default search action
14th SecureComm 2018: Singapore
- Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 255, Springer 2018, ISBN 978-3-030-01703-3
Social Network and Enterprise Security
- Yulong Dong, Jun Dai, Xiaoyan Sun:
A Mobile Botnet That Meets Up at Twitter. 3-21 - Yu Li, Dae Wook Kim, Junjie Zhang, Derek Doran:
Detecting Suspicious Members in an Online Emotional Support Service. 22-42 - Xueping Liang, Sachin Shetty, Deepak K. Tosh, Yafei Ji, Danyi Li:
Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain. 43-62 - Yahan Wang, Chunhua Wu, Kangfeng Zheng, Xiujuan Wang:
Social Bot Detection Using Tweets Similarity. 63-78
Network Security
- Mengyi Li, Chi-Hung Chi, Chen Ding, Raymond K. Wong, Zhong She:
A Multi-protocol Authentication Shibboleth Framework and Implementation for Identity Federation. 81-101 - Thomas Lukaseder, Lisa Maile, Benjamin Erb, Frank Kargl:
SDN-Assisted Network-Based Mitigation of Slow DDoS Attacks. 102-121 - Bernd Prünster, Dominik Ziegler, Christian Kollmann, Bojan Suzic:
A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won't Do. 122-138 - Amir Rezapour, Wen-Guey Tzeng:
A Robust Intrusion Detection Network Using Thresholdless Trust Management System with Incentive Design. 139-154 - Gaurav Varshney, Pawel Szalachowski:
A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet. 155-170 - Sze Yiu Chau, Omar Chowdhury, Victor E. Gonsalves, Huangyi Ge, Weining Yang, Sonia Fahmy, Ninghui Li:
Adaptive Deterrence of DNS Cache Poisoning. 171-191 - Sayed M. Saghaian N. E., Tom La Porta, Trent Jaeger, Z. Berkay Celik, Patrick D. McDaniel:
Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout. 192-212 - Eman Salem Alashwali, Kasper Rasmussen:
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name. 213-228
Applied Cryptography
- Jing Yang, Shuangyi Zhu, Tianyu Chen, Yuan Ma, Na Lv, Jingqiang Lin:
Neural Network Based Min-entropy Estimation for Random Number Generators. 231-250 - Ya-Qi Song, Li Yang:
Improved Quantum Key Distribution Networks Based on Blom-Scheme. 251-270 - Liang Zheng, Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma:
Implementation of High Throughput XTS-SM4 Module for Data Storage Devices. 271-290 - Adil Ahmad, Faizan Ahmad, Lei Wei, Vinod Yegneswaran, Fareed Zaffar:
Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAs. 291-308
Web Security
- Ke Tian, Zhou Li, Kevin D. Bowers, Danfeng (Daphne) Yao:
FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale. 311-331 - Keitaro Yamazaki, Daisuke Kotani, Yasuo Okabe:
Xilara: An XSS Filter Based on HTML Template Restoration. 332-351 - Juan D. Parra Rodriguez, Joachim Posegga:
Local Storage on Steroids: Abusing Web Browsers for Hidden Content Storage and Distribution. 352-371
ATCS Workshop
- Attlee M. Gamundani, Amelia Phillips, Hippolyte N. Muyingi:
A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home Applications. 375-390 - Musfira Siddique, Muhammad Ayzed Mirza, Mudassar Ahmad, Junaid Chaudhry, Rafiqul Islam:
A Survey of Big Data Security Solutions in Healthcare. 391-406 - Mozammel Chowdhury, Sharmin Jahan, Rafiqul Islam, Junbin Gao:
Malware Detection for Healthcare Data Security. 407-416 - Gaurav Sharma, Soultana Ellinidou, Veronika Kuchta, Rajeev Anand Sahu, Olivier Markowitch, Jean-Michel Dricot:
Secure Communication on NoC Based MPSoC. 417-428 - Yeslam Al-Saggaf:
Online Radicalisation Along a Continuum: From When Individuals Express Grievances to When They Transition into Extremism. 429-440 - Bin Ma, Xiaoyu Wang, Bing Li, Yunqing Shi:
A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding. 441-452 - Tongyi Xie, Jiawei Mo, Baohua Huang:
A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural Network. 453-467 - Eman Salem Alashwali, Kasper Rasmussen:
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS. 468-487 - Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo, Helen Ashman:
An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations. 488-506 - Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo, Helen Ashman:
Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices. 507-521
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.