Skip to main content

and
  1. No Access

    Book and Conference Proceedings

    Privacy and Identity Management for Life

    5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers

    Michele Bezzi, Penny Duquenoy in IFIP Advances in Information and Communication Technology (2010)

  2. Chapter and Conference Paper

    An Analysis for Anonymity and Unlinkability for a VoIP Conversation

    With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for priva...

    Ge Zhang in Privacy and Identity Management for Life (2010)

  3. No Access

    Book and Conference Proceedings

    Privacy and Identity Management for Life

    6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers

    Simone Fischer-Hübner, Penny Duquenoy in IFIP Advances in Information and Communication Technology (2011)

  4. Chapter and Conference Paper

    Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users

    Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...

    Ge Zhang in Future Challenges in Security and Privacy for Academia and Industry (2011)

  5. No Access

    Chapter and Conference Paper

    Timing Attacks on PIN Input in VoIP Networks (Short Paper)

    To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when they enter PINs, their user-agent...

    Ge Zhang, Simone Fischer-Hübner in Detection of Intrusions and Malware, and V… (2011)

  6. No Access

    Chapter and Conference Paper

    TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications

    Trusted Computing (TC) can improve the security of various computing platforms. However, as new computing devices emerge and application scenarios increase, current trusted computing technology cannot satisfy ...

    Wei Feng, Dengguo Feng, Ge Wei, Yu Qin, Qianying Zhang in Trust and Trustworthy Computing (2013)

  7. Chapter and Conference Paper

    Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention

    Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...

    Theodoros Spyridopoulos, George Oikonomou in Security and Privacy Protection in Informa… (2013)

  8. No Access

    Chapter and Conference Paper

    A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds

    Micro-video sharing is prevalent nowadays due to the rapid development of personal smart devices, fast growing of network bandwidth and the easy-to-use cloud computing. However, the micro-video sharing system ...

    Chunpeng Ge, Lu Zhou, **yue **a in Security and Privacy in Social Networks an… (2019)

  9. No Access

    Chapter and Conference Paper

    Time-Aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks

    Wireless sensor networks (WSNs) are composed of huge amount of battery powered sensor nodes, which usually adopt sleep strategy to save energy and prolong network lifetime. Although appealing, such network fac...

    Zhiqiang Ruan, Haibo Luo, Ge Xu in Artificial Intelligence and Security (2019)

  10. No Access

    Chapter and Conference Paper

    WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model

    The wireless sensor network is an important technology of the Internet of things. In the sensor network, the limited energy and uneven distribution of nodes lead to unbalanced load of nodes, and reduce the qua...

    Huizong Li, **agnqian Wang, Bin Ge, Jie Wang in Artificial Intelligence and Security (2019)

  11. No Access

    Chapter and Conference Paper

    Construction of a New UAV Management System Based on UMIA Technology

    With the rapid development of unmanned aerial vehicle (UAV) technology in multiple fields, there are more and more scenarios needed to complete tasks through UAV communication and collaboration, and naturally,...

    Ge Zhang, Yu Geng, Xueman Kong, Yifa Li in Provable and Practical Security (2022)

  12. No Access

    Chapter and Conference Paper

    Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS

    In recent years, because online shop** has the advantages of abundant products, easy selection, fast door-to-door delivery, and timely information feedback, people are more and more fond of online shop** c...

    Chunmei Li, Lei Shang, Zheng Wei, Jun Ge in Security and Privacy in Social Networks an… (2022)

  13. No Access

    Book and Conference Proceedings

    Provable and Practical Security

    16th International Conference, ProvSec 2022, Nan**g, China, November 11–12, 2022, Proceedings

    Chunpeng Ge, Fuchun Guo in Lecture Notes in Computer Science (2022)