Loading…
A Distributed Reputation System for Certification Authority Trust Management
Classen, Jiska, Braun, Johannes, Volk, Florian, Hollick, Matthias, Buchmann, Johannes, Muhlhauser, Max
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
WAVE: Secure Wireless Pairing Exploiting Human Body Movements
Wei Wang, Zhan Wang, Wen Tao Zhu, Lei Wang
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A Framework for Evaluating the End-to-End Trustworthiness
Mohammadi, Nazila Gol, Bandyszak, Torsten, Weyer, Thorsten, Kalogiros, Costas, Kanakakis, Michalis
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor Networks
Hui Peng, Xiaoying Zhang, Hong Chen, Yuncheng Wu, Yao Wu, Juru Zeng
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A New Solution Based on Multi-rate LDPC for Flash Memory to Reduce ECC Redundancy
Shigui Qi, Dan Feng, Nan Su, Wenguo Liu, Jingning Liu
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Trust Evaluation in Mobile Devices: An Empirical Study
Weiss, Richard, Reznik, Leon, Yanyan Zhuang, Hoffman, Andrew, Pollard, Darrell, Rafetseder, Albert, Tao Li, Cappos, Justin
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
Can On-line Social Network Users Trust That What They Designated as Confidential Data Remains So?
Estivill-Castro, Vladimir, Nettleton, David F.
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Contextual Sub-network Extraction in Contextual Social Networks
Xiaoming Zheng, Yan Wang, Orgun, Mehmet A.
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
Attainable Unconditional Security for Shared-Key Cryptosystems
Biondi, Fabrizio, Given-Wilson, Thomas, Legay, Axel
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Loading…
A Rejuvenation Model for Software System under Normal Attack
Haining Meng, Xinhong Hei, Yan Li, Yanning Du, Guo Xie
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud
Will, Mark A., Ko, Ryan K. L., Witten, Ian H.
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
An Instruction-Set Randomization Using Length-Preserving Permutation
Get full text
Conference Proceeding
Loading…