Please click here to download the conference program.

The IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom2014)& The IEEE International Conference on Big Data Science and Engineering (BDSE 2014)
24th-26th September, Beijing

Tuesday September 23th
18:30 - 20:30   Conference Reception ( Wenjin Hotel 4th Floor Function Room)

Wednesday September 24th
08:30 - 18:00   Registration Open
09:00 - 11:40   Session Chair: Prof. Ivan Stojmenovic
09:00 - 09:10   Welcome & Opening Remarks (FIT Lecture Room)
09:10 - 09:50   Keynote I (FIT Lecture Room)
Modelling the Propagation of Worms and Rumours in Networks
Prof. Wanlei Zhou
Deakin University, Australia
09:50 - 10:10   Coffee Break
10:10 - 10:50   Keynote II (FIT Lecture Room)
Advanced Ad Hoc and Mesh Networks Technologies to Facilitate Specialized Disaster-resilient Networks
Prof. Nei Kato
Tohoku University, Japan
11:00 - 11:40   Keynote III (FIT Lecture Room)
Cloud Computing, Big Data and Scalable Privacy Preservation
Prof. Junjin Chen
University of Technology, Sydney Australia
12:00 - 14:00   Lunch
14:00 - 15:40   TrustCom Session #1 (FIT 1-315), TrustCom Session #2(FIT 1-415), NOPE 2014 (FIT 1-312)
15:40 - 16:00   Coffee Break
16:00 - 17:40   TrustCom Session #3(FIT 1-315), TrustCom Session #4(FIT 1-415), UbiSafe 2014 (FIT 1-312)

Thursday September 25th
08:30 - 18:00   Registration Open
08:30 - 17:40   SPMBB 2014 (FIT 1-312)
08:30 - 10:10   TrustCom Session #5 (FIT 1-315), TrustCom Session #6 (FIT 1-415), BDSE Session #1 (FIT 1-515), SpaIoT 2014 (Small Lecture Room)
10:10 - 10:30   Coffee Break
10:30 - 12:10   TrustCom Session #7 (FIT 1-315), TrustCom Session #8, BDSE Session #2 (FIT 1-515), SpaIoT 2014 (Small Lecture Room)
12:10 - 14:00   Lunch
14:00 - 15:40   TrustCom Session #9 (FIT 1-315), TrustCom Session #10 (FIT 1-415), BDSE Session #3 (FIT 1-515), EFINS 2014 (Small Lecture Room)
15:40 - 16:00   Coffee Break
16:00 - 17:40   TrustCom Session #11 (FIT 1-315), TrustCom Session #12 (FIT 1-415), BDSE Session #4 (FIT 1-515)
18:30 - 20:30   Banquet
(“Ninety-nine Yurts” 9# Yong Tai Zhuang East RD Ma Fang Chun Dong Sheng Xiang, HaiDian District, Beijing)
(九十九顶毡房-海淀区 东升乡马坊村永泰庄北路9号)
Gathering in front of FIT Building East Gate the Bus will depart at 18:00

Friday September 26th
08:30 - 18:00   Registration Open
08:30 - 09:50   Session Chair: Prof. Yunhao Liu
08:30 - 09:10   Keynote IV (FIT Lecture Room)
Information Technology in China: An Introduction
Prof. Jiaguang Sun
Tsinghua Unversity, China
09:10 - 09:50   Keynote V (FIT Lecture Room)
Privacy Preserving Computation in Mobile Crowd-sourcing & Computing
Prof. Xiangyang Li
Illinois Institute of Technology
09:50 - 10:10   Coffee Break
10:10 - 12:00   Session Chair: Prof. Zhenhua Li
10:10 - 10:50   Keynote VI (FIT Lecture Room)
Modern Service Industry in China: Mining and Exploring Heterogeneous Data for Service Oriented Computing
Prof. Zhaohui Wu
Zhejiang University, China
10:50 - 11:30   Keynote VII (FIT Lecture Room)
Prof. Xindong Wu
University of Vermont, America
11:30 - 12:00   Award Ceremony
12:00 - 14:00   Lunch
14:00 - 15:40   TrustCom Session #13 (FIT 1-315), TScloud 2014 (FIT 1-415), BDSE Session #5 (FIT 1-515)
15:40 - 16:00   Coffee Break
16:00 - 17:40   TrustCom Session #14 (FIT 1-315), TrustCom Session #15 (FIT 1-415), BDSE Session #6 (FIT 1-515)

TrustCom Session #1: Privacy in Mobile & Wireless Networks
Session Chair: Fábio Borges

  • A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data
    Zhou-Fu Cai, He-Xing Yang, Wang Shuang, Xu Jian, Wang-Ming Wei, and Wu-Li Na
  • A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform
    Bo Yang, Dengguo Feng, and Yu Qin
  • Automated User Profiling in Location-Based Mobile Messaging Applications
    Yao Cheng, Chang Xu, Yi Yang, Lingyun Ying, Purui Su, and Dengguo Feng
  • PrivateDroid: Private Browsing Mode for Android
    Su Mon Kywe, Christopher Landis, Yutong Pei, Justin Satterfield, Yuan Tian, and Patrick Tague
  • TTPCookie: Flexible Third-Party Cookie Management for Increasing Online Privacy
    Ashar Javed, Christian Merz, and Joerg Schwenk

TrustCom Session #2: Privacy and Trust in Social Networks
Session Chair: Ron Poet
  • Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit
    Mu Yang, Yijun Yu, Arosha K. Bandara, and Bashar Nuseibeh
  • Garbling in Reverse Order
    Tommi Meskanen, Valtteri Niemi, and Noora Nieminen
  • Private Outsourcing of Polynomial Functions
    Peili Li, Haixia Xu, and Jiaqi Hong
  • A Machine Learning Based Trust Evaluation Framework for Online Social Networks
    Kang Zhao and Li Pan
  • Multi-dimensions of Developer Trustworthiness Assessment in OSS Community
    Yu Bai, Gang Yin, and Huaimin Wang

TrustCom Paper Session #3: Security Algorithms
Session Chair: Su Mon Kywe
  • A Novel Feature Selection Approach for Intrusion Detection Data Classification
    Mohammed A. Ambusaidi, Xiangjian He, Zhiyuan Tan, Priyadarsi Nanda, Liang Fu Lu, and Upasana T. Nagar
  • An On-Line Anomaly Detection Method Based on a New Stationary Metric - Entropy-Ratio
    Ziyu Wang, Jiahai Yang, and Fuliang Li
  • Reaching Agreement in Security Policy Negotiation
    Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, and Vincent Frey
  • Remembrance of Local Information Status for Enforcing Robustness of Policy-Exchanged Strategies for Trust Negotiation
    Yunxi Zhang and Darren Mundy
  • Secure and Privacy-Friendly Public Key Generation and Certification
    Fábio Borges, Leonardo A. Martucci, Filipe Beato, and Max Mühlhäuser

TrustCom Paper Session #4: Security Applications
Session Chair: Mu Yang
  • A Stateful Mechanism for the Tree-Rule Firewall
    Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, and Zhiyuan Tan
  • CAFS: A Framework for Context-Aware Federated Services
    Md. Sadek Ferdous and Ron Poet
  • Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services
    Yong Ho Hwang, Jae Woo Seo, and Il Joo Kim
  • High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields
    Shuai Liu, Lei Ju, Xiaojun Cai, Zhiping Jia, and Zhiyong Zhang
  • A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks
    Chongxian Guo, Huaqiang Xu, Lei Ju, Zhiping Jia, and Jihai Xu

TrustCom Paper Session #5: Security Systems
Session Chair: WeiXi Gu
  • SIMS: A Comprehensive Approach for a Secure Instant Messaging Sifter
    Günter Fahrnberger
  • Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning
    Wenjuan Li, Weizhi Meng, Zhiyuan Tan, and Yang Xiang
  • Ultra High-Speed SM2 ASIC Implementation
    Zhenwei Zhao and Guoqiang Bai
  • Visual Similarity Based Anti-phishing with the Combination of Local and Global Features
    Yu Zhou, Yongzheng Zhang, Jun Xiao, Yipeng Wang, and Weiyao Lin
  • A Practically Optimized Implementation of Attribute Based Cryptosystems
    Chunqiang Hu, Fan Zhang, Tao Xiang, Hongjuan Li, Xiao Xiao, and Guilin Huang

TrustCom Paper Session #6: Authentication
Session Chair: Zhiquan Lv
  • A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
    Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Zhiyuan Tan, and Ren Ping Liu
  • Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs
    Liu Licai, Yin Lihua, Guo Yunchuan, and Fang Bingxing
  • Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems
    Uthpala Subodhani Premarathne and Ibrahim Khalil
  • ToAuth: Towards Automatic Near Field Authentication for Smartphones
    Weixi Gu, Zheng Yang, Longfei Shangguan, Xiaoyu Ji, and Yiyang Zhao
  • One Kind of Cross-Domain DAA Scheme from Bilinear Mapping
    Xiaoming Wang, Heyou Cheng, and Ruihua Zhang

TrustCom Paper Session #7: Attack & Defense
Session Chair: Yu Zhou
  • Long Term Tracking and Characterization of P2P Botnet
    Jia Yan, Lingyun Ying, Yi Yang, Purui Su, and Dengguo Feng
  • A Survey of Security Network Coding toward Various Attacks
    Shixiong Yao, Jing Chen, Ruiying Du, Lan Deng, and Chiheng Wang
  • Defensor: Lightweight and Efficient Security-Enhanced Framework for Android
    Xuerui Pan, Yibing Zhongyang, Zhi Xin, Bing Mao, and Hao Huang
  • Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited
    Hui Cui, Yi Mu, and Man Ho Au
  • The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack
    Ya Tan, Jizeng Wei, and Wei Guo

TrustCom Paper Session #8: Security and Trust in Cloud Computing (1)
Session Chair: Liu Licai
  • AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security
    Ahmed Taha, Ruben Trapero, Jesus Luna, and Neeraj Suri
  • Efficiently Attribute-Based Access Control for Mobile Cloud Storage System
    Zhiquan Lv, Jialin Chi, Min Zhang, and Dengguo Feng
  • EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor
    Liang Deng, Qingkai Zeng, Weiguang Wang, and Yao Liu
  • FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing
    Yu Zhang, Jing Chen, Ruiying Du, Lan Deng, Yang Xiang, and Qing Zhou
  • ONHelp: Components in Building Secure Cloud Based on OpenNebula
    Kao Zhao, Hai Jin, Deqing Zou, and Weiqi Dai

TrustCom Paper Session #9: Security and Trust in Cloud Computing (2)
Session Chair: Muttukrishnan Rajarajan
  • Proofs of Ownership and Retrievability in Cloud Storage
    Ruiying Du, Lan Deng, Jing Chen, Kun He, and Minghui Zheng
  • Temporal Access Control with User Revocation for Cloud Data
    Nihal Balani and Sushmita Ruj
  • Trusted Geolocation-Aware Data Placement in Infrastructure Clouds
    Nicolae Paladi, Mudassar Aslam, and Christian Gehrman
  • Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation Context
    Yuanlong Cao, Jianfeng Guan, Changqiao Xu, Wei Quan, and Hongke Zhang
  • Trust Enhanced Cloud Security for Healthcare Services
    Udaya Tupakula and Vijay Varadharajan

TrustCom Paper Session #10: Security in Mobile Networks
Session Chair: Meng Li
  • AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps
    Julian Schütte, Dennis Titze, and J.M. De Fuentes
  • Attack Tree Based Android Malware Detection with Hybrid Analysis
    Shuai Zhao, Xiaohong Li, Guangquan Xu, Lei Zhang, and Zhiyong Feng
  • Automatically Exploiting Potential Component Leaks in Android Applications
    Li Li, Alexandre Bartel, Jacques Klein, and Yves Le Traon
  • Data-centric Rogue Node Detection in VANETs
    Kamran Zaidi, Milos Milojevic, Veselin Rakocevic, and Muttukrishnan Rajarajan
  • Detect Android Malware Variants Using Component Based Topology Graph
    Tong Shen, Yibing Zhongyang, Zhi Xin, Bing Mao, and Hao Huang

TrustCom Paper Session #11: Network Security
Session Chair: Shuai Zhao
  • Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation
    Parvez Faruki, Ammar Bharmal, Vijay Laxmi, M.S. Gaur, Mauro Conti, and Muttukrishnan Rajarajan
  • Secure Mobile Payment on NFC-Enabled Mobile Phones Formally AnalysedUsing CasperFDR
    Sarah Abughazalah, Kostantinos Markantonakis, and Keith Mayes
  • Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones
    Zhihui Han, Liang Cheng, Yang Zhang, Shuke Zeng, Yi Deng, and Xiaoshan Sun

TrustCom Paper Session #12: Parallel and Distributed Trust Applications
Session Chair: Li Li
  • Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager
    Raja Naeem Akram, Konstantinos Markantonakis, and Damien Sauveron
  • Design and Analysis of a New Feature-Distributed Malware
    Byungho Min and Vijay Varadharajan
  • On Energy Efficient Scheduling and Load Distribution Based on Renewable Energy for Wireless Mesh Network in Disaster Area
    Meng Li, Hiroki Nishiyama, Yasunori Owada, and Kiyoshi Hamaguchi
  • Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs
    Hui Xia, Jia Yu, Zhi-Yong Zhang, Xiang-Guo Cheng, and Zhen-Kuan Pan
  • BIBRM: A Bayesian Inference Based Road Message Trust Model in Vehicular Ad Hoc Networks
    Guanghao Wang and Yue Wu

TrustCom Paper Session #13: Trust Modeling and Algorithms
Session Chair: Gu Weixi
  • Convergence of True Cooperations in Bayesian Reputation Game
    Jooyoung Lee and Jae C. Oh
  • Practical Assessment of Biba Integrity for TCG-Enabled Platforms
    Roberto Sassu, Gianluca Ramunno, and Antonio Lioy
  • SigmoRep: A Robust Reputation Model for Open Collaborative Environments
    Ahmad A. Kardan, Reza Salarmehr, and Azade Farshad
  • Towards Robust and Effective Trust Management for Security: A Survey
    Dongxia Wang, Tim Muller, Yang Liu, and Jie Zhang
  • Trust Mechanism for Enforcing Compliance to Secondary Data Use Contracts
    Zeinab Noorian, Johnson Iyilade, Mohsen Mohkami, and Julita Vassileva

TrustCom Paper Session #14: Trust Applications and Systems
Session Chair: Jooyoung Lee
  • An Effective Path Load Balancing Mechanism Based on SDN
    Jun Li, Xiangqing Chang, Yongmao Ren, Zexin Zhang, and Guodong Wang
  • Integrity Levels: A New Paradigm for Protecting Computing Systems
    Christipher Jenkins and Lyndon Pierson
  • Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments
    Michael Weiß, Steffen Wagner, Roland Hellman, and Sascha Wessel
  • Overhead-Free In-Place Recovery Scheme for XOR-Based Storage Codes
    Ximing Fu, Zhiqing Xiao, and Shenghao Yang
  • Untrusted User Detection in Microblogs
    Zidan Yu and Huiqun Yu

TrustCom Paper Session #15: Identity Management Systems and Mechanism
Session Chair: Roberto Sassu
  • A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures
    Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, and Yusuke Sakai
  • Anonymous Proxy Signature with Restricted Traceability
    Jiannan Wei, Guomin Yang, and Yi Mu
  • Efficient Traceable Attribute-Based Signature
    Shenglong Ding, Yiming Zhao, and Yuyang Liu
  • Computation Integrity Measurement Based on Branch Transfer
    Jianming Fu, Yan Lin, Xu Zhang, and Pengwei Li
  • Emergency Key Rollover in DNSSEC
    Zheng Wang and Liyuan Xiao


IEEE International Conference on Big Data Science and Engineering (BDSE 2014)

BDSE Session #1: Social Networking with Big Data
Session Chair: Chenhui Li

  • Crowd Sensing of Urban Emergency Events Based on Social Media Big Data
    Zheng Xu, Hui Zhang, Yunhuai Liu, and Lin Mei
  • SocAware: A Middleware for Social Applications in Online Social Networks
    Liang Chen, Kan Chen, Chengcheng Shao, and Peidong Zhu
  • Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain
    Conghuan Ye, Zenggang Xiong, Yaoming Ding, Jiping Li, Guangwei Wang, Xuemin Zhang, and Kaibing Zhang
  • A Proposal for a Reference Architecture for Long-Term Archiving, Preservation, and Retrieval of Big Data
    Phillip Viana and Liria Sato
  • Big Data Analyses for Collective Opinion Elicitation in Social Networks
    Yingxu Wang and Victor J. Wiebe

BDSE Session #2: Big Data Processing
Session Chair: Yingxu Wang
  • Performance Evaluation of the SSD-Based Swap System for Big Data Processing
    Jaehun Lee, Sungmin Park, Minsoo Ryu, and Sooyong Kang
  • A Study on Recursive Neural Network Based Sentiment Classification of Sina Weibo
    Chen Fu, Bai Xue, and Zhan Shaobin
  • VALID: A Web Framework for Visual Analytics of Large Streaming Data
    Chenhui Li and George Baciu
  • A High Speed Lossless Compression Algorithm Based on CPU and GPU Hybrid Platform
    Bin Zhou, Hai Jin, and Ran Zheng
  • Picky Partial Least Squares for Feature Selection from Alzheimer's Data
    Torbjorn Wasterlid and Li Bai

BDSE Session #3: Big Data Application
Session Chair: Jisheng Pei
  • Improved 2DLDA Algorithm and Its Application in Face Recognition
    Dong Wang and Shunfang Wang
  • The Evaluation of Emulab as an Environment for Bio-Informatics Research
    Kyungwoo Kang, Yunhee Kang, and Sungjin Sul
  • A Evaluation Method for Web Service with Large Numbers of Historical Records
    Lianyong Qi, Jiancheng Ni, Xiaona Xia, Chao Yan, Hua Wang, and Wanli Huang
  • BIG DATA: Preconditions to Productivity
    Steve Hallman, Jasur Rakhimov, Michel Plaisent, and Prosper Bernard
  • Data Mining Application of Decision Trees for Student Profiling at the Open University of China
    Wilton W.T. Fok, Haohua Chen, Jiaqu Yi, Sizhe Li, H.H. Au Yeung, Wang Ying, and Liu Fang

BDSE Session #4: Big Data & Optimization
Session Chair: Xinlin Zhang
  • Towards Policy Retrieval for Provenance Based Access Control Model
    Jisheng Pei and Xiaojun Ye
  • SARAH - Statistical Analysis for Resource Allocation in Hadoop
    Bruce Martin
  • Privacy Aware Non-linear Support Vector Machine for Multi-source Big Data
    Yunmei Lu, Piyaphol Phoungphol, and Yanqing Zhang
  • Modeling of Data Provenance on Space and Time Based on OPM
    Kang Jiehua and Xu Guoyan
  • Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs
    Wei Gao, Mingzhong Wang, Liehuang Zhu, and Xiaoping Zhang

BDSE Session #5: MapReduce for Big Data
Session Chair: Parinaz Ameri
  • Aeromancer: A Workflow Manager for Large-Scale MapReduce-Based Scientific Workflows
    Nabeel Mohamed, Nabanita Maji, Jing Zhang, Nataliya Timoshevskaya, and Wu-Chun Feng
  • MapReduce for Large-Scale Monitor Data Analyses
    Jianwei Ding, Yingbo Liu, Li Zhang, and Jianmin Wang
  • FedLoop: Looping on Federated MapReduce
    Chun-Yu Wang, Tzu-Li Tai, Kuan-Chieh Huang, Tse-En Liu, Jyh-Biau Chang, and Ce-Kuen Shieh
  • In-Map/In-Reduce: Concurrent Job Execution in MapReduce
    Muhammad Idris, Shujaat Hussain, and Sungyoung Lee

BDSE Session #6: Big Data Storage
Session Chair: Tzu-Li Tai
  • An Improved Image File Storage Method Using Data Deduplication
    Zhou Lei, Zhaoxin Li, Yu Lei, Yanling Bi, Luokai Hu, and Wenfeng Shen
  • HBaseSpatial: A Scalable Spatial Data Storage Based on HBase
    Ningyu Zhang, Guozhou Zheng, Huajun Chen, Jiaoyan Chen, and Xi Chen
  • On the Application and Performance of MongoDB for Climate Satellite Data
    Parinaz Ameri, Udo Grabowski, Jörg Meyer, and Achim Streit
  • Research of Provenance Storage in Cloud Computing Environment
    Zhangxuan Luo and Guoyan Xu
  • Data Interface All-iN-A-Place (DIANA) for Big Data
    Frank Zhigang Wang, Theo Dimitrakos, Na Helian, Sining Wu, Yuhui Deng, Ling Li, and Rodric Yates


The 2nd International Workshop on Network Optimization and Performance Evaluation (NOPE 2014)

  • A Load Balancing Strategy of SDN Controller Based on Distributed Decision
    Yuanhao Zhou, Mingfa Zhu, Limin Xiao, Li Ruan, Wenbo Duan, Deguo Li, Rui Liu, and Mingming Zhu
  • Modeling Degrees of Fairness for Collaborations
    Florian Volk, Maria Pelevina, Sheikh Mahbub Habib, Sascha Hauke, and Max Mühlhäuser
  • Performance Analysis on M2M Communication Network Based on Stochastic Network Calculus
    Zhou Tao, Wang Quan, and Wang Gao-Cai
  • Mining Specification of Insecure Browser Extension Behavior
    Hongbin Pei, Xiaohong Li, Guangquan Xu, and Zhiyong Feng


The 6th International Symposium on UbiSafe Computing (UbiSafe 2014)

  • A Novel Public Key Encryption Scheme for Large Image
    Lingjiao Chen, Xinji Chen, and Zhigang Peng
  • Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN
    Guorui Li, Ying Liu, and Ying Wang
  • Attacks on Physically-Embedded Data Encryption for Embedded Devices
    Chaohui Du and Guoqiang Bai
  • Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords
    Hani Moaiteq Aljahdali and Ron Poet
  • Escrow: A Large-Scale Web Vulnerability Assessment Tool
    Baden Delamore and Ryan K.L. Ko
  • Personal Data Access Based on Trust Assessment in Mobile Social Networking
    Zheng Yan, Xueyun Li, and Raimo Kantola
  • Synthesising End-to-End Security Protocols
    Charles Thevathayan, Peter Bertok, and George Fernandez


The 7th International Symposium on Security, Privacy and Anonymity in Internet of Things (SpaIoT 2014)

  • A Compact Hardware Implementation of SM3 Hash Function
    Tianyong Ao, Zhangqing He, Jinli Rao, Kui Dai, and Xuecheng Zou
  • Detection of Android Malicious Apps Based on the Sensitive Behaviors
    Daiyong Quan, Lidong Zhai, Fan Yang, and Peng Wang
  • Digital Trust - Trusted Computing and Beyond: A Position Paper
    Raja Naeem Akram and Ryan K.L. Ko
  • Identifying P2P Network Activities on Encrypted Traffic
    Xiaolei Wang, Jie He, and Yuexiang Yang
  • Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart Posters
    Sufian Hameed, Bilal Hameed, Syed Atyab Hussain, and Waqas Khalid
  • Survey of Integrity Detection Methods in Internet of Things
    Chaoliang Li, Qin Li, and Guojun Wang
  • TEEI - A Mobile Security Infrastructure for TEE Integration
    Hongfeng Chai, Zhijun Lu, Qingyang Meng, Jun Wang, Xiubang Zhang, and Zhijian Zhang


The 1st International Workshop on the Emerging Future Internet and Network Security (EFINS 2014)

  • A Semantic Knowledge Base Construction Method for Information Security
    Yuangang Yao, Xiaoyu Ma, Hui Liu, Jin Yi, Xianghui Zhao, and Lin Liu
  • Adding Privacy to Multicast DNS Service Discovery
    Daniel Kaiser and Marcel Waldvogel
  • Encrypted Program Execution
    Dmytro Zhuravlev, Ihor Samoilovych, Roman Orlovskyi, Ievgen Bondarenko, and Yaroslav Lavrenyuk
  • Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy Clustering
    Duo Liu, Chung-Horng Lung, Nabil Seddigh, and Biswajit Nandy
  • Unified Model for Data Security - A Position Paper
    Raja Naeem Akram and Ryan K.L. Ko
  • A Secure Authentication Protocol for IP-Based Wireless Sensor Communications Using the Location/ID Split Protocol (LISP)
    Ali Raheem, Aboubaker Lasebae, and Jonathan Loo


The 4th International Symposium on Trust and Security in Cloud Computing (TSCloud 2014)

  • Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud
    Quang Do, Ben Martini, and Kim-Kwang Raymond Choo
  • Continuous Certification of Non-repudiation in Cloud Storage Services
    Maria Krotsiani and George Spanoudakis
  • JVM-Based Dynamic Attestation in Cloud Computing
    Haihe Ba, Zhiying Wang, Jiangchun Ren, and Huaizhe Zhou
  • Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept
    Ben Martini and Kim-Kwang Raymond Choo
  • vPatcher: VMI-Based Transparent Data Patching to Secure Software in the Cloud
    Hao Zhang, Lei Zhao, Lai Xu, Lina Wang, and Deming Wu

Computer Science
Tsinghua University