10th International Conference on Security and Privacy in Communication Networks - Beijing, China

10th International Conference on Security and Privacy in Communication Networks


10th International Conference on Security and Privacy in Communication Networks September 24-26, 2014 Beijing, China
URL: http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6120120

Accepted Papers:

  • Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang and Daren Zha.
    EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems against Faulty Clients
  • Qianying Zhang, Shijun Zhao and Dengguo Feng.
    Improving the Security of the HMQV Protocol using Tamper-Proof Hardware
  • Jialong Zhang, Jayant Notani and Guofei Gu.
    Characterizing Google Hacking: A First Large-Scale Quantitative Study
  • Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen and Guofei Gu.
    Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-on Cross Site Scripting Attacks
  • Tilo Muller and Christopher Kugler.
    SCADS: Separated Control- and Data-Stack
  • Ziyu Wang and Jiahai Yang.
    A New Anomaly Detection Method Based on IGTE and IGFE
  • Byungho Min and Vijay Varadharajan.
    A Simple and Novel Technique for Counteracting Exploit Kits
  • Xiaoyan Sun, Jun Dai, Anoop Singhal and Peng Liu.
    Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks
  • Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li and Fenghua Li.
    Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy
  • Duohe Ma.
    Defending Blind DDoS Attack on SDN Based on Moving Target Defense
  • Issa Khalil, Zuochao Dou and Abdallah Khreishah.
    TPM-based Authentication Mechanism for Apache Hadoop
  • Max Suraev.
    Implementing an affordable and effective GSM IMSI catcher with 3G authentication
  • Tayyaba Zeb, Abdul Ghafoor, Awais Shibli and Muhammad Yousaf.
    A Secure Architecture for Inter-Cloud Virtual Machine Migration
  • Nicolas Van Balen and Haining Wang.
    GridMap: Enhanced Security in Cued-Recall Graphical Passwords
  • Yi-Ting Chiang, Tsan-Sheng Hsu, Churn-Jung Liau, Yun-Ching Liu, Chih-Hao Shen, Da-Wei Wang and Justin Zhan.
    An Information-Theoretic Approach for Secure Protocol Composition
  • Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, Debin Gao and Chunfu Jia.
    Control Flow Obfuscation using Neural Network to Fight Concolic Testing
  • Qinglong Zhang, Zongbin Liu, Quanwei Cai and Ji Xiang.
    TST:A New Randomness Test Method Based on Golden Distribution
  • Sarmad Ullah Khan.
    An Authentication and Key Management Scheme for Heterogeneous Sensor Networks
  • Shen Su and Beichuan Zhang.
    Detecting concurrent prefix hijack events online
  • Anna Squicciarini, Dan Lin, Smitha Sundareswaran and Jingwei Li.
    Policy Driven Node Selection in MapReduce
  • Vincenzo Gulisano, Magnus Almgren and Marina Papatriantafilou.
    METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures
  • Chen Cao, Yuqing Zhang, Qixu Liu and Kai Wang.
    Function Escalation Attack
  • Eirini Karapistoli, Panagiotis Sarigiannidis and Anastasios Economides.
    Wormhole Attack Detection in Wireless Sensor Networks based on Visual Analytics
  • Binh Vo and Steven Bellovin.
    Anonymous Publish-Subscribe Systems
  • Jeroen Massar, Ian Mason, Linda Briesemeister and Vinod Yegneswaran.
    JumpBox -- A Seamless Browser Proxy for Tor Pluggable Transports
  • Sushama Karumanchi, Jingwei Li and Anna Squicciarini.
    Securing Resource Discovery in Content Hosting Networks
  • Hugo Gonzalez, Natalia Stakhanova and Ali Ghorbani.
    DroidKin: Lightweight Detection of Android Apps Similarity

Accepted Short Papers

  • Yazhe Wang, Mingming Hu and Chen Li.
    UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts
  • Chengcheng Shao, Liang Chen, Shuo Fan and Xinwen Jiang.
    Social Authentication Identity: An Alternate to Internet Real Name System
  • Xi Xiao, Xianni Xiao, Yong Jiang and Qing Li.
    Detecting Mobile Malware with TMSVM
  • Yosra Ben Mustapha, Herve Debar and Gregory Blanc.
    Policy Enforcement Point Model
  • Zhangjie Fu, Jiangang Shu, Xingming Sun and Naixue Xiong.
    An Effective Search Scheme based on Semantic Tree over Encrypted Cloud Data Supporting Verifiability
  • Pieter Burghouwt, Marcel E.M. Spruit and Henk J. Sips.
    Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations
  • Jingwei Li, Dan Lin, Anna Squicciarini and Chunfu Jia.
    STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds
  • Lautaro Dolberg, Quentin Jerome, Jerome Francois, Radu State and Thomas Engel.
    RAMSES: Revealing Android Malware through String Extraction and Selection
  • Kan Chen, Peidong Zhu and Yueshan Xiong.
    Keep the Fakes Out: Defending against Sybil Attack in P2P systems
  • Zhang Lulu, Yongzheng Zhang and Tianning Zang.
    Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-coupled Payloads Filtering Scheme
  • Yuling Luo, Junxiu Liu, Jinjie Bi and Senhui Qiu.
    Hardware Implementation of Cryptographic Hash Function based on Spatiotemporal Chaos
  • Swarup Chandra, Zhiqiang Lin, Ashish Kundu and Latifur Khan.
    A Systematic Study of the Covert-Channel Attacks in Smartphones
  • Sami Zhioua, Adnene Ben Jabeur, Mahjoub Langar and Wael Ilahi.
    Detecting Malicious Sessions through Traffic Fingerprinting using Hidden Markov Models
  • Eslam Abdallah, Mohammad Zulkernine and Hossam Hassanein.
    Countermeasures for Mitigating ICN Routing Related DDoS Attacks
  • Ding Wang and Ping Wang.
    On the Usability of Two-Factor Authentication
  • Bhaswati Deka, Ryan Gerdes, Ming Li and Kevin Heaslip.
    Friendly Jamming for Secure Localization in Vehicular Transportation
  • Wenjun Fan.
    Catering Honeypots Creating Based on the Predefined Honeypot Context

(ID#:14-2903)



Note:

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.