Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_9
Ali Al-Hashimi, Pratham Oza, Ryan M. Gerdes, Thidapat Chantem
{"title":"The Disbanding Attack: Exploiting Human-in-the-Loop Control in Vehicular Platooning","authors":"Ali Al-Hashimi, Pratham Oza, Ryan M. Gerdes, Thidapat Chantem","doi":"10.1007/978-3-030-37231-6_9","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_9","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128425327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37228-6_27
Savio Sciancalepore, Saeif Alhazbi, R. D. Pietro
{"title":"Location Privacy Issues in the OpenSky Network Crowdsourcing Platform","authors":"Savio Sciancalepore, Saeif Alhazbi, R. D. Pietro","doi":"10.1007/978-3-030-37228-6_27","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_27","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128366751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV","authors":"Montida Pattaranantakul, Qipeng Song, Yanmei Tian, Licheng Wang, Zonghua Zhang, A. Meddahi","doi":"10.1007/978-3-030-37231-6_16","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_16","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131770274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_20
Jing Ge, An Wang, Liehuang Zhu, Xin Liu, Ning Shang, Guoshuang Zhang
{"title":"Power Analysis and Protection on SPECK and Its Application in IoT","authors":"Jing Ge, An Wang, Liehuang Zhu, Xin Liu, Ning Shang, Guoshuang Zhang","doi":"10.1007/978-3-030-37231-6_20","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_20","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124137506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37228-6_28
Tanya Khatri, Gaby G. Dagher, Yantian Hou
{"title":"Privacy-Preserving Genomic Data Publishing via Differentially-Private Suffix Tree","authors":"Tanya Khatri, Gaby G. Dagher, Yantian Hou","doi":"10.1007/978-3-030-37228-6_28","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_28","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124707148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37228-6_9
Shuang Zhao, Xiaobo Ma, Wei Zou, Bo Bai
{"title":"DeepCG: Classifying Metamorphic Malware Through Deep Learning of Call Graphs","authors":"Shuang Zhao, Xiaobo Ma, Wei Zou, Bo Bai","doi":"10.1007/978-3-030-37228-6_9","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_9","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129801019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37228-6_18
Rui Zhao, Edward Chow, Chunchun Li
{"title":"Traffic-Based Automatic Detection of Browser Fingerprinting","authors":"Rui Zhao, Edward Chow, Chunchun Li","doi":"10.1007/978-3-030-37228-6_18","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_18","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129569287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37228-6_1
Truc D. T. Nguyen, M. Thai
{"title":"Trustless Framework for Iterative Double Auction Based on Blockchain","authors":"Truc D. T. Nguyen, M. Thai","doi":"10.1007/978-3-030-37228-6_1","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_1","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128916372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37228-6_7
K. Denney, Enes Erdin, Leonardo Babun, M. Vai, Selcuk Uluagac
{"title":"USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework","authors":"K. Denney, Enes Erdin, Leonardo Babun, M. Vai, Selcuk Uluagac","doi":"10.1007/978-3-030-37228-6_7","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_7","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114410277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_10
Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang
{"title":"Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy","authors":"Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang","doi":"10.1007/978-3-030-37231-6_10","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_10","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126226621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}