Melbourne Skyline Melbourne Skyline Federation Square Convention Centre Dockland Royal Exhibition Building Twelve Apostles Twelve Apostles Penguin Parade Kanguroos
Accepted Papers

Camera-ready Paper Instructions for TrustCom/ISPA/IUCC 2013 and associated workshops

 

Please follow the instructions below to upload your camera-ready papers:

  1. Revise your paper thoroughly based on reviewers' comments.
  2. Format your paper according to IEEE conference paper format. The template files for LATEX or WORD can be downloaded here. The template files can also be found in Step 4 - Formatting your Paper at the Online Author Kit page (page link is provided below).
  3. Please try not to change your paper title. In case you really need to change your paper title, please email mel.conferences@gmail.com about this with an email subject "PAPER TITLE CHANGE REQUEST paper ID" and include the original submission title, new title, and author names. Otherwise, we may remove your paper from the proceedings by accident.
  4. Regular Papers are limited to 8 pages, including all figures, tables, and references. Workshop papers are limited to 6 pages. Up to 2 extra pages may be purchased at A$50 (Australian dollars) per extra page for both regular and workshop papers. Payment must be made together with your registration.
  5. Your Paper ID is "the conference acronym#paper number". For example, if your paper number in TrustCom2013 is 23, then your paper ID is TrustCom#23.
  6. Register your papers by May 15, 2013 which is strictly enforced. If we do not receive your registration by this date, your papers will be removed. Registration instructions can be found at the Registration page.
  7. Upload your camera-ready papers to IEEE Online Author Kit by May 15, 2013 which is also strictly enforced. All conferences including TrustCom 2013, ISPA 2013, IUCC2013 and associated workshops are sharing the same IEEE uploading account of TrustCom 2013. Please use TrustCom 2013 as the submission site for uploading your camera-ready papers..
  8. If Step 5 of the Online Author Kit does not work properly, please skip it by generating the PDF file by yourself and then uploading it. However, you must follow the IEEE paper format which is provided by Step 4 at the Online Author Kit page.
  9. The copyright form is online with the Online Author Kit and is made in the name of TrustCom 2013.

 

The following is the URL link to the "Author's Final Paper Formatting and Submission Instructions" Webpage (Online Author Kit) for 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013):

http://www.ieeeconfpublishing.org/cpir/authorKit.asp?Facility=CPS_July&ERoom=TrustCom+2013

 

Accepted papers:

 

1. A secure Authentication Scheme for Session Initiation Protocol using ECC based on Hongbin et al, scheme
Azeem Irshad, Muhammad Sher, Muhammad Usman, Mahmood Ul hassan, Anwer Ghani, Shahzad Ashraf, Muhammad Shahzad Faisal
2. Privacy Protected Data Forwarding in Human associated Delay Tolerant Networks
Longxiang Gao, Ming Li, Wanlei Zhou, Wen Shi
3. DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics
Yuan Tao, Shui Yu
4. A Fuzzy Modeling Approach for Risk-based Access Control in eHealth Cloud
Juan Li, Yan Bai, Nazia Zaman
5. Word N-gram Based Classification for Data Leakage Prevention
Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy
6. Research on the anti-attack design principles of low-latency anonymous communication
Ming Zheng, Jianping Wu, Haixin Duan
7. A Privacy-Leakage-Tolerance based Noise Enhancing Strategy for Privacy Protection in Cloud Computing
Gaofeng Zhang, Yun Yang, Jinjun Chen
8. An Online Query Authentication System for Outsourced Databases
Ying Zhou, Chen Wang
9. Unwanted Content Control via Trust Management in Pervasive Social Networking
Zheng Yan, Raimo Kantola, Gaowa Shi, Peng Zhang
10. Visual Analytics Model for Intrusion Detection in Flood Attack
Jinson Zhang, Mao Lin Huang
11. Determining Similar Recommenders using Improved Collaborative Filtering in MANETs
Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan
12. Privacy-Enhanced Keyword Search in Clouds
Miao Zhou, Mu Yi, Willy Susilo, Man Ho Au
13. Privacy-Preserving Wireless Medical Sensor Network
Xun Yi, Jan Willemson, Farid Nait-Abdesselam
14. From Mini House Game to Hobby-driven Behavioral Biometrics-based Password
Weiyu Jiang, Ji Xiang, Limin Liu, Daren Zha
15. A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices
Gwan-Hwan Hwang, Jenn-Zjone Peng, Wei-Sian Huang
16. Development and Analysis of Generic VoIP Attack Sequences Based on Analysis of Real Attack Traffic
Adnan Aziz, Dirk Hoffstadt, Sebastian Ganz, Erwin Rathgeb
17. A secure and efficient fault-tolerant group key agreement protocol
Anmin Fu, Gongxuan Zhang, Zhenchao Zhu
18. Identity-based Mediated RSA Revisited
Ibrahim Elashry, Yi Mu, Willy Susilo
19. A Threat to Mobile Cyber-physical Systems: Sensor-based Privacy Theft Attacks on Android Smartphones
Lingguang Lei, Yuewu Wang, Jian Zhou, Lei Wang, Zhongwen Zhang
20. Integrating Trust with Cryptographic Role-based Access Control for Secure Cloud Data Storage
Lan Zhou, Vijay Varadharajan, Michael Hitchens
21. A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces
Sheikh Habib, Vijay Varadharajan, Max Muehlhaeuser
22. An Application Security Framework for Near Field Communication
Dirar Abu-Saymeh, Dhiah el Diehn I. Abou-Tair, Ahmad Zmily
23. Scalable Attack Representation Model Using Logic Reduction Techniques
Jin B. Hong, Dong Seong Kim, Tadao Takaoka
24. ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain
Qihui Zhou, Dan Wang, Yan Zhang, Bo Qin, Aimin Yu
25. Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection
Yuxin Meng, Lam-for Kwok
26. A Model for Context-Aware Location Identity Preservation using Differential Privacy
Roland Assam, Thomas Seidl
27. DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware
Min Zheng, Mingshen Sun, John C.S. Lui
28. P3MCF: Practical Privacy-Preserving Multi-Domain Collaborative Filtering
Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake
29. A Direct Insight into Victims of Cybercrime
Nicholas Patterson, Michael Hobbs, Darren Palmer
30. Securing Domain Name System combined with MIPv6 for Mobile Hosts
Younchan Jung, Marnel Peradilla, J. William Atwood
31. S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance
Chun Hui Suen, Ryan K L Ko, Yu Shyang Tan, Peter Jagadpramana, Bu Sung Lee
32. Distributed Group Key Management Using Multilinear Forms for Multi-priviledged Group Communications
Wei Zhou, Yang Xu, Guojun Wang
33. On the use of LSH for privacy preserving personalization
Armen Aghasaryan, Makram Bouzid, Dimitre Kostadinov, Mohit Kothari, Animesh Nandi
34. Light-weight Trust-based On-demand Multipath Routing Protocol for Mobile Ad Hoc Networks
Chuanhao Qu, Zhiping Jia, Lei Ju, Huaqiang Xu
35. Access Control Management for Cloud
Mansura Habiba, Md. Rafiqul Islam, A B M Shawkat Ali
36. Hierarchical Attribute-based Access Control with Authentication to Outsourced Data in Cloud Computing
Xuejiao Liu, Yingjie Xia, Shasha Jiang, Fubiao Xia
37. Rational secret sharing information-theoretically secure against adaptive adversaries
yang yu, zhanfei zhou
38. Modeling Malware Propagation in Smartphone Social Networks
Sancheng Peng, Guojun Wang, Shui Yu
39. On the Application of Supervised Machine Learning to Trustworthiness Assessment
Sascha Hauke, Sebastian Biedermann, Dominik Heider
40. Card-present Transactions On The Internet Using The Smart Card Web Server
Lazaros Kyrillidis, Keith Mayes, Boris Chazalet, Konstantinos Markantonakis
41. iPEKS: Fast and Secure Cloud Data Retrieval from the Public-key Encryption with Keyword Search
Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Lin
42. Improving the Utility of Differentially Private Data Releases via k-Anonymity
Jordi Soria-Comas, Josep Domingo-Ferrer, David Sánchez, Sergio Martínez
43. Single Sign-on Schemes Constructed from Nominative Signatures
Jingquan Wang, Guilin Wang, Willy Susilo
44. Garbled Routing (GR): Towards Unification of Anonymous Networks
Shaahin Madani, Ibrahim Khalil
45. TISON: Trust Inference computation for online Social Networks
Sana HAMDI, Amel BOUZEGHOUB, Alda LOPES GANCARSKI, Sadok BEN YAHIA
46. Building Confidence in Information-Trustworthiness Metrics for Decision Support
Jason Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts
47. Performance Evaluation of Trust-based Collaborative Sanctioning in MANETs
Marcin Seredynski, Krzysztof Szczypiorski, Djamel Khadraoui
48. Securing Mobile Mashups with SCCM
Florent Batard, Karima Boudaoud, Michel Riveill
49. Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web
Owen Sacco, John G. Breslin, Stefan Decker
50. Securing RTP packets using per-packet selective encryption scheme for real-time multimedia applications
Younchan Jung, Enrique Festijo
51. Developing an Empirical Algorithm for Protecting Text-based CAPTCHAs against Segmentation Attacks
Lei Pan, Yan Zhou
52. Security Routing Based Network Coding in Wireless Sensor Network
Jing Chen, Ruiying Du, Qingyun Lin
53. Security Analysis of a Paillier-based Threshold Proxy Signature Scheme
minghui zheng, yongquan cui, liang chen
54. Cloud Computing: Insider Attacks on Virtual Machines During Migration
Adrian Duncan, Michael Goldsmith, Sadie Creese, Jamie Quinton
55. Formalizing and Modeling Fairness for Benefit Distribution in Collaborations
Florian Volk, Florian Sokoli, Sascha Hauke, Max Mühlhäuser
56. A Novel Evidential Evaluation For Internal Attacks With Dempster-Shafer Theory in WSN
Muhammad Ahmed, Xu Huang, Hongyan Cui
57. TIGER: A Trust-based Intelligent Geographical Energy-aware Routing for Smart Grid Communication Networks
Ming Xiang, William Liu, Quan Bai
58. Attribute-based Mining Process for the Organization-Based Access Control Model
Ahmad Samer Wazan, Gregory Blanc, Hervé Debar, Joaquin Garcia-Alfaro
59. Towards Automation of Privacy and Security Risks Analysis in Identity Management Systems
Ebenezer Paintsil
60. Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment
Wang Yong, Zhang Nan, Wu Yanmei, Su Binbin, Liao Yongjian
61. Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks
Nelcileno Araujo, Ruy de Oliveira, Ed'Wilson Ferreira, Valtemir Nascimento, Ailton Shinoda, Bharat Bhargava
62. PREFETCHing to optimize DNSSEC deployment over large Resolving Platforms
daniel Migault, stephane senecal, stanislas francfort, emmanuel herbert, maryline laurent
63. Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps
Hui Cui, Yi Mu, Man Ho Au
64. Design and Implementation of a Trust Enhanced Distributed Authorisation Architecture for Web Services
Aarthi Krishna, Vijay Varadharajan, Nathan Torr
65. Novel Physically-Embedded Data Encryption for Embedded Device
Fangyong HOU, Nong XIAO, Hongjun HE, Fang LIU
66. Feature Based Video Watermarking Resistant to Geometric Distortions
Xiao-Chen Yuan, Chi-Man Pun
67. A Regional Statistics Detection Scheme against Sybil Attacks in WSNs
Mingxi Li, Yan Xiong, Xuangou Wu, Xiancun Zhou, Yuhui Sun
68. A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems
Abdulmohsen Almalawi, Zahir Tari, Adil Fahad, Ibrahim Khalil
69. A Hybrid Approach for Sub-Tree Anonymization over Big Data using MapReduce on Cloud
Xuyun Zhang, Chang Liu, Surya Nepal, Wanchun Dou, Jinjun Chen
70. An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Scientific Applications in Cloud Computing
Chang Liu, Xuyun Zhang, Chengfei Liu, Yun Yang, Jinjun Chen
71. A Path Vertex Rank based Node Capture Attack Modeling Method
Chi Lin, Guowei Wu
72. A framework for authentication and authorization credentials in cloud computing
Nelson Mimura Gonzalez, Marco Antônio Torrez Rojas, Marcos Vinícius Maciel da Silva, Fernando Redígolo, Tereza Cristina Melo de Brito Carvalho, Charles Christian Miers, Mats Näslund, Abu Shohel Ahmed
73. Efficient Fair UC-Secure Two-Party Computation on Committed Inputs
Ou Ruan, Cai Fu, Jing Zhou, Lansheng Han, Xiao-Yang Liu
74. Security Aspects of Military Sensor-based Defence Systems
Robert Thompson, Michael Johnstone
75. Private Multiparty Set Intersection Protocol in Rational Model
Mohammad Rahman, Atsuko Miyaji, Keita Emura
76. What Is the Pattern of a Botnet?
Wang Tianzuo, Wang Huaimin, Liu Bo, Shi Peichang
77. Scalable and Privacy-Preserving Variants of the Austrian Electronic Mandate System in the Public Cloud
Bernd Zwattendorfer, Daniel Slamanig
78. Power Based Malicious Code Detection Techniques for Smartphones
Bryan Dixon, Shivakant Mishra
79. Profiling Phishing Email Based on Clustering Approach
Isredza Rahmi A Hamid, Jemal H. Abawajy
80. Exploring the Guessability of Image Passwords using Verbal Descriptions
Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie
81. A Discrete Evenet System based approach for Worm Detection
Ferdous Barbhuiya, Tonmoy Saikia, Sukumar Nandi
82. Preserving Utility in Social Network Graph Anonymization
Mohd Izuan Hafez Ninggal, Jemal H. Abawajy
83. Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines
Anindya Iqbal, Tishna Sabrina, Manzur Murshed, Mortuza Ali
84. Public Verification of Outsourced Computation of Polynomial Functions
peili li, haixia xu, shu guo
85. KP-ABE based Verifiable Cloud Access Control Scheme
Xiaolin Si, Pengpian Wang, Liwu Zhang
86. A Privacy-Preserved Joint Group Time Scheduling Mechanism for Mobile Social Applications
Yu-Jia Chen, Chia-Yu Lin, Li-Chun Wang
87. sEncrypt: An Encryption Algorithm Inspired From Biological Processes
oliver Bonham-Carter, Abhishek Parakh, Dhundy Bastola
88. MDS-based Trust Estimation Model for Vehicular Ad-hoc Network
TRaghuVamsi Krishna, Rajesh Barnwal, Soumya Ghosh
89. A Scalable Architecture for Highly Reliable Certification
Xavier Bonnaire, Rudyar Cortés, Fabrice Kordon, Olivier Marin
90. Analyzing Malware by Abstracting the Frequent Itemsets in API call Sequences
Yong Qiao, Yuexiang Yang, Jie He, Chuan Tang
91. AFC: An Effective Metric for Reliable Routing in Wireless Mesh Networks
Rakesh Matam, Somanath Tripathy
92. Mitigating Malicious Updates: Prevention of Insider Threat to Databases
Harini Ragavan, Brajendra Panda
93. Server Assisted Key Establishment Protocol for WSN: a MIKEY--Ticket approach
Aymen Boudguiga, Alexis Olivereau, Nouha Oualha
94. Multi-Factor Authentication in Key Management Systems
Rick Lopes de Souza, Lau Cheuk Lung, Ricardo Felipe Custódio
95. Scheme of User Privacy Protection Applied to Online Marketing
Maria Oliveira, Ruy Queiroz
96. A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
97. Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy
Alasdair Thomason, Matthew Leeke, Matthew Bradbury, Arshad Jhumka
98. Portable Personal Identity Provider in Mobile Phones
Md. Sadek Ferdous, Ron Poet
99. De-anonymization attack on geolocated data
Sébastien Gambs, Marc-Olivier Killijian, Miguel Nunez del Prado Cortez
100. New Ways to Secure Linear Network Coding
Majid Adeli, Huaping Liu
101. Role Mining Using Boolean Matrix Decomposition With Hierarchy
Wei Ye, Ruixuan Li, Huaqing Li
102. A Secure Social-aware Incentive Scheme for Delay Tolerant Networks
GUOWEI WU, JIA WANG, LIN YAO
103. A Place-aware StereotypicalTrust Supporting Scheme
Gonzalo Huerta-Canepa, Seungwook Han, Dongman Lee
104. An Endorsement Trust Model
Charles Thevathayan, James Harland, Peter Bertok
105. A semantic policy framework for context-aware access control applications
A. S. M. Kayes, Jun Han, Alan Colman
106. Reputation Attacks Detection for Effective Trust Assessment Among Cloud Services
Talal H. Noor, Quan Z. Sheng, Abdullah Alfazi
107. An Effective Differentially Private Data Releasing Algorithm for Decision Tree
Tianqing Zhu
108. Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks
Abdelbasset Trad, Hani Alzaid

109. Trust Enhanced Security Architecture for Detecting Insider Threats
Udaya Tupakula, Vijay Varadharajan

110. A Fully-secure RFID Authentication Protocol from Exact LPN Assumption
MSI Mamun, Atsuko Miyaji

ISPA
IUCC
IEEE
IEEE-CS
IEEE-TCSC
Deakin University
NSCLab
Trend Micro