|
TSP Workshop
|
|
Click here for Welcome from Workshop Chairs and list of organizing committee
|
|
Detecting Privacy Infractions in Applications: A Framework and Methodology Michael Smit, Kelly Lyons, Michael McAllister, Jacob Slonim
|
Extended Attribute Based Encryption for Private Information Retrieval Yinan Shan, Zhenfu Cao
|
A Fuzzy Comprehensive Evaluation Model for Harms of Computer Virus Cong Zheng, Lansheng Han, Jihang Ye, Mengsong Zou, Qiwen Liu
|
A Study on Read-Write Protection of a Digital Document by Cryptographic Techniques Yasuo Hatano, Kunihiko Miyazaki, Toshinobu Kaneko
|
Security Considerations on Pervasive Real-time Collaboration Fuwen Liu, Hartmut Koenig
|
A Strategy-proof Trust Mechanism for Pervasive Computing Environments Zhiqiang Wei, Wei Zhou, Mijun Kang, Michael Collins, paddy nixon
|
Computational Model for Trust Management in RFID Supply Chains Manmeet Mahinderjit SINGH, Xue Li
|
A New High-Performance Approach for Offline Replacement Attack Prevention in
Trusted Clients Hossein Rezaei Ghaleh, Siavash Khorsandi
|
A-Kad: an anonymous P2P protocol based on Kad network YongQing Ni, DaeHun Nyang, Xu Wang
|
Intelligent Honeypot Agent for Blackhole Attack Detection in Wireless Mesh Networks Anoosha Prathapani, Lakshmi Santhanam, Dharma P Agrawal
|
A Directed Acyclic Graph based Detection for RBAC Based Secure Xiyuan Chen, Miaoliang Zhu
|
RPROB - A Family of Binomial-Mix-based Anonymous Communication Systems Minh-Triet Tran, Anh-Duc Duong, Isao Echizen
|
Towards Neutral Trust Management Framework in Unstructured Networks Ruidong Li, Jie Li
|
Strong authentication with mobile phone as security token Van Thanh Do, Ivar Jørstad, Tore Jønvik, Van Thuan Do
|
Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan
|
Design of a Trust Model and Finding Key-Nodes in Rumor Spreading Based on
Monte-Carlo Method' Lina Wang, Yuntao Yue, Chi Guo, Xiaoying Zhang
|
Requirements for Evidential Value for the Assessment of the Trustworthiness of
Digital Records over Time Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård
|
An Efficient Geographic Location-based Security Mechanism for Vehicular Adhoc Networks Gongjun Yan, Stephan Olariu
|
Adaptive Security and Trust Management for Autonomic Message-Oriented Middleware Habtamu Abie
|
Strengthening Class1 Gen2 RFID Tags Jihoon Cho
|
Improving the Reliability of Embedded Systems with Cache and SPM Meng Wang, Yi Wang, Duo Liu, Zili Shao
|
A Heuristic Policy-based System Call Interposition in Dynamic Binary Translation Deen Zheng, Zhengwei Qi, Alei Liang, Hongbo Yang, Haibing Guan, Liang Liu
|
Pervasive Service Access with SIM-based VPN Van Thanh Do, Ivar Jørstad, Tor Anders Johansen, Elias Bakken, Van Thuan Do
|
QoS-aware Optimization Strategy for Security Ranking in SSL Protocol Fang Qi, Zhe Tang, Guojun Wang, Jie Wu
|
CENDA-Camouflage Event Based Malicious Node Detection Architecture Kanthakumar Pongaliur, Li Xiao, Alex Liu
|
A Low-Frequency RFID to Challenge Security and Privacy Concerns Mohammed Benaissa, Tim Good
|
Secure localization and location verification in wireless sensor networks Yingpei Zeng, Jiannong Cao, Jue Hong, Li Xie
|
|