-
Chapter and Conference Paper
An Analysis for Anonymity and Unlinkability for a VoIP Conversation
With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for priva...
-
Chapter and Conference Paper
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users
Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...
-
Chapter and Conference Paper
Timing Attacks on PIN Input in VoIP Networks (Short Paper)
To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when they enter PINs, their user-agent...
-
Chapter and Conference Paper
Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes
Spam over Internet Telephony (SPIT) is a threat to the use of Voice of IP (VoIP) systems. One kind of SPIT can make unsolicited bulk calls to victims’ voice mailboxes and then send them a prepared audio messag...
-
Chapter and Conference Paper
TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications
Trusted Computing (TC) can improve the security of various computing platforms. However, as new computing devices emerge and application scenarios increase, current trusted computing technology cannot satisfy ...
-
Chapter and Conference Paper
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention
Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...
-
Chapter and Conference Paper
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds
Micro-video sharing is prevalent nowadays due to the rapid development of personal smart devices, fast growing of network bandwidth and the easy-to-use cloud computing. However, the micro-video sharing system ...
-
Chapter and Conference Paper
Time-Aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks
Wireless sensor networks (WSNs) are composed of huge amount of battery powered sensor nodes, which usually adopt sleep strategy to save energy and prolong network lifetime. Although appealing, such network fac...
-
Chapter and Conference Paper
WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model
The wireless sensor network is an important technology of the Internet of things. In the sensor network, the limited energy and uneven distribution of nodes lead to unbalanced load of nodes, and reduce the qua...
-
Chapter and Conference Paper
Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture
With the rapid growth of the transportation systems, the Internet of Vehicles (IoV) has evolved as a new theme in both industry and academia from traditional vehicular ad hoc networks (VANETs). However, the mu...
-
Chapter and Conference Paper
Gnocchi: Multiplexed Payment Channels for Cryptocurrencies
As the underlying technology of mainstream cryptocurrencies such as Bitcoin and Ethereum, blockchain builds a decentralized payment system. However, the security and consistency of such system derive from the ...
-
Chapter and Conference Paper
Improving Big Data Clustering for Jamming Detection in Smart Mobility
Smart mobility, with its urban transportation services ranging from real-time traffic control to cooperative vehicle infrastructure systems, is becoming increasingly critical in smart cities. These smart mobil...
-
Chapter and Conference Paper
Construction of a New UAV Management System Based on UMIA Technology
With the rapid development of unmanned aerial vehicle (UAV) technology in multiple fields, there are more and more scenarios needed to complete tasks through UAV communication and collaboration, and naturally,...
-
Chapter and Conference Paper
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication
Privacy-preserving machine learning is a hot topic in Artificial Intelligence (AI) area. However, there are also many security issues in all stages of privacy-oriented machine learning. This paper focuses on t...
-
Chapter and Conference Paper
Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS
In recent years, because online shop** has the advantages of abundant products, easy selection, fast door-to-door delivery, and timely information feedback, people are more and more fond of online shop** c...
-
Chapter and Conference Paper
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks
Protecting Internet of Things (IoT) network from private data breach is a grand challenge. Data breach may occur when networks’ statistical information is disclosed due to network scanning or data stored on th...