation of Agent Emotional Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1856-1861, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nelcileno Virgilio de Souza Araújo, Ruy de Oliveira, Ed Wilson Tavares Ferreira, Valtemir Emerencio do Nascimento, Ailton Akira Shinoda, Bharat K. Bhargava |
Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 271-276, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aarthi Krishna, Vijay Varadharajan, Nathan Tarr |
On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 517-524, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yi-Hsueh Tsai, Yi-Ting Lin, Kanchei Loa, Tsung-Yu Tsai, Chun-Che Chien, Dun-Cheih Huang, Shiann-Tsong Sheu |
Proximity-Based Service beyond 4G Network: Peer-Aware Discovery and Communication Using E-UTRAN and WLAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1345-1350, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chuanhao Qu, Lei Ju 0001, Zhiping Jia, Huaqiang Xu, Longpeng Zheng |
Light-Weight Trust-Based On-Demand Multipath Routing Protocol for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 42-49, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dan Zhao 0002, Chunqing Wu, Xiaofeng Hu, Xiaofeng Wang 0002, Baokang Zhao |
Characterization of OSPF Convergence with Correlated Failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1351-1356, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Khurram Khan, Debiao He |
Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard". ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1708-1710, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Talal H. Noor, Quan Z. Sheng, Abdullah Alfazi |
Reputation Attacks Detection for Effective Trust Assessment among Cloud Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 469-476, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Adam Muhlbauer, Timothy Zelinsky, Salil S. Kanhere |
Platform Zero: A Context-Based Computing Platform for Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1420-1427, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Juan Li 0004, Yan Bai, Nazia Zaman |
A Fuzzy Modeling Approach for Risk-Based Access Control in eHealth Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 17-23, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Adrian J. Duncan, Sadie Creese, Michael Goldsmith, Jamie S. Quinton |
Cloud Computing: Insider Attacks on Virtual Machines during Migration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 493-500, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chen Chen 0067, Yao Wu, Joshua Suetterlein, Long Zheng 0001, Minyi Guo, Guang R. Gao |
Automatic Locality Exploitation in the Codelet Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 853-862, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Harini Ragavan, Brajendra Panda |
Mitigating Malicious Updates: Prevention of Insider Threat to Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 781-788, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chung Hwan Lee, Peter Strazdins |
An Analysis of Driver Domain Offload for Paravirtualized Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 871-878, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chi-Hsien Wang, Gwo-Jong Yu |
Power Control and Channel Assignment Mechanisms for Cluster-Based Multichannel Vehicular Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1762-1767, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vasiliki Kalavri, Vladimir Vlassov |
MapReduce: Limitations, Optimizations and Open Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1031-1038, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Soufiene Ben Othman, Abdelbasset Trad, Habib Youssef, Hani Alzaid |
Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 188-195, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mahmood A. Rashid, M. A. Hakim Newton, Md. Tamjidul Hoque, Abdul Sattar 0001 |
Collaborative Parallel Local Search for Simplified Protein Structure Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 966-973, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohd Izuan Hafez Ninggal, Jemal H. Abawajy |
Preserving Utility in Social Network Graph Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 226-232, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | João Salada, João Pedro Barreto 0002 |
TurboSockets: Democratizing Distributed Deduplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1291-1298, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Servesh Muralidharan, Kevin Casey, David Gregg |
A Parallel Runtime Framework for Communication Intensive Stream Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1179-1187, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xuyun Zhang, Chang Liu 0001, Surya Nepal, Chi Yang, Wanchun Dou, Jinjun Chen |
Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 501-508, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | M. Manzur Murshed, Tishna Sabrina, Anindya Iqbal, Mortuza Ali |
Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 798-804, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Younchan Jung, Marnel Peradilla, J. William Atwood |
Securing Domain Name System Combined with MIPv6 for Mobile Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 172-179, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Isredza Rahmi A. Hamid, Jemal H. Abawajy |
Profiling Phishing Email Based on Clustering Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 628-635, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jurairat Phuttharak, Seng W. Loke |
LogicCrowd: A Declarative Programming Platform for Mobile Crowdsourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1323-1330, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alasdair Thomason, Matthew Leeke, Matthew Bradbury, Arshad Jhumka |
Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 667-674, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tianqing Zhu, Ping Xiong 0001, Yang Xiang 0001, Wanlei Zhou 0001 |
An Effective Deferentially Private Data Releasing Algorithm for Decision Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 388-395, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan |
Determining Similar Recommenders Using Improved Collaborative Filtering in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 110-117, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Paul Robertson 0001, Robert Laddaga, Mark H. Burstein |
Trust and Adaptation in STRATUS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1711-1716, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Samer Wazan, Gregory Blanc, Hervé Debar, Joaquín García-Alfaro |
Attribute-Based Mining Process for the Organization-Based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 421-430, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Qihui Zhou, Dan Wang, Yan Zhang, Bo Qin, Aimin Yu, Baohua Zhao |
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 156-162, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake |
P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 354-361, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tao Feng 0011, Xi Zhao 0001, Bogdan Carbunar, Weidong Shi |
Continuous Mobile Authentication Using Virtual Key Typing Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1547-1552, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Miroslaw Kutylowski, Piotr Lipiak |
Disability Parking Permit - Lightweight But Trustworthy Identity Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1535-1540, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wagner Medeiros dos Santos, Ruy J. G. B. de Queiroz, Carlos E. R. Saraiva, Gleudson P. V. Junior |
Toward Coercion-Resistant End-to-End Verifiable Electronic Voting Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1696-1703, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aftab Ahmed Chandio, Cheng-Zhong Xu 0001, Nikos Tziritas, Kashif Bilal, Samee Ullah Khan |
A Comparative Study of Job Scheduling Strategies in Large-Scale Parallel Computational Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 949-957, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mingzhe Zhang, Da Wang, Xiaochun Ye, Liqiang He, Dongrui Fan, Zhiyong Liu 0002 |
A Path-Adaptive Opto-electronic Hybrid NoC for Chip Multi-processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1198-1205, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiaochen Yuan, Chi-Man Pun |
Feature Based Video Watermarking Resistant to Geometric Distortions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 763-767, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sascha Hauke, Sebastian Biedermann, Max Mühlhäuser, Dominik Heider |
On the Application of Supervised Machine Learning to Trustworthiness Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 525-534, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Apiletti, Elena Baralis, Tania Cerquitelli, Silvia Chiusano, Luigi Grimaudo |
SeaRum: A Cloud-Based Service for Association Rule Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1283-1290, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Luke Mirowski |
Exposing Clone RFID Tags at the Reader. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1669-1674, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Walid Saad, Heithem Abbes, Christophe Cérin, Mohamed Jemni |
A Data Prefetching Model for Desktop Grids and the Condor Use Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1065-1072, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hamilton A. Turner, Jules White |
Multi-core Deployment Optimization Using Simulated Annealing and Ant Colony Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1216-1223, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Guowei Wu, Jia Wang, Lin Yao 0001, Chi Lin 0001 |
A Secure Social-Aware Incentive Scheme for Delay Tolerant Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 813-820, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yiqing Hu, Yan Xiong, Xudong Gong, Qiwei Lu, Mingxi Li, Wenchao Huang |
TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1729-1734, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xuejiao Liu 0002, Yingjie Xia, Shasha Jiang, Fubiao Xia, Yanbo Wang |
Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 477-484, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tao Li 0022, Hua Li, Xuechen Liu, Shuai Zhang, Kai Wang 0001, Yulu Yang |
GPU Acceleration of Interior Point Methods in Large Scale SVM Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 863-870, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Yan 0002, Raimo Kantola, Gaowa Shi, Peng Zhang 0004 |
Unwanted Content Control via Trust Management in Pervasive Social Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 202-209, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Saeed Farooq Khan, Marius Portmann, Neil W. Bergmann |
VoIP Spam Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1463-1470, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ebenezer Paintsil |
Towards Automation of Privacy and Security Risks Analysis in Identity Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 720-727, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Peili Li, Haixia Xu 0002, Shu Guo |
Public Verification of Outsourced Computation of Polynomial Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 776-780, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chong Yan, Zhiping Jia, Lei Ju 0001, Hui Xia, Huaqiang Xu |
TimSim: A Timestep-Based Wireless Ad-Hoc Network Simulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1741-1746, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rakesh Matam, Somanath Tripathy |
AFC: An Effective Metric for Reliable Routing in Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 73-80, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ming Xiang, William Liu, Quan Bai |
TIGER: A Trust-based Intelligent Geographical Energy-aware Routing for Smart Grid Communication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 65-72, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wang, Ruihua Zhang, Zhongwei Chen, Lei Ju 0001 |
Normal Vector Based Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1339-1344, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Udaya Kiran Tupakula, Vijay Varadharajan |
Trust Enhanced Security Architecture for Detecting Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 552-559, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bernd Zwattendorfer, Daniel Slamanig |
Scalable and Privacy-Preserving Variants of the Austrian Electronic Mandate System in the Public Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 24-33, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Younchan Jung, Enrique Festijo |
Securing RTP Packets Using Per-Packet Selective Encryption Scheme for Real-Time Multimedia Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 659-666, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Jongwoo Bae |
Performance Optimization of Aho-Corasick Algorithm on a GPU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1143-1152, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sancheng Peng, Guojun Wang 0001, Shui Yu 0001 |
Modeling Malware Propagation in Smartphone Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 196-201, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Naim Asaj, Florian Schaub, Michael Müter, Albert Held, Michael Weber 0001 |
ProTACD: A Generic Privacy Process for Vehicle Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1675-1682, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jinson Zhang, Mao Lin Huang |
Visual Analytics Model for Intrusion Detection in Flood Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 277-284, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Radu Tudoran, Alexandru Costan, Gabriel Antoniu |
DataSteward: Using Dedicated Compute Nodes for Scalable Data Management on Public Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1057-1064, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zhongwei Chen, Ruihua Zhang, Lei Ju 0001, Wei Wang |
Multivalued Trust Routing Based on Topology Level for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1516-1521, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bryan Dixon, Shivakant Mishra |
Power Based Malicious Code Detection Techniques for Smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 142-149, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yunfang Tai, Wanwei Cai, Qi Liu, Ge Zhang |
KVM-Loongson: An Efficient Hypervisor on MIPS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1016-1022, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chunghan Lee, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura |
Performance Implications of Task Scheduling by Predicting Network Throughput on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1089-1098, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alex Pappachen James, Sherin Sugathan |
Parallel Realization of Cognitive Cells on Film Mammography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1873-1878, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Migault, Stéphane Sénécal, Stanislas Francfort, Emmanuel Herbert, Maryline Laurent |
PREFETCHing to Overcome DNSSEC Performance Issue on Large Resolving Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 694-703, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lazaros Kyrillidis, Keith Mayes, Boris Chazalet, Konstantinos Markantonakis |
Card-Present Transactions on the Internet Using the Smart Card Web Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 611-619, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jin Bum Hong, Dong Seong Kim 0001, Tadao Takaoka |
Scalable Attack Representation Model Using Logic Reduction Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 404-411, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wencan Wang, Xiaomeng Huang, Haohuan Fu, Yong Hu, Shizhen Xu, Guangwen Yang |
CFIO: A Fast I/O Library for Climate Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 911-918, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yinbo Liu, Xingang Liu, Zhixin Shen, Laurence T. Yang |
Fast Intra Mode Decision Algorithm Based on Spatial-Domain Energy for H.264/AVC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1357-1361, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Al Amin Hossain, Seung-Jin Lee, Eui-Nam Huh |
Shear-Based Spatial Transformation to Protect Proximity Attack in Outsourced Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1633-1638, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sheikh Mahbub Habib, Vijay Varadharajan, Max Mühlhäuser |
A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 459-468, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wenkang Wu, Zhuo Tang, Renfa Li |
On the Complexity of Authorization of Temporal RBAC in Cloud Computing Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1567-1572, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wei Zhou, Yang Xu 0013, Guojun Wang 0001 |
Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 644-650, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Octavio J. Salcedo Parra, Neil Orlando Diaz Martinez, Gustavo López Rubio |
Comparison SIP and IAX to Voice Packet Signaling over VOIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1442-1449, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yanpeng Ma, Wei Peng 0005, Xiaofeng Wang 0002, Baokang Zhao, Jinshu Su, Chunqing Wu |
A Location Management Algorithm for LEO Satellite Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1362-1366, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yong Qiao, Yuexiang Yang, Lin Ji, Chuan Tang, Jie He 0002 |
A Lightweight Design of Malware Behavior Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1607-1612, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yong Qiao, Yuexiang Yang, Lin Ji, Jie He 0002 |
Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 265-270, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ammar Alazab, Jemal H. Abawajy, Michael Hobbs, Robert Layton, Ansam Khraisat |
Crime Toolkits: The Productisation of Cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1626-1632, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fangyong Hou, Nong Xiao, Hongjun He, Fang Liu 0002, Zhiguang Chen |
Novel Physically-Embedded Data Encryption for Embedded Device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 89-93, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Roland Assam, Thomas Seidl 0001 |
A Model for Context-Aware Location Identity Preservation Using Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 346-353, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ana Ferreira 0001, Rosario Giustolisi, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini |
Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1553-1558, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael N. Johnstone, Robert Thompson |
Security Aspects of Military Sensor-Based Defence Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 302-309, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ming Zheng, Jianping Wu, Hai-Xin Duan |
Research on the Anti-attack Design Principles of Low-Latency Anonymous Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 651-658, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kashif Saleem, Mohammed Sayim Khalil, Norsheila Fisal, Adel Ali Ahmed, Mehmet Ali Orgun |
Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1662-1668, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili |
A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1620-1625, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aymen Boudguiga, Alexis Olivereau, Nouha Oualha |
Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 94-101, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Pingjian Wang, Zongbin Liu, Lei Wang 0135, Neng Gao |
High Radix Montgomery Modular Multiplier on Modern FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 1484-1489, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|