Loading…
Authentication and Access Control in the Internet of Things
Jing Liu, Yang Xiao, Chen, C. L. P.
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks
Feng Wang, Haiyan Wang, Kuai Xu
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
An Empirical Study of Passive 802.11 Device Fingerprinting
Neumann, C., Heen, O., Onno, S.
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
Loading…
Robust Dynamic Provable Data Possession
Chen, Bo, Curtmola, Reza
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
Postcard: Minimizing Costs on Inter-Datacenter Traffic with Store-and-Forward
Yuan Feng, Baochun Li, Bo Li
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
GeoProof: Proofs of Geographic Location for Cloud Computing Environment
Albeshri, A., Boyd, C., Nieto, J. G.
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
LiveSec: Towards Effective Security Management in Large-Scale Production Networks
Kai Wang, Yaxuan Qi, Baohua Yang, Yibo Xue, Jun Li
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
An Analysis of Verifications in Microblogging Social Networks -- Sina Weibo
Junting Chen, She, J.
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
Security Issues and Solutions in Cloud Computing
You, Pengfei, Peng, Yuxing, Liu, Weidong, Xue, Shoufu
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
Automated Sensor Verification Using Outlier Detection in the Internet of Things
Javed, N., Wolf, T.
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
Android Malware Forensics: Reconstruction of Malicious Events
Juanru Li, Dawu Gu, Yuhao Luo
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
Analysis of malicious and benign android applications
Alazab, M., Moonsamy, V., Batten, L., Lantz, P., Ronghua Tian
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
A Cost-Effective Intelligent Configuration Model in Cloud Computing
Tsai, Wei-Tek, Qi, Guanqiu, Chen, Yinong
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
Phrase Search over Encrypted Data with Symmetric Encryption Scheme
Yinqi Tang, Dawu Gu, Ning Ding, Haining Lu
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
An Intelligent Anti-phishing Strategy Model for Phishing Website Detection
Weiwei Zhuang, Qingshan Jiang, Tengke Xiong
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
Loading…
Using Proximity and Homophily to Connect Conference Attendees in a Mobile Social Network
Chin, Alvin, Xu, Bin, Yin, Fangxi, Wang, Xia, Wang, Wei, Fan, Xiaoguang, Hong, Dezhi, Wang, Ying
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
The MEERKATS Cloud Security Architecture
Keromytis, A. D., Geambasu, R., Sethumadhavan, S., Stolfo, S. J., Junfeng Yang, Benameur, A., Dacier, M., Elder, M., Kienzle, D., Stavrou, A.
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding
Loading…
A Cyber-physical Systems Approach to the Design of Vehicle Safety Networks
Fallah, Y. P., Sengupta, R.
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Published in 2012 32nd International Conference on Distributed Computing Systems Workshops (01.06.2012)
Get full text
Conference Proceeding