default search action
12th SpaCCS 2019: Atlanta, GA, USA
- Guojun Wang, Jun Feng, Md. Zakirul Alam Bhuiyan, Rongxing Lu:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14-17, 2019, Proceedings. Lecture Notes in Computer Science 11611, Springer 2019, ISBN 978-3-030-24906-9 - Yevhenii Semenko, Damien Saucez:
Distributed Privacy Preserving Platform for Ridesharing Services. 1-14 - Anjali Kumari, Md. Zakirul Alam Bhuiyan, Jigyasa Namdeo, Shipra Kanaujia, Ruhul Amin, Satyanarayana Vollala:
Ransomware Attack Protection: A Cryptographic Approach. 15-25 - Priyanka Mall, Md. Zakirul Alam Bhuiyan, Ruhul Amin:
A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function. 26-35 - Han Lee, Maode Ma:
Blockchain-Based Mobility Management for LTE and Beyond. 36-49 - Lanlan Pan, Jie Chen, Anlei Hu, Xuebiao Yuchi:
EPT: EDNS Privacy Tunnel for DNS. 50-62 - Abdulwahab Alazeb, Brajendra Panda:
Ensuring Data Integrity in Fog Computing Based Health-Care Systems. 63-77 - Amara Naseer, Zhiqui Huang, Awais Ali:
Modelling Security Requirements for Software Development with Common Criteria. 78-88 - Yasir F. Mohammed, Dale R. Thompson:
Visualization of DNS Tunneling Attacks Using Parallel Coordinates Technique. 89-101 - Lena Ara, Xiao Luo:
A Data-Driven Network Intrusion Detection Model Based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection. 102-116 - Tze Chiang Tin, Saw Chin Tan, Ching Kwang Lee, Y. Zulfadzli, K. Rizaludin:
Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning. 117-132 - Fabian Schillinger, Christian Schindelhauer:
End-to-End Encryption Schemes for Online Social Networks. 133-146 - Melodee Montgomery, Prosenjit Chatterjee, John Jenkins, Kaushik Roy:
Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data. 147-156 - Fawad Ahmad, Lee-Ming Cheng:
Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography. 157-165 - Lei Yan, Maode Ma, Yan Ma:
TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT. 166-182 - Hossain Shahriar, Md Arabin Islam Talukder, Hongmei Chi, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed, Atef Shalan, Khaled Tarmissi:
Data Protection Labware for Mobile Security. 183-195 - En Wang, Yongjian Yang, Jie Wu, Hengzhi Wang:
Multi-round Bidding Strategy Based on Game Theory for Crowdsensing Task. 196-210 - Babatunde Olabenjo, Dwight J. Makaroff:
Information Leakage in Wearable Applications. 211-224 - Mohammed S. Alshehri, Brajendra Panda:
An Encryption-Based Approach to Protect Fog Federations from Rogue Nodes. 225-243 - Yubao Wu, Fengpan Zhao, Xucan Chen, Pavel Skums, Eric L. Sevigny, David Maimon, Marie Ouellet, Monica Haavisto Swahn, Sheryl M. Strasser, Mohammad Javad Feizollahi, Youfang Zhang, Gunjan Sekhon:
Python Scrapers for Scraping Cryptomarkets on Tor. 244-260 - Xucan Chen, Mohammad Al Hasan, Xintao Wu, Pavel Skums, Mohammad Javad Feizollahi, Marie Ouellet, Eric L. Sevigny, David Maimon, Yubao Wu:
Characteristics of Bitcoin Transactions on Cryptomarkets. 261-276 - Mohammed Alrowaily, Freeh Alenezi, Zhuo Lu:
Effectiveness of Machine Learning Based Intrusion Detection Systems. 277-288 - Tasnuva Mahjabin, Yang Xiao:
DNS Flood Attack Mitigation Utilizing Hot-Lists and Stale Content Updates. 289-296 - Cheng Chi Qin, Saw Chin Tan, Ching Kwang Lee, Zulfadzli Yusoff, Rizaluddin Kaspin:
Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking. 297-308 - Ng Kean Haur, Tan Saw Chin:
Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation Industry. 309-324 - Guosheng Xu, Zhimin Wu, Chengze Li, Jinghua Yan, Jing Yuan, Zhiyong Wang, Lu Wang:
Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching. 325-335 - Martin Peters, Johannes Goltz, Simeon Wiedenmann, Thomas Mundt:
Using Machine Learning to Find Anomalies in Field Bus Network Traffic. 336-353 - Muhammad Mudassar Yamin, Basel Katt, Mazaher Kianpour:
Cyber Weapons Storage Mechanisms. 354-367 - Yucai Song, Yang Chen, Bo Lang, Hongyu Liu, Shaojie Chen:
Topic Model Based Android Malware Detection. 384-396 - Ruwei Huang, Zhikun Li, Guang Wu:
A Verifiable Encryption Scheme Supporting Fuzzy Search. 397-411 - Ruwei Huang, Zhikun Li, Jianan Zhao:
A Verifiable Fully Homomorphic Encryption Scheme. 412-426 - Aabid Rashid, Diwankshi Sharma, Tufail A. Lone, Sumeet Gupta, Sachin Kumar Gupta:
Secure Communication in UAV Assisted HetNets: A Proposed Model. 427-440 - Huaqing Lin, Gao Liu, Zheng Yan:
Detection of Application-Layer Tunnels with Rules and Machine Learning. 441-455 - Gyeong-Jin Ra, Dae-Hee Seo, Md. Zakirul Alam Bhuiyan, Im-Yeong Lee:
An Anonymous Protocol for Member Privacy in a Consortium Blockchain. 456-464 - Krishnendu Ghosh, Jeffery Mills:
Automated Construction of Malware Families. 465-474 - S. Sharmila Deva Selvi, S. Harish, Swethashree Dhanabal, C. Pandu Rangan:
A Closer Look at Anonymous Proxy Re-Encryption Schemes. 475-489 - Roni Mateless, Michael Segal:
Approximate String Matching for DNS Anomaly Detection. 490-504
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.