Abstract is missing.
- Reducing Costs in HSM-Based Data CentersRoberto De Prisco, Alfredo De Santis, M. Mannetta. 3-14 [doi]
- Secure User Authentication on Smartphones via Sensor and Face Recognition on Short Video ClipsChiara Galdi, Michele Nappi, Jean-Luc Dugelay. 15-22 [doi]
- A Hybrid Approach for Private Data Protection in the CloudAmal Ghorbel, Mahmoud Ghorbel, Mohamed Jmaiel. 23-37 [doi]
- An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition ControlJinhua Ma, Jianghua Liu, Min Wang, Wei Wu. 38-52 [doi]
- New Publicly Verifiable Computation for Batch Matrix MultiplicationXiaoyu Zhang, Tao Jiang, Kuan-Ching Li, Xiaofeng Chen 0001. 53-65 [doi]
- A Multi-source Homomorphic Network Coding Signature in the Standard ModelWenbin Chen, Hao Lei, Jin Li, Chongzhi Gao, FuFang Li, Ke Qi. 66-74 [doi]
- Trust-ABAC Towards an Access Control System for the Internet of ThingsHamdi Ouechtati, Nadia Ben Azzouna. 75-89 [doi]
- Privacy Preserving Multimodal Biometric Authentication in the CloudNeyire Deniz Sarier. 90-104 [doi]
- MOHAB: Mobile Hand-Based Biometric RecognitionSilvio Barra, Maria De Marsico, Michele Nappi, Fabio Narducci, Daniel Riccio. 105-115 [doi]
- Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve CryptosystemsChun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Chien-Ming Chen. 116-126 [doi]
- A Study of Interference Cancellation for NOMA Downlink Near-Far Effect to Support Big DataShaoyu Dou, Xin Su, Dongmin Choi, PanKoo Kim, Chang Choi. 129-137 [doi]
- Dynamic Latency Sensitivity Recognition: An Application to Energy SavingSherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi, Francesco Palmieri. 138-151 [doi]
- TPS: An Efficient VM Scheduling Algorithm for HPC Applications in CloudDuoqiang Wang, Wei Dai, Chi Zhang, Xuanhua Shi, Hai Jin. 152-164 [doi]
- Improved Upper and Lower Bounds for the Close Enough Traveling Salesman ProblemFrancesco Carrabs, Carmine Cerrone, Raffaele Cerulli, Ciriaco D'Ambrosio. 165-177 [doi]
- Object Storage in Cloud Computing Environments: An Availability AnalysisGiuliana Carullo, Mario Di Mauro, Michele Galderisi, Maurizio Longo, Fabio Postiglione, Marco Tambasco. 178-190 [doi]
- Energy-Efficient Dynamic Consolidation of Virtual Machines in Big Data CentersShuting Xu, Chase Qishi Wu, Aiqin Hou, Yongqiang Wang, Meng Wang. 191-206 [doi]
- Influence Maximization in Social Media Networks Using HypergraphsFlora Amato, Vincenzo Moscato, Antonio Picariello, Giancarlo Sperlì. 207-221 [doi]
- A Modified Segmentation Approach for Overlapping Elliptical Objects with Various SizesGuanghui Zhao, Xingyan Zi, Kaitai Liang, Panyi Yun, Junwei Zhou. 222-236 [doi]
- Privacy and Temporal Aware Allocation of Data in Decentralized Online Social NetworksAndrea De Salve, Barbara Guidi, Paolo Mori, Laura Ricci, Vincenzo Ambriola. 237-251 [doi]
- A Unifying Orchestration Operating Platform for 5GAntonio Manzalini, Marco Di Girolamo, Giuseppe Celozzi, Fulvio Bruno, Giuliana Carullo, Marco Tambasco, Gino Carrozzo, Fulvio Risso, Gabriele Castellano. 252-266 [doi]
- Identification of Energy Hotspots: A Case Study of the Very Fast Decision TreeEva García Martin, Niklas Lavesson, Håkan Grahn. 267-281 [doi]
- Prolonging Lifetime in Wireless Sensor Networks with Interference ConstraintsFrancesco Carrabs, Raffaele Cerulli, Ciriaco D'Ambrosio, Andrea Raiconi. 285-297 [doi]
- An Orchestrated Security Platform for Internet of RobotsMehrnoosh Monshizadeh, Vikramajeet Khatri, Raimo Kantola, Zheng Yan. 298-312 [doi]
- A Novel Clustering Solution for Wireless Sensor NetworksAnxi Wang, Shuzhen Pan, Chen Wang, Jian Shen, Dengzhi Liu. 313-322 [doi]
- Reliable Data Collection for Wireless Sensor Networks Using Unmanned Aerial VehiclesAlexandru-Valentin Vladuta, Ion Bica, Victor Valeriu Patriciu, Florin Pop. 323-337 [doi]
- Flaw Recovery in Cloud Based Bio-inspired Peer-to-Peer Systems for Smart CitiesBogdan Mocanu, Florin Pop, Alexandra Mihaita Mocanu, Ciprian Dobre, Valentin Cristea, Aniello Castiglione. 338-352 [doi]
- DPCAS: Data Prediction with Cubic Adaptive Sampling for Wireless Sensor NetworksLeonardo C. Monteiro, Flávia Coimbra Delicato, Luci Pirmez, Paulo F. Pires, Claudio Miceli. 353-368 [doi]
- Personalized Privacy Preserving Collaborative FilteringMengmeng Yang, Tianqing Zhu, Yang Xiang, Wanlei Zhou. 371-385 [doi]
- Know Your Enemy: Stealth Configuration-Information Gathering in SDNMauro Conti, Fabio De Gaspari, Luigi V. Mancini. 386-401 [doi]
- SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection NetworksWenjuan Li, Weizhi Meng, Lam-for Kwok. 402-415 [doi]
- Assessment of Security Threats via Network Topology Analysis: An Initial InvestigationMarcello Trovati, Win Thomas, Quanbin Sun, Georgios Kontonatsios. 416-425 [doi]
- You Surf so Strange Today: Anomaly Detection in Web Services via HMM and CTMCMaddalena Favaretto, Riccardo Spolaor, Mauro Conti, Marco Ferrante. 426-440 [doi]
- CDLP: A Core Distributing Policy Based on Logic PartitioningAlin Zhong, Shun Ren, Shouzhi Xu. 443-459 [doi]
- A Profit-Maximum Resource Allocation Approach for Mapreduce in Data CentersXiaolu Zhang, Weidong Li, Xi Liu, Xuejie Zhang. 460-474 [doi]
- An Efficient Implementation of the Algorithm by Lukáš et al. on HadoopGiuseppe Cattaneo, Umberto Ferraro Petrillo, Michele Nappi, Fabio Narducci, Gianluca Roscigno. 475-489 [doi]
- Integration of Data Distribution Service and Raspberry PiMarisol García-Valls, Javier Ampuero-Calleja, Luis Lino Ferreira. 490-504 [doi]
- Impact of Middleware Design on the Communication PerformanceMarisol García-Valls, Daniel Garrido, Manuel Díaz. 505-519 [doi]
- Semantic Knowledge and Service Models for Energy-Aware SystemsJarmo Kalaoja. 523-537 [doi]
- Transferring Remote Ontologies to the Edge of Internet of Things SystemsXiang Su, Pingjiang Li, Huber Flores, Jukka Riekki, Xiaoli Liu, Yuhong Li, Christian Prehofer. 538-552 [doi]
- A Mobile Context-Aware Information System to Support Tourism EventsFabio Clarizia, Saverio Lemma, Marco Lombardi, Francesco Pascale. 553-566 [doi]
- An Ontological Digital Storytelling to Enrich Tourist Destinations and Attractions with a Mobile Tailored StoryFabio Clarizia, Saverio Lemma, Marco Lombardi, Francesco Pascale. 567-581 [doi]
- Design of a Secure Emergency Communication System Based on Cloud for PregnancyGuan-Chen Li, Chin-Ling Chen, Feng Lin, Jungpil Shin, Cheng Gu. 585-595 [doi]
- A Trust Application in Participatory Sensing: Elder ReintegrationAlexandra Mihaita Mocanu, Ciprian Dobre, Florin Pop, Bogdan Mocanu, Valentin Cristea, Christian Esposito. 596-610 [doi]
- DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage ComplexityYe Li, Kaitai Liang, Chunhua Su, Wei Wu. 611-626 [doi]
- Automatic Diagnosis Metabolic Syndrome via a k- Nearest Neighbour ClassifierOmar Behadada, Meryem Abi-Ayad, Georgios Kontonatsios, Marcello Trovati. 627-637 [doi]
- Harnessing Mobile Pervasive Computing to Enhance Livelihood Processes: Farmer Response to a Mobile Agriculture Information SystemL. N. C. De Silva, Jeevani S. Goonetillake, Gihan N. Wikramanayake, Athula Ginige. 641-655 [doi]
- Social Computing: New Pervasive Computing Paradigm to Enhance Triple Bottom LineMarie D. Fernando, Athula Ginige, Ana Hol. 656-671 [doi]
- Digital Knowledge Ecosystem for Empowering Users to Self-manage Diabetes Through Context Specific Actionable InformationManeesh Mathai, Athula Ginige, Uma Srinivasan, Federico Girosi. 672-684 [doi]
- Human-Centered Design of a Personal Medication Assistant - Putting Polypharmacy Management into Patient's Hand!Monica Sebillo, Giuliana Vitiello, Danilo Cuciniello, Serena Carrabs. 685-699 [doi]
- A Digital Knowledge Ecosystem to Increase Participation in Emergency Warnings and Alerts ManagementPaloma Díaz, Teresa Onorati, Ignacio Aedo. 700-711 [doi]
- An Intelligent Framework for Predicting State War Engagement from Territorial DataGiovanni Acampora, Genoveffa Tortora, Autilia Vitiello. 712-721 [doi]
- BYODCert: Toward a Cross-Organizational BYOD ParadigmAlessio Merlo. 725-735 [doi]
- Security-Centric Evaluation Framework for IT ServicesSmrati Gupta, Jaume Ferrarons-Llagostera, Jacek Dominiak, Victor Muntés-Mulero, Peter Matthews, Erkuden Rios. 736-747 [doi]
- Multi-cloud Applications Security MonitoringPamela Carvallo, Ana R. Cavalli, Wissam Mallouli, Erkuden Rios. 748-758 [doi]
- Secure microGRID in Cloud: The CoSSMic Case StudyMassimiliano Rak, Salvatore Venticinque. 759-772 [doi]
- Towards Model-Based Security Assessment of Cloud ApplicationsValentina Casola, Alessandra De Benedictis, Roberto Nardone. 773-785 [doi]
- Security Assurance of (Multi-)Cloud Application with Security SLA CompositionMassimiliano Rak. 786-799 [doi]
- Security Issues in Cloud ComputingParnian Najafi Borazjani. 800-811 [doi]