Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski, Chunhua Su
{"title":"A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds","authors":"Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski, Chunhua Su","doi":"10.1007/978-981-15-0758-8_11","DOIUrl":"https://doi.org/10.1007/978-981-15-0758-8_11","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126497668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing","authors":"Juyan Li, Chunguang Ma, Kejia Zhang","doi":"10.1007/978-981-15-0758-8_3","DOIUrl":"https://doi.org/10.1007/978-981-15-0758-8_3","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124138256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-Based Threshold Electronic Voting System","authors":"Boru Gong, Xingye Lu, Wang Fat Lau, M. Au","doi":"10.1007/978-981-15-0758-8_18","DOIUrl":"https://doi.org/10.1007/978-981-15-0758-8_18","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131935271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jinbao Gao, Yuan-zhang Li, Hongwei Jiang, Lu Liu, Xiaosong Zhang
{"title":"An RTP Extension for Reliable User-Data Transmission over VoIP Traffic","authors":"Jinbao Gao, Yuan-zhang Li, Hongwei Jiang, Lu Liu, Xiaosong Zhang","doi":"10.1007/978-981-15-0758-8_6","DOIUrl":"https://doi.org/10.1007/978-981-15-0758-8_6","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132360228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects","authors":"Yetneberk Zenebe Melesew, Jiayi Li, Yinbin Miao","doi":"10.1007/978-981-19-7242-3_3","DOIUrl":"https://doi.org/10.1007/978-981-19-7242-3_3","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124785151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiang-dong Wang, Yu You, Xiao-Yan Li, Ximeng Liu, Yang Yang
{"title":"An Efficient Adaptive Fault Diagnosis Algorithm for Highly Scalable Data Center Networks","authors":"Xiang-dong Wang, Yu You, Xiao-Yan Li, Ximeng Liu, Yang Yang","doi":"10.1007/978-981-16-7913-1_4","DOIUrl":"https://doi.org/10.1007/978-981-16-7913-1_4","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124984008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Edge Local Differential Privacy for Dynamic Graphs","authors":"Sudipta Paul, Julián Salas, V. Torra","doi":"10.1007/978-981-99-5177-2_13","DOIUrl":"https://doi.org/10.1007/978-981-99-5177-2_13","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117019684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Fault Tolerant Routing Algorithm in Data Center Networks","authors":"Ningning Liu, Weibei Fan, Jianxi Fan","doi":"10.1007/978-981-16-7913-1_2","DOIUrl":"https://doi.org/10.1007/978-981-16-7913-1_2","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129217531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Realization of Safety Reinforced Terminal Equipment for Secondary System of Substation","authors":"Xiaoming Wang, Ke-Wen Zhou, C. Wu","doi":"10.1007/978-981-16-7913-1_5","DOIUrl":"https://doi.org/10.1007/978-981-16-7913-1_5","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121520497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yichao Wang, Sophia Roscoe, B. Arief, L. Connolly, H. Borrion, S. Kaddoura
{"title":"The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities","authors":"Yichao Wang, Sophia Roscoe, B. Arief, L. Connolly, H. Borrion, S. Kaddoura","doi":"10.1007/978-981-99-5177-2_9","DOIUrl":"https://doi.org/10.1007/978-981-99-5177-2_9","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132465965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}