Loading…
DDOS Mitigation Cloud-Based Service
Guenane, Fouad, Nogueira, Michele, Serhrouchni, Ahmed
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Lightweight Privacy-Preserving Authentication Scheme for V2G Networks in the Smart Grid
Saxena, Neetesh, Bong Jun Choi, Shinyoung Cho
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference
Kotenko, Igor, Saenko, Igor, Ageev, Sergey
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management
Chaisiri, Sivadon, Ko, Ryan K. L., Niyato, Dusit
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
k-anonymity: Risks and the Reality
Basu, Anirban, Nakamura, Toru, Hidano, Seira, Kiyomoto, Shinsaku
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
NIST CyberSecurity Framework Compliance: A Generic Model for Dynamic Assessment and Predictive Requirements
Teodoro, Nuno, Goncalves, Luis, Serrao, Carlos
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
uCentive: An Efficient, Anonymous and Unlinkable Incentives Scheme
Milutinovic, Milica, Dacosta, Italo, Put, Andreas, De Decker, Bart
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
ARP Cache Poisoning Mitigation and Forensics Investigation
Mangut, Heman Awang, Al-Nemrat, Ameer, Benzaid, Chafika, Tawil, Abdel-Rahman H.
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Interest Flow Control Method Based on User Reputation and Content Name Prefixes in Named Data Networking
Umeda, Sayaka, Kamimoto, Takashi, Ohata, Yuri, Shigeno, Hiroshi
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Cut-and-Choose Bilateral Oblivious Transfer and Its Application
Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation
Khan, Muhammad Saleem, Midi, Daniele, Khan, Majid Iqbal, Bertino, Elisa
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms
Bouchami, Ahmed, Goettelmann, Elio, Perrin, Olivier, Godart, Claude
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Integrity Protection of NDEF Message with Flexible and Enhanced NFC Signature Records
Hameed, Sufian, Jamali, Usman Murad, Samad, Adnan
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone
Yingjun Zhang, Shijun Zhao, Yu Qin, Bo Yang, Dengguo Feng
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Cloud Security Audit for Migration and Continuous Monitoring
Ismail, Umar Mukhtar, Islam, Shareeful, Mouratidis, Haralambos
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Achieving Lightweight and Secure Access Control in Multi-authority Cloud
Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu, Fangfang Shan
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network
Jan, Mian Ahmad, Nanda, Priyadarsi, Xiangjian He, Ren Ping Liu
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things
Nguyen, Kim Thuat, Oualha, Nouha, Laurent, Maryline
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding