Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_20
Attlee M. Gamundani, Amelia Phillips, H. Muyingi
{"title":"A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home Applications","authors":"Attlee M. Gamundani, Amelia Phillips, H. Muyingi","doi":"10.1007/978-3-030-01704-0_20","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_20","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115508760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_26
Tongyi Xie, Jiawei Mo, Baohua Huang
{"title":"A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural Network","authors":"Tongyi Xie, Jiawei Mo, Baohua Huang","doi":"10.1007/978-3-030-01704-0_26","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_26","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114570928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_8
Amir Rezapour, Wen-Guey Tzeng
{"title":"A Robust Intrusion Detection Network Using Thresholdless Trust Management System with Incentive Design","authors":"Amir Rezapour, Wen-Guey Tzeng","doi":"10.1007/978-3-030-01704-0_8","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_8","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130558714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_11
Martin Byrenheid, S. Köpsell, Alexander Naumenko, T. Strufe
{"title":"Transparent Low-Latency Network Anonymisation for Mobile Devices","authors":"Martin Byrenheid, S. Köpsell, Alexander Naumenko, T. Strufe","doi":"10.1007/978-3-030-01701-9_11","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_11","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116635487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_26
K. Torkura, M. Sukmana, Feng Cheng, C. Meinel
{"title":"CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era","authors":"K. Torkura, M. Sukmana, Feng Cheng, C. Meinel","doi":"10.1007/978-3-030-01701-9_26","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_26","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126519747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01704-0_17
K. Tian, Zhou Li, Kevin D. Bowers, D. Yao
{"title":"FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale","authors":"K. Tian, Zhou Li, Kevin D. Bowers, D. Yao","doi":"10.1007/978-3-030-01704-0_17","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_17","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122779319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_1
Yaxing Chen, Wenhai Sun, Ning Zhang, Q. Zheng, W. Lou, Y. T. Hou
{"title":"A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT","authors":"Yaxing Chen, Wenhai Sun, Ning Zhang, Q. Zheng, W. Lou, Y. T. Hou","doi":"10.1007/978-3-030-01701-9_1","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_1","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs","authors":"Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li","doi":"10.1007/978-3-030-01701-9_28","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_28","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_23
Sungjin Kim, Brent Byunghoon Kang
{"title":"FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity Matching","authors":"Sungjin Kim, Brent Byunghoon Kang","doi":"10.1007/978-3-030-01701-9_23","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_23","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128273358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-08DOI: 10.1007/978-3-030-01701-9_5
K. Areekijseree, Y. Tang, Ju Chen, Shuang Wang, A. Iyengar, Balaji Palanisamy
{"title":"Secure and Efficient Multi-Party Directory Publication for Privacy-Preserving Data Sharing","authors":"K. Areekijseree, Y. Tang, Ju Chen, Shuang Wang, A. Iyengar, Balaji Palanisamy","doi":"10.1007/978-3-030-01701-9_5","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_5","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128509476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}