


default search action
12th SpaCCS 2019: Atlanta, GA, USA
- Guojun Wang, Jun Feng, Md. Zakirul Alam Bhuiyan, Rongxing Lu:

Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14-17, 2019, Proceedings. Lecture Notes in Computer Science 11611, Springer 2019, ISBN 978-3-030-24906-9 - Yevhenii Semenko, Damien Saucez:

Distributed Privacy Preserving Platform for Ridesharing Services. 1-14 - Anjali Kumari, Md. Zakirul Alam Bhuiyan, Jigyasa Namdeo, Shipra Kanaujia, Ruhul Amin

, Satyanarayana Vollala:
Ransomware Attack Protection: A Cryptographic Approach. 15-25 - Priyanka Mall

, Md. Zakirul Alam Bhuiyan, Ruhul Amin
:
A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function. 26-35 - Han Lee

, Maode Ma
:
Blockchain-Based Mobility Management for LTE and Beyond. 36-49 - Lanlan Pan

, Jie Chen, Anlei Hu, Xuebiao Yuchi:
EPT: EDNS Privacy Tunnel for DNS. 50-62 - Abdulwahab Alazeb

, Brajendra Panda
:
Ensuring Data Integrity in Fog Computing Based Health-Care Systems. 63-77 - Amara Naseer

, Zhiqui Huang, Awais Ali:
Modelling Security Requirements for Software Development with Common Criteria. 78-88 - Yasir F. Mohammed

, Dale R. Thompson:
Visualization of DNS Tunneling Attacks Using Parallel Coordinates Technique. 89-101 - Lena Ara, Xiao Luo

:
A Data-Driven Network Intrusion Detection Model Based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection. 102-116 - Tze Chiang Tin, Saw Chin Tan, Ching Kwang Lee, Y. Zulfadzli, K. Rizaludin:

Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning. 117-132 - Fabian Schillinger

, Christian Schindelhauer
:
End-to-End Encryption Schemes for Online Social Networks. 133-146 - Melodee Montgomery, Prosenjit Chatterjee, John Jenkins, Kaushik Roy:

Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data. 147-156 - Fawad Ahmad

, Lee-Ming Cheng
:
Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography. 157-165 - Lei Yan

, Maode Ma
, Yan Ma:
TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT. 166-182 - Hossain Shahriar

, Md Arabin Islam Talukder
, Hongmei Chi, Mohammad Ashiqur Rahman
, Sheikh Iqbal Ahamed, Atef Shalan, Khaled Tarmissi:
Data Protection Labware for Mobile Security. 183-195 - En Wang, Yongjian Yang, Jie Wu, Hengzhi Wang:

Multi-round Bidding Strategy Based on Game Theory for Crowdsensing Task. 196-210 - Babatunde Olabenjo, Dwight J. Makaroff:

Information Leakage in Wearable Applications. 211-224 - Mohammed S. Alshehri

, Brajendra Panda
:
An Encryption-Based Approach to Protect Fog Federations from Rogue Nodes. 225-243 - Yubao Wu

, Fengpan Zhao, Xucan Chen, Pavel Skums, Eric L. Sevigny, David Maimon
, Marie Ouellet, Monica Haavisto Swahn, Sheryl M. Strasser, Mohammad Javad Feizollahi, Youfang Zhang, Gunjan Sekhon:
Python Scrapers for Scraping Cryptomarkets on Tor. 244-260 - Xucan Chen, Mohammad Al Hasan, Xintao Wu

, Pavel Skums, Mohammad Javad Feizollahi, Marie Ouellet, Eric L. Sevigny, David Maimon
, Yubao Wu
:
Characteristics of Bitcoin Transactions on Cryptomarkets. 261-276 - Mohammed Alrowaily, Freeh Alenezi, Zhuo Lu:

Effectiveness of Machine Learning Based Intrusion Detection Systems. 277-288 - Tasnuva Mahjabin, Yang Xiao

:
DNS Flood Attack Mitigation Utilizing Hot-Lists and Stale Content Updates. 289-296 - Cheng Chi Qin, Saw Chin Tan, Ching Kwang Lee, Zulfadzli Yusoff

, Rizaluddin Kaspin:
Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking. 297-308 - Ng Kean Haur, Tan Saw Chin:

Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation Industry. 309-324 - Guosheng Xu

, Zhimin Wu, Chengze Li, Jinghua Yan, Jing Yuan, Zhiyong Wang, Lu Wang:
Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching. 325-335 - Martin Peters

, Johannes Goltz
, Simeon Wiedenmann
, Thomas Mundt
:
Using Machine Learning to Find Anomalies in Field Bus Network Traffic. 336-353 - Muhammad Mudassar Yamin, Basel Katt, Mazaher Kianpour

:
Cyber Weapons Storage Mechanisms. 354-367 - Yucai Song, Yang Chen, Bo Lang, Hongyu Liu, Shaojie Chen

:
Topic Model Based Android Malware Detection. 384-396 - Ruwei Huang, Zhikun Li, Guang Wu:

A Verifiable Encryption Scheme Supporting Fuzzy Search. 397-411 - Ruwei Huang, Zhikun Li, Jianan Zhao:

A Verifiable Fully Homomorphic Encryption Scheme. 412-426 - Aabid Rashid, Diwankshi Sharma

, Tufail A. Lone, Sumeet Gupta
, Sachin Kumar Gupta
:
Secure Communication in UAV Assisted HetNets: A Proposed Model. 427-440 - Huaqing Lin, Gao Liu, Zheng Yan

:
Detection of Application-Layer Tunnels with Rules and Machine Learning. 441-455 - Gyeong-Jin Ra, Dae-Hee Seo, Md. Zakirul Alam Bhuiyan, Im-Yeong Lee:

An Anonymous Protocol for Member Privacy in a Consortium Blockchain. 456-464 - Krishnendu Ghosh, Jeffery Mills:

Automated Construction of Malware Families. 465-474 - S. Sharmila Deva Selvi, S. Harish, Swethashree Dhanabal, C. Pandu Rangan:

A Closer Look at Anonymous Proxy Re-Encryption Schemes. 475-489 - Roni Mateless, Michael Segal:

Approximate String Matching for DNS Anomaly Detection. 490-504

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














