default search action
15th SecureComm 2019: Orlando, FL, USA
- Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen:
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 305, Springer 2019, ISBN 978-3-030-37230-9
Deep Analytics
- Kun Du, Hao Yang, Zhou Li, Hai-Xin Duan, Shuang Hao, Baojun Liu, Yuxiao Ye, Mingxuan Liu, XiaoDong Su, Guang Liu, Zhifeng Geng, Zaifeng Zhang, Jinjin Liang:
TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams. 3-25 - Yu Liu, Matthew R. Squires, Curtis R. Taylor, Robert J. Walls, Craig A. Shue:
Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks. 26-46 - Raquel Alvarez, Jake Levenson, Ryan Sheatsley, Patrick D. McDaniel:
Application Transiency: Towards a Fair Trade of Personal Information for Application Services. 47-66 - Yurong Chen, Tian Lan, Guru Venkataramani:
CustomPro: Network Protocol Customization Through Cross-Host Feature Analysis. 67-85
Systematic Theory
- Xinying Wu, Yuan Ma, Jing Yang, Tianyu Chen, Jingqiang Lin:
On the Security of TRNGs Based on Multiple Ring Oscillators. 89-107 - Keke Hu, Xiaohui Zhang, Yongming Wang:
Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted Relay. 108-125 - Jing Hou, Li Sun, Tao Shu, Husheng Li:
Target Information Trading - An Economic Perspective of Security. 126-145 - Sharif Ullah, Sachin Shetty, Anup Nayak, Amin Hassanzadeh, Kamrul Hasan:
Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System. 146-160
Bulletproof Defenses
- Ali Al-Hashimi, Pratham Oza, Ryan M. Gerdes, Thidapat Chantem:
The Disbanding Attack: Exploiting Human-in-the-Loop Control in Vehicular Platooning. 163-183 - Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang:
Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy. 184-204 - Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles A. Kamhoua:
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework. 205-223 - Ralph Palutke, Andreas Neubaum, Johannes Götzfried:
SEVGuard: Protecting User Mode Applications Using Secure Encrypted Virtualization. 224-242
Blockchains and IoT
- Xuetao Wei, Can Lu, Fatma Rana Ozcan, Ting Chen, Boyang Wang, Di Wu, Qiang Tang:
A Behavior-Aware Profiling of Smart Contracts. 245-258 - Feng Zhu, Peisong Shen, Chi Chen:
A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris Trait. 259-272 - Yunsen Lei, Craig A. Shue:
Detecting Root-Level Endpoint Sensor Compromises with Correlated Activity. 273-286 - Montida Pattaranantakul, Qipeng Song, Yanmei Tian, Licheng Wang, Zonghua Zhang, Ahmed Meddahi:
Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV. 287-301
Security and Analytics
- Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan:
Hecate: Automated Customization of Program and Communication Features to Reduce Attack Surfaces. 305-319 - Edona Fasllija, Hasan Ferit Eniser, Bernd Prünster:
Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs. 320-334 - Abhishek Tiwari, Sascha Groß, Christian Hammer:
IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications. 335-349 - Jing Ge, An Wang, Liehuang Zhu, Xin Liu, Ning Shang, Guoshuang Zhang:
Power Analysis and Protection on SPECK and Its Application in IoT. 350-362
Machine Learning, Privately
- Tian Liu, Tao Shu:
Adversarial False Data Injection Attack Against Nonlinear AC State Estimation with ANN in Smart Grid. 365-379 - Robert Podschwadt, Hassan Takabi:
On Effectiveness of Adversarial Examples and Defenses for Malware Classification. 380-393 - Kai He, Liu Yang, Jue Hong, Jinghua Jiang, Jieming Wu, Xu Dong, Zhuxun Liang:
PrivC - A Framework for Efficient Secure Two-Party Computation. 394-407 - Meng Li, Liehuang Zhu, Xiaodong Lin:
CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing. 408-422
Better Clouds
- Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung:
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks. 425-439 - Marwan Ali Albahar, Xing Gao, Gaby G. Dagher, Daiping Liu, Fengwei Zhang, Jidong Xiao:
A Study of the Multiple Sign-in Feature in Web Applications. 440-453 - Yuzhe Richard Tang, Kai Li, Ju Chen:
Authenticated LSM Trees with Minimal Trust. 454-471 - Alexandros Bakas, Antonis Michalas:
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX. 472-486
ATCS Workshop
- Masoud Narouei, Hassan Takabi:
A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies. 489-506
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.