Loading…
Loading…
Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses
Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, Qingkai Zeng
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps
Yen-Lin Chen, Hahn-Ming Lee, Jeng, Albert B., Te-En Wei
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Data sharing on the cloud: A scalable proxy-based protocol for privacy-preserving queries
Sepehri, Maryam, Cimato, Stelvio, Damiani, Ernesto, Yeun, Chan Yeob
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy
Arkko, Jari, Norrman, Karl, Naslund, Mats, Sahlin, Bengt
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation
Yuchuan Luo, Ming Xu, Shaojing Fu, Dongsheng Wang, Junquan Deng
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Loading…
EyeCloud: A BotCloud Detection System
Memarian, Mohammad Reza, Conti, Mauro, Leppanen, Ville
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries
Yue-Bin Luo, Bao-Sheng Wang, Xiao-Feng Wang, Xiao-Feng Hu, Gui-Lin Cai, Hao Sun
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Private Membership Test for Bloom Filters
Meskanen, Tommi, Jian Liu, Ramezanian, Sara, Niemi, Valtteri
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability
Emura, Keita, Le Trieu Phong, Watanabe, Yohei
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
RFID Secure Application Revocation for IoT in 5G
Kai Fan, Yuanyuan Gong, Zhao Du, Hui Li, Yintang Yang
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Trusted Tamper-Evident Data Provenance
Bany Taha, Mohammad M., Chaisiri, Sivadon, Ko, Ryan K. L.
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor
Jiaojiao Song, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental Data
Mineraud, Julien, Lancerin, Federico, Balasubramaniam, Sasitharan, Conti, Mauro, Tarkoma, Sasu
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Forensic Collection and Analysis of Thumbnails in Android
Ming, Di Leom, D'Orazio, Christian Javier, Deegan, Gaye, Choo, Kim-Kwang Raymond
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding