


default search action
5th SocialSec 2019: Copenhagen, Denmark
- Weizhi Meng, Steven Furnell:

Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers. Communications in Computer and Information Science 1095, Springer 2019, ISBN 978-981-15-0757-1 - Jianming Fu, Lin Li, Yingjun Wang, Jianwei Huang, Guojun Peng:

Web Scanner Detection Based on Behavioral Differences. 1-16 - Jiming Liu, Zhenfu Cao

, Xiaolei Dong, Jiachen Shen:
DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation. 17-31 - Juyan Li, Chunguang Ma, Kejia Zhang:

A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing. 32-46 - Qikun Zhang, Yongjiao Li, Jianyong Li

, Yong Gan, Yanhua Zhang, Jingjing Hu:
Blockchain-Based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network. 47-56 - Liuying Sun, Anthony T. S. Ho, Zhe Xia, Jiageng Chen

, Mingwu Zhang:
Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features. 57-73 - Jinbao Gao, Yuanzhang Li, Hongwei Jiang, Lu Liu, Xiaosong Zhang:

An RTP Extension for Reliable User-Data Transmission over VoIP Traffic. 74-86 - Xiaosong Zhang, Linhong Guo, Yuan Xue, Hongwei Jiang, Lu Liu, Quanxin Zhang:

A Hybrid Covert Channel with Feedback over Mobile Networks. 87-94 - Chenyu Wang, Ding Wang

, Haowei Wang, Guoai Xu, Jing Sun, Huaxiong Wang:
Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things. 95-109 - Chunsheng Gu:

Integer Version of Ring-LWE and Its Applications. 110-122 - Xiang Cheng, Jiale Zhang, Bing Chen:

Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension. 123-138 - Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski, Chunhua Su:

A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds. 139-151 - Zian Liu, Chao Chen, Shigang Liu, Dongxi Liu, Yu Wang:

Exploit in Smart Devices: A Case Study. 152-164 - Jun Zhang

, Houda Labiod
:
Retrieve the Hidden Leaves in the Forest: Prevent Voting Spamming in Zhihu. 165-180 - Wanlun Ma, Zhuo Liu, Xiangyu Hu:

Online Event Detection in Social Media with Bursty Event Recognition. 181-190 - Xiangyu Wei, Jin Li, Zhen Han, Wei Wang:

Predicting Users' Emotional Intelligence with Social Networking Data. 191-202 - Xiaofeng Wang, Qilin Zhang, Zhenni Shi, Ziyuan Ye:

Design and Implementation of Medical Dispute Governance Based on Blockchain. 203-222 - Jie Ji, Guohua Wu, Chenjian Duan, Yizhi Ren, Zhen Wang

:
Greedily Remove k Links to Hide Important Individuals in Social Network. 223-237 - Borui Gong, Xingye Lu, Wang Fat Lau, Man Ho Au:

Blockchain-Based Threshold Electronic Voting System. 238-250 - Teng Zhou, Liang Liu, Haifeng Wang, Wenjuan Li

, Chong Jiang:
PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication. 251-263 - Yu Sui, Mengze Yu, Haifeng Hong, Xianxian Pan:

Learning from Imbalanced Data: A Comparative Study. 264-274

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














