| Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams |
134 |
| Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound |
52 |
| Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment |
38 |
| Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks |
37 |
| MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention |
32 |
| Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy |
31 |
| Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers |
26 |
| Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense |
23 |
| Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
22 |
| Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing |
20 |
| A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet |
19 |
| A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network |
17 |
| Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection |
15 |
| Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling |
13 |
| Searchable Encryption over Feature-Rich Data |
12 |
| Efficient and Expressive Keyword Search Over Encrypted Data in Cloud |
10 |
| Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems |
10 |
| Attribute-based Access Control for ICN Naming Scheme |
10 |
| Separable Reversible Data Hiding in Encrypted JPEG Bitstreams |
9 |
| Design, Analysis, and Implementation of ARPKI An Attack-Resilient Public-Key Infrastructure |
9 |
| On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification |
9 |
| Detecting and Mitigating Target Link-Flooding Attacks Using SDN |
8 |
| Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness |
7 |
| Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks |
7 |
| Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation |
7 |
| White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively |
7 |
| Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection |
7 |
| ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy |
7 |
| Privacy-Preserving Aggregate Queries for Optimal Location Selection |
6 |
| Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage |
6 |
| A Credibility Analysis System for Assessing Information on Twitter |
6 |
| The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs |
6 |
| Conditional Diagnosability of (n,k)-Star Graphs Under the PMC Model |
6 |
| Towards Automated Log Parsing for Large-Scale Log Data Analysis |
6 |
| Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things |
6 |
| Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks |
5 |
| Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks |
5 |
| PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks |
5 |
| Dynamic Optimal Countermeasure Selection for Intrusion Response System |
5 |
| PrivateZone: Providing a Private Execution Environment Using ARM TrustZone |
5 |
| Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM |
5 |
| Privacy-Preserving Multi-Keyword Top-k Similarity Search Over Encrypted Data |
5 |
| Privacy-Aware Caching in Information-Centric Networking |
4 |
| The Rise of Social Botnets: Attacks and Countermeasures |
4 |
| Rmind: A Tool for Cryptographically Secure Statistical Analysis |
4 |
| GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks |
4 |
| Rumor Source Identification in Social Networks with Time-Varying Topology |
4 |
| LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation |
4 |
| AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge |
4 |
| Advancing the State-of-the-Art in Hardware Trojans Detection |
4 |