Loading…
A Formalization of Fingerprinting Techniques
Lanze, Fabian, Panchenko, Andriy, Engel, Thomas
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Simmelian Ties and Structural Holes: Exploring Their Topological Roles in Forming Trust for Securing Wireless Sensor Networks
Ming Xiang, Liu, William, Quan Bai, Al-Anbuky, Adnan
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
Secure Two-Party Rank Correlation Computations for Recommender Systems
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Architectural Model and Security Mechanisms for Cloud Federations
Barreto, Luciano, Fraga, Joni, Siqueira, Frank
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics
Zhaoli Liu, Tao Qin, Xiaohong Guan, Xiaoqiang Niu, Tao Yang
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
RESCUE: Resilient Secret Sharing Cloud-Based Architecture
Ukwandu, Elochukwu, Buchanan, William J., Fan, Lu, Russell, Gordon, Lo, Owen
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A Dynamic Credible Factory Reset Mechanism of Personal Data in Android Device
Get full text
Conference Proceeding
Loading…
Loading…
Save Our Passwords
Boonk, Martin, Petrlic, Ronald, Sorge, Christoph
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A Method for Deriving and Testing Malicious Behavior Detection Rules
Get full text
Conference Proceeding
Loading…
On Rehoming the Electronic ID to TEEs
Tamrakar, Sandeep, Ekberg, Jan-Erik, Laitinen, Pekka
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Extended Model of Side-Information in Garbling
Meskanen, Tommi, Niemi, Valtteri, Nieminen, Noora
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Partial Data Protection via Structure-Preserving Document Partitioning
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks
Weidong Yang, Le Xiao, Limin Sun, Qing Li
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…