Accepted Papers of IEEE TrustCom-11 and its Associated Symposiums/Workshops

 

1. TrustCom-11: Accepted Papers


2. Ubisafe-11: Accepted Papers


3. ISSR-11: Accepted Papers


4. SPIoT-11: Accepted Papers


5. ACS-11: Accepted Papers


6. TrustID-11: Accepted Papers


7. SQC-11: Accepted Papers


8. TSCloud-11: Accepted Papers


 

 
(1) The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11)
Serial Paper-ID Title Authors E-mail
1 TrustCom11-23 A Charge PSO Inspired Method for Generating Immune Detectors for Network Intrusion Detection Mark Heydenrych, Elize Ehlers swinefish@gmail.com
2 TrustCom11-34 A Cooperative Mechanism to Defense Against Distributed Denial of Service Attacks Hakem Beitollahi, Geert Deconinck Hakem.Beitollahi@esat.kuleuven.be
3 TrustCom11-35 Estimates of Success Rates of Denial-of-Service Attacks Teodor Sommestad, Hannes Holm, Mathias Ekstedt teodors@ics.kth.se
4 TrustCom11-36 A Scalability Study of AAA Support in Heterogeneous Networking Environments with Global Roaming Support Daniel Granlund, Christer Ahlund daniel.granlund@ltu.se
5 TrustCom11-43 A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems Hsiao-Ying Lin, Wen-Guey Tzeng, Bao-Shuh Lin hsiaoying.lin@gmail.com
6 TrustCom11-45 Trusted Block as a Service: Towards Sensitive Applications on the Cloud Jianan Hao, Wentong Cai haojn@pmail.ntu.edu.sg
7 TrustCom11-46 A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad hoc Networks JI GUO, Alan Marshall, Bosheng Zhou jguo04@qub.ac.uk
8 TrustCom11-48 Privacy Crisis due to Crisis Response on the Web Shao-Yu Wu, Ming-Hung Wang, Kuan-Ta Chen derec.wu@gmail.com
9 TrustCom11-70 LoongChecker: Practical Summary-based Semi-simulation to Detect Vulnerability in Binary Code Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, Fan Jiang sycheng@ustc.edu.cn
10 TrustCom11-76 DENNC: A Wireless Malicious Detection Approach based on Network Coding Hong SONG, Xiao XIAO, Weiping WANG, Luming YANG songhong@mail.csu.edu.cn
11 TrustCom11-77 Piracy-Preserved Access Control for Cloud Computing Miao Zhou, Yi Mu, Willy Susilo, Jun Yan ymu@uow.edu.au
12 TrustCom11-78 A Privacy-friendly RFID Protocol using Reusable Anonymous Tickets Mahdi Asadpour, Mohammad Torabi Dashti mahdi.asadpour@tik.ee.ethz.ch
13 TrustCom11-80 A Reputation Mechanism for Virtual Reality--Five-Sense Oriented Feedback Provision and Subjectivity Alignment Hui Fang, Jie Zhang, Murat Sensoy, Nadia Magnenat Thalmann hfang1@e.ntu.edu.sg
14 TrustCom11-81 A Trust Prediction Model for Service Web Wanita SHERCHAN, Surya NEPAL, Athman Bouguettaya wanita.sherchan@gmail.com
15 TrustCom11-89 SWtrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks Wenjun Jiang, Guojun Wang wenjj8a@gmail.com
16 TrustCom11-90 Capturing Malware Behavior based on Taint Propagation and Stack Backtracing Jianming Fu, Xinwen Liu, Binling Cheng jmfu@whu.edu.cn
17 TrustCom11-96 Distributed Private-Key Generation Scheme with Self-Certified Identity Yongming Xie, Guojun Wang ymxiecsu@gmail.com
18 TrustCom11-98 Intelligent Assistant for Context-Aware Policies Helen Balinsky, Neil Moore, Steven Simske Helen.Balinsky@hp.com
19 TrustCom11-100 Publicly Posted Composite Documents in Variably Ordered Workflows Helen Balinsky, Liqun Chen, Steven Simske Helen.Balinsky@hp.com
20 TrustCom11-101 A DRTM-based Method for Trusted Network Connection Feng Wei, Qin Yu, Yu Ai-Min fengwei@is.iscas.ac.cn
21 TrustCom11-103 Design Comparison to Identify Malicious Hardware in External Intellectual Property Trey Reece, William Robinson, Daniel Limbrick trey.reece@vanderbilt.edu
22 TrustCom11-104 Learning Whom to Trust in a Privacy-Friendly Way Sebastian Ries, Marc Fischlin, Leonardo A. Martucci ries@cased.de
23 TrustCom11-108 A Private and Scalable Authentication for RFID Systems Using Reasonable Storage XIAOLIN CAO, MAIRE O'NEILL xcao03@qub.ac.uk
24 TrustCom11-111 Unwanted Traffic Control via Global Trust Management Zheng Yan, Raimo Kantola, Yue Shen zheng.yan@aalto.fi
25 TrustCom11-114 A Reliable and Secure Distributed In-Network Data Storage Scheme in Wireless Sensor Networks Muhammad Bashir Abdullahi, Guojun Wang, Felix Musau el.bashir02@gmail.com
26 TrustCom11-116 DACC: Distributed Access Control In Clouds Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic sruj@site.uottawa.ca
27 TrustCom11-119 Case-Based Trust Evaluation from Provenance Information Quan Bai, Xing Su, Qing Liu, Andrew Terhorst, Minjie Zhang, Yi Mu quan.bai@aut.ac.nz
28 TrustCom11-121 Trust-Based Approaches to Solve Routing Issues in Ad-hoc Wireless Networks: A Survey Jesus Gonzalez jmg93@pitt.edu
29 TrustCom11-122 Uncovering SIP Vulnerabilities to DoS Attacks Using Coloured Petri Nets Lin Liu lin.liu@unisa.edu.au
30 TrustCom11-124 A Framework for Reputation Bootstrapping Based on Reputation Utility and Game Theories Han Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu han.jiao@unisa.edu.au
31 TrustCom11-125 Launching Return-Oriented Programming Attacks Against Randomized Relocatable Executables Limin Liu, Jin Han, Jiwu Jing, Daren Zha jin.han.2007@smu.edu.sg
32 TrustCom11-126 Highly Efficient Distance-Based Anomaly Detection Through Univariate with PCA in Wireless Sensor Networks Miao Xie, Song Han, Biming Tian clifford1984621@gmail.com
33 TrustCom11-129 Secret Sharing Scheme with Fairness Youliang Tian, Jianfeng Ma, Changgen Peng, Jianming Zhu youliangtian@163.com
34 TrustCom11-138 SWHash: An Efficient Datka Integrity Verification Scheme Appropriate for USB Flash Disk Cheng Yong, Wang Zhiying, Wu Jiangjiang, Mei Songzhu, Ren Jiangchun, Ma Jun yizhongchy@163.com
35 TrustCom11-140 Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai hori@inf.kyushu-u.ac.jp
36 TrustCom11-142 Interaction Ranking-Based Trustworthy Friend Recommendation in Virtual Communities Lizi Zhang, Hui Fang, Wee Keong Ng, Jie Zhang y080077@ntu.edu.sg
37 TrustCom11-174 Geometric Invariant Digital Image Watermarking Scheme Based on Feature Points Detector and Histogram Distribution Chi-Man Pun, Xiao-Chen Yuan, Philip C. L. Chen cmpun@umac.mo
38 TrustCom11-176 Semantics-enhanced Privacy Recommendation for Social Networking Sites Juan Li, Qingrui Li, Hui Wang, Ashok Ginjala j.li@ndsu.edu
39 TrustCom11-180 An EAP Framework for Unified Authentication in Wireless Networks Saurabh Kumar, Khosrow Ramezani, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan e.sithirasenan@griffith.edu.au
40 TrustCom11-184 A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks Qian Sun, Min Wu sun_qian@csu.edu.cn
41 TrustCom11-185 Biometric Enabled Portable Trusted Computing Platform Julian Jang, Hon Hwang, Surya Nepal julian.jang@csiro.au
42 TrustCom11-186 Secure Virtual Layer Management of the Clouds Imad Abbadi, Muntaha Alawneh, Andrew Martin im_abbadi@hotmail.com
43 TrustCom11-188 Forecasting the Distribution of Network Traffic for Anomaly Detection Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe christian.callegari@iet.unipi.it
44 TrustCom11-193 RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong, Edith C.-H. Ngai, Yangfan Zhou, Michael R. Lyu jjxiong@cse.cuhk.edu.hk
45 TrustCom11-194 Inter-Chip Authentication through I/O Character Fangyong Hou, Nong Xiao, Hongjun He, Fang Liu fangyonghou@163.com
46 TrustCom11-196 Exploring and Enhancing the Performance of Parallel IDS on Multi-Core Processors Haiyang Jiang, Jianhua Yang, Gaogang Xie jianghaiyang@ict.ac.cn
47 TrustCom11-217 A Privacy-Preserving Defense Mechanism Against Request Forgery Attacks Ben S. Y. Fung, Patrick P. C. Lee pclee@cse.cuhk.edu.hk
48 TrustCom11-218 CNSSA: A Comprehensive Network Security Situation Awareness System Rongrong Xi, Shuyuan Jin, Xiaochun Yun, Yongzheng Zhang s.jin@deakin.edu.au
49 TrustCom11-220 Ensuring Secure Information Flow in Partially Reconfigurable Architectures by Means of Process Algebra Analysis Andre Seffrin, Sorin A. Huss andre.seffrin@cased.de
50 TrustCom11-221 A Research Model for Human-Computer Trust Interaction Zheng Yan, Raimo Kandola, Peng Zhang zheng.yan@aalto.fi
51 TrustCom11-225 Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs Silvio Cesare, Yang Xiang silvio.cesare@gmail.com
52 TrustCom11-226 A Survey on Latest Botnet Attacks and Defenses Lei Zhang, Shui Yu, Di Wu, Paul Watters zhanglei80168000@yahoo.com.cn
53 TrustCom11-228 Biometric Identification Using User Interactions with Virtual Worlds Ahmed Al-Khazzar, Nick Savage ahmed.al-khazzar@port.ac.uk
54 TrustCom11-229 Repeated Differential Properties of the AES-128 and AES-256 Key Schedules Jianyong Huang, Willy Susilo, Jennifer Seberry jyh33@uowmail.edu.au
55 TrustCom11-230 Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks Sancheng Peng, Guojun Wang psc346@gmail.com
56 TrustCom11-231 A Secure Multicoupon Solution for Multi-Merchant Scenarios Andre-Pere Isern-Deyà, M. Francisca Hinarejos, Josep-Lluís Ferrer-Gomila, Magdalena Payeras-Capellà andreupere.isern@uib.es
57 TrustCom11-237 Towards Context-aware Service-oriented Semantic Reputation Framework Rehab Alnemr, Maxim Schnjakin, Christoph Meinel rehab.alnemr@hpi.uni-potsdam.de
58 TrustCom11-239 A Simple Balanced Password-based Authentication Key Agreement Protocol Fuwen Liu, Hartmut Koenig lfw@informatik.tu-cottbus.de
59 TrustCom11-241 Efficiently Achieving Full Three-Way Non-repudiation in Consumer-level eCommerce and M-Commerce Transactions Stephen Neville, Michael Horie horiem@uvic.ca
60 TrustCom11-244 Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks Tassos Dimitriou, Ahmad Sabouri ahmad.sabouri@m-chair.net
61 TrustCom11-248 Trust Ticket Deployment: A Notion of Data Owner’s Trust in Cloud Computing Mahbub Ahmed Ahmed, Yang Xiang mahmed@deakin.edu.au
62 TrustCom11-267 Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks using Reputation Systems coupled with Clustering Techniques Zorana Bankovic, José M. Moya, Juan Carlos Vallejo, David Fraga, Pedro Malagón zorana@die.upm.es
63 TrustCom11-269 Mutual Authentication Protocol for Networked RFID Systems Jemal Abawajy, Harinda Fernando jemal@deakin.edu.au
64 TrustCom11-275 Lightweight Hidden Service Andriy Panchenko, Otto Spaniol, Andre Egners, Thomas Engel andriy.panchenko@uni.lu
65 TrustCom11-276 A Hybrid Trust Model for Authorisation Using Trusted Platforms Aarthi Krishna, Vijay Varadharajan aarthi14@gmail.com
66 TrustCom11-277 A Method for Detecting Unknown Malicious Executables Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel rozenbu@bgu.ac.il
67 TrustCom11-281 A Quantitative Approach to Triaging in Mobile Forensics Fabio Marturana, Rosamaria Bertè, Gianluigi Me, Simone Tacconi rosamariaberte@libero.it
68 TrustCom11-282 Trust-based Cluster head Selection Algorithm for Mobile Ad hoc Networks Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan raihana.ferdous@griffithuni.edu.au
69 TrustCom11-283 Security Issues in NoSQL Databases Lior Okman, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes, Jenny Abramov galoz@cs.bgu.ac.il
70 TrustCom11-285 Towards a Holistic Privacy Engineering Approach for Smart Grid Systems Hervais Simo Fhom, Kpatcha M. Bayarou hervais.simo@sit.fraunhofer.de
71 TrustCom11-286 Cross-Platform Application Sharing Mechanism Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes r.n.akram@rhul.ac.uk
72 TrustCom11-287 A New Security Architecture for BitTorrent Firas Bader, Andra Radoveneanu, Hani Ragab Hassen h.ragab@kent.ac.uk
73 TrustCom11-288 An Access Control Framework for the Web of Data Owen Sacco, Alexandre Passant, Stefan Decker owen.sacco@deri.org
74 TrustCom11-289 Establishing Trust in Hybrid Cloud Computing Environments Jemal Abawajy jemal@deakin.edu.au
75 TrustCom11-291 A Model For A Testbed For Evaluating Reputation Systems Partheeban Chandrasekaran, Babak Esfandiari pchandr3@connect.carleton.ca
76 TrustCom11-293 Trust ME: a Trust Decision Framework for Mobile Environments Gonzalo Huerta-Canepa, Dongman Lee ghuerta@kaist.ac.kr
77 TrustCom11-295 A Logical Framework of Proof-Carrying Survivability Yanjun Zuo, Suhas Lande yanjun.zuo@und.edu
78 TrustCom11-298 TVLAN: Trusted and Virtualised Local Area Networks Udaya Tupakula, Vijay Varadharajan udaya.tupakula@mq.edu.au
79 TrustCom11-302 Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses Ricardo Santos, Jorge Bernardino, Marco Vieira lionsoftware.ricardo@gmail.com
80 TrustCom11-306 SMEF: An Entropy-based Security Framework for Cloud-oriented Service Mashup Ruixuan Li, Li Nie, Xiaopu Ma, Meng Dong, Wei Wang rxli@hust.edu.cn
81 TrustCom11-309 Towards Scalable, Fine-grained, Intrusion Tolerant Data Protection Models for Healthcare Cloud Lingfeng Chen, Boan B. Hoang Lingfeng.Chen@student.uts.edu.au
82 TrustCom11-310 Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems Lili Sun sun@usq.edu.au
Top

 

 

 
(2) The 3rd IEEE International Symposium on UbiSafe Computing (IEEE UbiSafe 2011)
Serial Paper-ID Title Authors E-mail
1 UbiSafe11-115 A Model for Automating Persistent Identity Clone in Online Social Network Bhume Bhumiratana bhume@cpe.kmutt.ac.th
2 UbiSafe11-130 Flexible Communication: A Secure and Trust-Based Free Wi-Fi Password Sharing Service Carlos Ballester Lafuente, Xavier Titi, Jean-Marc Seigneur carlos.ballester@unige.ch
3 UbiSafe11-139  An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-based MANETs Fatemeh Barani, Mahdi Abadi abadi@modares.ac.ir
4 UbiSafe11-234  Decreasing SoC Test Power Dissipation and Test Data Volume based on Test Pattern Recombination Chunlei Mei, Maoxiang Yi, Zhifei Shen mxyi902@hfut.edu.cn
5 UbiSafe11-264  Dependable Context-sensitive Services in Cyber Physical Systems Kaiyu Wan, Vangalur Alagar alagar@cse.concordia.ca
6 UbiSafe11-268  An Enhanced Method for Computation of Similarity between the Contexts in Trust Evaluation using Weighted Anthology Mohammad Amin Morid, Amin Omidvar, Hamid Reza Shahriari omidvaramin@gmail.com
7 UbiSafe11-292  A Trusted Integrity Measurement Architecture for Securing Enterprise Network Tong Liu, Prathima Agrawal liutong@auburn.edu
8 UbiSafe11-303 Statistical Fault Localization via Semi-Dynamic Program Slicing Rongwei YU, Lei ZHAO, Lina WANG, Xiaodan YIN roewe.yu@whu.edu.cn
Top

 

 

 
(3) The 3rd IEEE International Workshop on Security in e-Science and e-Research (IEEE ISSR 2011)
Serial Paper-ID Title Authors E-mail
1 ISSR11-71 Design and Implementation of Single Sign On System with Cluster CAS for Public Service Platform of Science and Technology Evaluation Fang Huang, Caixia Wang, Jun Long hfang@mail.csu.edu.cn
2 ISSR11-113  A Framework for the Assessment of the Trustworthiness of Digital Records over Time Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård majian@idi.ntnu.no
3 ISSR11-117 eHCBAC: Flexible Column Based Access Control for Electronic Healthcare Systems  Mei Liu, Ge Fu, Jiwu Jing fuge2006@gmail.com
4 ISSR11-170  Enhancing Flexibility of TCG’s TNC through Layered Property Attestation Aimin Yu, Shijun Zhao yuaimin@is.iscas.ac.cn
5 ISSR11-265  Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments Ryan Kok Leong Ko, Peter Jagadpramana, Bu Sung Lee ryan.ko@hp.com
6 ISSR11-299  Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning Md Tanzim Khorshed, A B M Shawkat Ali, Saleh Wasimi s.ali@cqu.edu.au
Top

 

 

 
(4) The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (IEEE SPIoT 2011)
Serial Paper-ID Title Authors E-mail
1 SPIoT11-28 Remedying the Hummingbird Cryptographic Algorithm Xinxin Fan, Guang Gong, Honggang Hu hghu2005@gmail.com
3 SPIoT11-71 Protection Profile of Personal Information Security System Hyun-Jung Lee, Dongho Won hjlee@kosyas.com
4 SPIoT11-94  Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service Chi-won Song, Sungmin Park, Dong-Wook Kim, Sooyong Kang sykang@hanyang.ac.kr
5 SPIoT11-128 Home Service Communities and Authentication Warodom WERAPUN, Beatrice PAILLASSA, Julien FASSON warodom.werapun@enseeiht.fr
6 SPIoT11-132  Key Privacy in McEliece Public Key Cryptosystem Wang Qiang, Qiu Xue, Zhang Quan, Tang Chaojing wenjunwang.nudt@gmail.com
7 SPIoT11-168  A RFID-based Context-Aware Service Model Jin-fang SHENG, Wen ZOU, Liu YANG, Bin WANG jfsheng@csu.edu.cn
8 SPIoT11-191 Defining and Analyzing Insiders and their Threats in Organizations Muntaha Alawneh, Imad Abbadi prai246@live.rhul.ac.uk
9 SPIoT11-224 Adaptive Client-Side LUT-Based Digital Watermarking Chi-Man Pun, Jing-Jing Jiang, Philip C. L. Chen cmpun@umac.mo
10 SPIoT11-233  Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability Fei Tang, Changlu Lin, Yong Li, Shengyuan Zhang tangfei127@163.com
11 SPIoT11-238  Integrity Protection for Automated Teller Machines Ronald Petrlic ronald.petrlic@upb.de
Top

 

 

 
(5) The 2011 IEEE International Workshop on Anonimity and Communication Systems (IEEE ACS 2011)
Serial Paper-ID Title Authors E-mail
1 ACS11-112  Group Formation with Neighbor Similarity Trust in P2P E-Commerce Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi musaunf@gmail.com
2 ACS11-133  STrust: A Trust Model for Social Networks Surya Nepal, Wanita Sherchan, Cecile Paris surya.nepal@csiro.au
3 ACS11-296  Attack Victor Analysis and Privacy-Preserving Social Network Data Publishing Mohd Izuan Hafez Ninggal, Jemal Abawajy jemal@deakin.edu.au
Top

 

 

 
(6) The 2011 IEEE International Workshop on Trust and Identity in Mobile Internet, Computing and Communications (IEEE TrustID 2011)
Serial Paper-ID Title Authors E-mail
1 TrustID11-22 A new multivariate hash function with HAIFA construction Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang youjiaozou@gmail.com, ranzhj@126.com, wp_ma@xidian.edu.cn, spwang@xaut.edu.cn
2 TrustID11-23 The Role of Trust in Social Life Yan Dong dong8958@126.com
3 TrustID11-26 Theoretical Issues in the Study of Trust in Human-Computer Interaction Zheng Yan, Raimo Kantola, Peng Zhang zheng.yan@aalto.fi, raimo.kantola@tkk.fi, pzhang@xupt.edu.cn
4 TrustID11-27 Implementation of a Reputation System for Pervasive Social Networking Yu Chen, Zheng Yan, Valtteri Niemi yu.chen@epfl.ch,zheng.yan@aalto.fi, valtteri.niemi@nokia.com 
5 TrustID11-28 Design and Evaluation of an Architecture for Ubiquitous User Authentication based on Identity Management Systems Marc Barisch marc.barisch@ikr.uni-stuttgart.de
6 TrustID11-57 Building up trusted identity management in mobile heterogeneous environment Peng Zhang, Hanlin Sun, Zheng Yan pzhang@xupt.edu.cn, sunhanlin@gmail.com, zheng.yan@aalto.fi
7 TrustID11-77 Reputation based Collaboration among Ethernet Switches Timo Kiravuo timo.kiravuo@hut.fi
8 TrustID11-79 Internet Users' Security and Privacy while they Interact with Amazon Giampaolo Bella, Lizzie Coles-Kemp giamp@dmi.unict.it, lizzie.coles-kemp@rhul.ac.uk
Top

 

 

 
(7) The 2011 IEEE International Workshop on Security and Quantum Communications (IEEE SQC 2011)
Serial Paper-ID Title Authors E-mail
1 SQC11-48 Gray Map and Quantum Codes over the Ring F_2+uF_2+u^2F_2 XunRu YIN, WenPing MA xryin@mail.xidian.edu.cn
2 SQC11-74 Quantum Secure Communication Based on Nonmaximally Entangled Qubit Pair and Dining Cryptographers Problem Ronghua Shi shirh@mail.csu.edu.cn
3 SQC11-75 Multiparty Quantum Group Signature Scheme with Quantum Parallel Computation Ronghua Shi shirh@mail.csu.edu.cn
4 SQC11-76 Quantum Distributed Ballot Scheme based on entanglement swapping xiaoping Lou morningapple2003@yahoo.com.cn
5  SQC11-294  Phishing Email Feature Selection Approach Jemal Abawajy, Isredza Rahmi A Hamid jemal@deakin.edu.au
Top

 

 

 
(8) The 1st IEEE International Workshop on Trust and Security in Cloud Computing (IEEE TSCloud 2011)
Serial Paper-ID Title Authors E-mail
1 TSCloud11-6 Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning Yujing Liu, Wei Peng and Jinshu Su liuyujing@nudt.edu.cn
2 TSCloud11-7 User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment Adeela Waqar, Asad Raza and Haider Abbas adeela.abbas@gmail.com,  asadraza@mcs.edu.pk,           haider@mcs.edu.pk
3 TSCloud11-11 Towards a Trust Management System for Cloud Computing Sheikh Mahbub Habib, Sebastian Ries and Max Mühlhäuser sheikh.habib@cased.de, ries@cased.de
4 TSCloud11-12 Migration to Cloud as Real Option: Investment decision under uncertainty  Cy Yam, Adrian Baldwin, Christos Ioanndis and Simon Shiu chew-yean.yam@hp.com, adrian.baldwin@hp.com,   c.ioannidis@bath.ac.uk,          simon.shiu@hp.com
Top