|
Wireless Security and Privacy |
|
|
|
Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks |
|
|
3 | (15) |
|
|
|
|
Distance-Based Trustworthiness Assessment for Sensors in Wireless Sensor Networks |
|
|
18 | (14) |
|
|
|
Isolation of Multiple Anonymous Attackers in Mobile Networks |
|
|
32 | (14) |
|
|
|
No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position |
|
|
46 | (17) |
|
|
|
|
|
|
|
|
Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach |
|
|
63 | (15) |
|
|
|
|
Android Botnets: What URLs are Telling Us |
|
|
78 | (17) |
|
|
|
|
|
|
Unraveling the Security Puzzle: A Distributed Framework to Build Trust in FPGAs |
|
|
95 | (17) |
|
|
|
|
DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices |
|
|
112 | (18) |
|
|
|
|
|
Service in Denial -- Clouds Going with the Winds |
|
|
130 | (17) |
|
|
|
|
|
|
|
|
RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory |
|
|
147 | (15) |
|
|
Indicators of Malicious SSL Connections |
|
|
162 | (14) |
|
|
|
|
|
Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing |
|
|
176 | (15) |
|
|
|
|
|
A Framework for Policy Similarity Evaluation and Migration Based on Change Detection |
|
|
191 | (15) |
|
|
|
|
|
MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust |
|
|
206 | (15) |
|
|
|
Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing |
|
|
221 | (18) |
|
|
|
|
|
|
|
|
CLKS: Certificateless Keyword Search on Encrypted Data |
|
|
239 | (15) |
|
|
|
|
Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control |
|
|
254 | (14) |
|
|
|
GP-ORAM: A Generalized Partition ORAM |
|
|
268 | (15) |
|
|
|
|
Anonymous Evaluation System |
|
|
283 | (20) |
|
|
|
|
|
|
|
An Efficient Leveled Identity-Based FHE |
|
|
303 | (13) |
|
|
|
|
Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks |
|
|
316 | (15) |
|
|
|
Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher |
|
|
331 | (14) |
|
|
|
A New Statistical Approach for Integral Attack |
|
|
345 | (14) |
|
|
|
|
|
Short Papers: Cryptographic Mechanisms |
|
|
|
Foundations of Optical Encryption: A Candidate Short-Key Scheme |
|
|
359 | (9) |
|
|
|
|
From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain |
|
|
368 | (8) |
|
|
|
A Scalable Multiparty Private Set Intersection |
|
|
376 | (10) |
|
|
|
Electronic Contract Signing Without Using Trusted Third Party |
|
|
386 | (9) |
|
|
|
|
New Message Authentication Code Based on APN Functions and Stream Ciphers |
|
|
395 | (10) |
|
|
|
Short Papers: Security Mechanisms |
|
|
|
Assessing Attack Surface with Component-Based Package Dependency |
|
|
405 | (13) |
|
|
|
|
|
|
|
An Abstraction for the Interoperability Analysis of Security Policies |
|
|
418 | (10) |
|
|
|
Cryptographically Secure On-Chip Firewalling |
|
|
428 | (11) |
|
|
|
Guilherme Ozari de Almeida |
|
|
Rodrigo Portella do Canto |
|
|
Enforcing Privacy in Distributed Multi-domain Network Anomaly Detection |
|
|
439 | (10) |
|
|
|
|
Short Papers: Mobile and Cloud Security |
|
|
|
De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems |
|
|
449 | (10) |
|
|
|
First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks |
|
|
459 | (8) |
|
|
|
|
A Study of Network Domains Used in Android Applications |
|
|
467 | (8) |
|
|
|
|
Detecting Malicious Activity on Smartphones Using Sensor Measurements |
|
|
475 | (13) |
|
|
|
|
A Game Theoretic Framework for Cloud Security Transparency |
|
|
488 | (15) |
|
|
|
Short Papers: Application and Network Security |
|
|
|
Let's Get Mobile: Secure FOTA for Automotive System |
|
|
503 | (8) |
|
|
Konstantinos Markantonakis |
|
|
|
|
VICI: Visual Caller Identification for Contact Center Applications |
|
|
511 | (8) |
|
|
|
Performance Analysis of Real-Time Covert Timing Channel Detection Using a Parallel System |
|
|
519 | (12) |
|
|
|
|
|
Detecting Malicious Temporal Alterations of ECG Signals in Body Sensor Networks |
|
|
531 | (10) |
|
|
Krishna K. Venkatasubramanian |
|
Author Index |
|
541 | |