Skip to main content

previous disabled Page of 2
and
Your search also matched 169 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Adaptive Firefly Algorithm with a Modified Attractiveness Strategy

Include preview-only content
  1. Chapter and Conference Paper

    Evaluation and Improvement of Generic-Emulating DPA Attacks

    At CT-RSA 2014, Whitnall, Oswald and Standaert gave the impossibility result that no generic DPA strategies (i.e., without any a priori knowledge about the leakage characteristics) can recover secret information ...

    Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo in Cryptographic Hardware and Embedded System… (2015)

  2. Chapter and Conference Paper

    Transient-Steady Effect Attack on Block Ciphers

    A new Transient-Steady Effect attack on block ciphers called TSE attack is presented in this paper. The concept of transient-steady effect denotes the phenomenon that the output of a combinational circuit keep...

    Yanting Ren, An Wang, Liji Wu in Cryptographic Hardware and Embedded Systems -- CHES 2015 (2015)

  3. Chapter and Conference Paper

    Result Integrity Verification of Outsourced Frequent Itemset Mining

    The data-mining-as-a-service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, ...

    Boxiang Dong, Ruilin Liu, Hui (Wendy) Wang in Data and Applications Security and Privacy… (2013)

  4. Chapter and Conference Paper

    Quantitative Security Risk Assessment of Android Permissions and Applications

    The booming of the Android platform in recent years has attracted the attention of malware developers. However, the permissions-based model used in Android system to prevent the spread of malware, has shown to...

    Yang Wang, Jun Zheng, Chen Sun in Data and Applications Security and Privacy… (2013)

  5. Chapter and Conference Paper

    TerraCheck: Verification of Dedicated Cloud Storage

    When hardware resources are shared between mutually distrustful tenants in the cloud, it may cause information leakage and bring difficulties to regulatory control. To address these concerns, cloud providers a...

    Zhan Wang, Kun Sun, Sushil Jajodia in Data and Applications Security and Privacy… (2013)

  6. Chapter and Conference Paper

    Enhancing Traffic Locality in BitTorrent via Shared Trackers

    The fast-growing traffic of peer-to-peer (P2P) applications, most notably BitTorrent, is putting unprecedented pressure to Internet Service Providers (ISPs). P2P locality has therefore been widely suggested to...

    Haiyang Wang, Feng Wang, Jiangchuan Liu, Ke Xu in NETWORKING 2012 (2012)

  7. Chapter and Conference Paper

    Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks

    We study the security requirements for remote authentication with password protected smart card. In recent years, several protocols for password-based authenticated key exchange have been proposed. These proto...

    Yongge Wang in Information Security and Privacy Research (2012)

  8. Chapter and Conference Paper

    Degree and Principal Eigenvectors in Complex Networks

    The largest eigenvalue λ 1 of the adjacency matrix powerfully characterizes dynamic processes on networks, such as virus spread and synchronization. The minimization of the spectral radius by remo...

    Cong Li, Huijuan Wang, Piet Van Mieghem in NETWORKING 2012 (2012)

  9. Chapter and Conference Paper

    Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

    In DBSec’11, Li et al. showed that Kim and Chung’s password-based remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an improved version...

    Ding Wang, Chun-guang Ma, Peng Wu in Data and Applications Security and Privacy XXVI (2012)

  10. Chapter and Conference Paper

    RandHyp: Preventing Attacks via Xen Hypercall Interface

    Virtualization plays a key role in constructing cloud environments and providing services. Although the main jobs of the hypervisors are to guarantee proper isolation between domains and provide them services,...

    Feifei Wang, ** Chen, Bing Mao, Li **e in Information Security and Privacy Research (2012)

  11. Chapter and Conference Paper

    Modeling Social Engineering Botnet Dynamics across Multiple Social Networks

    In recent years, widely spreading botnets in social networks are becoming a major security threat to both social networking services and the privacy of their users. In order to have a better understanding of t...

    Shuhao Li, **aochun Yun, Zhiyu Hao in Information Security and Privacy Research (2012)

  12. Chapter and Conference Paper

    Sign What You Really Care about – Secure BGP AS Paths Efficiently

    The inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical role in the reliability of the Internet routing system, but forged routes generated by malicious attacks or mis-configurations...

    Yang **ang, Zhiliang Wang, Jian** Wu, **ngang Shi, **a Yin in NETWORKING 2012 (2012)

  13. Chapter and Conference Paper

    Routing On Demand: Toward the Energy-Aware Traffic Engineering with OSPF

    Energy consumption has already become a major challenge to the current Internet. Most researches aim at lowering energy consumption under certain fixed performance constraints. Since trade-offs exist between n...

    Meng Shen, Hongying Liu, Ke Xu, Ning Wang, Yifeng Zhong in NETWORKING 2012 (2012)

  14. Chapter and Conference Paper

    Enhancing Peer-to-Peer Traffic Locality through Selective Tracker Blocking

    Peer-to-peer (P2P) applications, most notably BitTorrent (BT), are generating unprecedented traffic pressure to the Internet Service Providers (ISPs). To mitigate the costly inter-ISP traffic, P2P locality, wh...

    Haiyang Wang, Feng Wang, Jiangchuan Liu in NETWORKING 2011 (2011)

  15. Chapter and Conference Paper

    BotTrack: Tracking Botnets Using NetFlow and PageRank

    With large scale botnets emerging as one of the major current threats, the automatic detection of botnet traffic is of high importance for service providers and large campus network monitoring. Faced with high...

    Jérôme François, Shaonan Wang, Radu State, Thomas Engel in NETWORKING 2011 (2011)

  16. Chapter and Conference Paper

    Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information

    In this work, we explore the benefits of combining clustering and social trust information for Recommender Systems. We demonstrate the performance advantages of traditional clustering algorithms like k-Means and ...

    Georgios Pitsilis, **angliang Zhang, Wei Wang in Trust Management V (2011)

  17. Chapter and Conference Paper

    To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data

    The rapid progress of human genome studies leads to a strong demand of aggregate human DNA data (e.g, allele frequencies, test statistics, etc.), whose public dissemination, however, has been impeded by privac...

    **aoyong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen in Computer Security – ESORICS 2011 (2011)

  18. Chapter and Conference Paper

    Linear Obfuscation to Combat Symbolic Execution

    Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful techniques in discovering such malicious ...

    Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao in Computer Security – ESORICS 2011 (2011)

  19. Chapter and Conference Paper

    Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach

    As online social networking sites become more and more popular, they have also attracted the attentions of the spammers. In this paper, Twitter, a popular micro-blogging service, is studied as an example of sp...

    Alex Hai Wang in Data and Applications Security and Privacy XXIV (2010)

  20. Chapter and Conference Paper

    End-to-End Throughput with Cooperative Communication in Multi-channel Wireless Networks

    Although cooperative communication has been proposed at the physical layer to address multi-path fading effects, how physical layer gains with cooperative communication can translate to tangible performance be...

    Zheng Huang, **n Wang, Baochun Li in NETWORKING 2010 (2010)

previous disabled Page of 2