Abstract is missing.
- Demand Side Management in Smart Grids: A Stackelberg Multi Period Multi Provider GameHala ALSalloum, Ali El Masri, Leïla Merghem-Boulahia, Rana Rahim. 1-5 [doi]
- "Speak, Friend, and Enter" - Secure, Spoken One-Time Password AuthenticationOuti-Marja Latvala, Chengyuan Peng, Petri Honkamaa, Kimmo Halunen. 1-5 [doi]
- Addressing Security in OCPP: Protection Against Man-in-the-Middle AttacksJuan Enrique Rubio, Cristina Alcaraz, Javier Lopez. 1-5 [doi]
- On the Cramer-Rao Lower Bounds of Ranging Based on IR-UWB TOA Estimation in Wirelessbody Area NetworksJihad Hamie, Ali Hamieh, Joumana Younis, Moussa Ammar, Ahmad Ahmad-Kassem, Ahmad Skaiky, Ali Hamie, Abbass Nasser, Hani Abdallah. 1-4 [doi]
- Empowering Light Nodes in Blockchains with Block SummarizationAsutosh Palai, Meet Vora, Aashaka Shah. 1-5 [doi]
- Efficient Distributed Admission and Revocation Using Blockchain for Cooperative ITSNoureddine Lasla, Mohamed F. Younis, Wassim Znaidi, Dhafer Ben Arbia. 1-5 [doi]
- Performance Analysis of Mobile Cellular Networks with MMPP Call Arrival PatternsS. Lirio Castellanos-Lopez, Felipe A. Cruz-Pérez, Genaro Hernández-Valdez, Jose Raul Miranda-Tello. 1-6 [doi]
- Classification of Unknown Web Sites Based on Yearly Changes of Distribution Information of Malicious IP AddressesYoshitaka Nakamura, Shihori Kanazawa, Hiroshi Inamura, Osamu Takahashi. 1-4 [doi]
- CliMBOS: A Modular NFV Cloud Backend for the Internet of ThingsMassimo Gallo, Samir Ghamri-Doudane, Fabio Pianese. 1-5 [doi]
- An Extension of Radio Network Information Interfaces for Terminal Activity in a CellEvelina Pencheva, Ivaylo Atanasov. 1-5 [doi]
- An Evaluation of UHF RFID Anti-Collision Protocols with NS2Rahma Ben Fraj, Vincent Beroulle, Nicolas Fourty, Aref Meddeb. 1-6 [doi]
- MANER: Managed Data Dissemination Scheme for LoRa IoT Enabled Wildlife Monitoring System (WMS)Eyuel D. Ayele, Nirvana Meratnia, Paul J. M. Havinga. 1-7 [doi]
- Evaluating Blockchains for IoTRunchao Han, Vincent Gramoli, Xiwei Xu. 1-5 [doi]
- Smart-Contract Based System Operations for Permissioned BlockchainTatsuya Sato, Yosuke Himura. 1-6 [doi]
- Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud AuditingLouis Tajan, Moritz Kaumanns, Dirk Westhoff. 1-6 [doi]
- Density-Aware Outage in Clustered Ad Hoc NetworksAlperen Eroglu, Ertan Onur, Mehmet Turan. 1-5 [doi]
- Inter-Application Based Resource Management Approach for Cloud InfrastructureMahesh Balaji, Aswani Kumar Cherukuri. 1-6 [doi]
- AlkylVM: A Virtual Machine for Smart Contract Blockchain Connected Internet of ThingsJoshua Ellul, Gordon J. Pace. 1-4 [doi]
- Malware Classification with Deep Convolutional Neural NetworksMahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D. B. Bruce, Yang Wang, Farkhund Iqbal. 1-5 [doi]
- Selectively Accessing Light Field Face Images over Information Centric NetworkingJose Quevedo, Carlos Guimarães, Rui Ferreira, Alireza Sepas-Moghaddam, Luis Malhadas, Rui L. Aguiar, Paulo L. Correia, Daniel Corujo. 1-5 [doi]
- Evolving AL-FEC Application Towards 5G NGMNChristos Bouras, Nikolaos Kanakis. 1-5 [doi]
- Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric IdentificationGianmarco Baldini, Raimondo Giuliani, Claudio Gentile, Gary Steri. 1-5 [doi]
- Workplace Capacity Design Using the Minimum Dominating Set in Server Migration ServicesYukinobu Fukushima, Itsuho Goda, Tutomu Murase, Tokumi Yokohira. 1-5 [doi]
- Modelling of S-MAC for Heterogeneous WSNCanek Portillo, Jorge Martínez-Bauset, Vicent Pla. 1-6 [doi]
- Small Transactions with Sustainable IncentivesFabio Pianese, Matteo Signorini, Souradip Sarkar. 1-5 [doi]
- Duplications and Misattributions of File Fragment Hashes in Image and Compressed FilesJohan Garcia. 1-5 [doi]
- Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security ApplicationsZeeshan Afzal, Johan Garcia, Stefan Lindskog, Anna Brunstrom. 1-5 [doi]
- Recycling Smart Contracts: Compression of the Ethereum BlockchainBeltran Borja Fiz Pontiveros, Robert Norvill, Radu State. 1-5 [doi]
- DDoS Attack Detection System: Utilizing Classification Algorithms with Apache SparkAmjad Alsirhani, Srinivas Sampalli, Peter Bodorik. 1-7 [doi]
- Security Assurance for Smart ContractEnce Zhou, Song Hua, Bingfeng Pi, Jun Sun, Yashihide Nomura, Kazuhiro Yamashita, Hidetoshi Kurihara. 1-5 [doi]
- An Entropy-based Inverse Tone Mapping Operator for High Dynamic Range ApplicationsPedram Mohammadi, Mahsa T. Pourazad, Panos Nasiopoulos. 1-5 [doi]
- Location Privacy in Virtual Cell-Equipped Ultra-Dense NetworksEmanuele Catania, Aurelio La Corte. 1-4 [doi]
- On the Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based FrameworkDaniel Fraunholz, Daniel Krohmer, Frederic Pohl, Hans Dieter Schotten. 1-4 [doi]
- An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted DataDeepthi Rao, D. V. N. Siva Kumar, P. Santhi Thilagam. 1-4 [doi]
- Iot Forensics: Challenges for the Ioa EraÁine MacDermott, Thar Baker, Qi Shi. 1-5 [doi]
- Direct Vehicle-to-Vehicle Charging Strategy in Vehicular Ad-Hoc NetworksGuangyu Li, Lila Boukhatem, Lin Zhao, Jinsong Wu. 1-5 [doi]
- Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov ModelsGiulia De Santis, Abdelkader Lahmadi, Jérôme François, Olivier Festor. 1-5 [doi]
- The Security and Traceability of Shared Information in the Process of Transportation of Dangerous GoodsAdnan Imeri, Djamel Khadraoui. 1-5 [doi]
- Extending the Forward Error Correction Paradigm for Multi-Hop Wireless Sensor NetworksAndreas Brokalakis, Ioannis Chondroulis, Ioannis Papaefstathiou. 1-5 [doi]
- NFB: A Protocol for Notarizing Files over the BlockchainHaikel Magrahi, Nouha Omrane, Olivier Senot, Rakia Jaziri. 1-4 [doi]
- Chaff-Points Generation Method Based on Adaptive Genetic Algorithms and Non-Fixed Size Squares Boundaries for Resource Constrained DevicesHachemi Nabil Dellys, Karima Benatchba, Layth Sliman, Yen-Wei Chen. 1-4 [doi]
- Fast Evaluation of Homomorphic Encryption Schemes Based on Ring-LWECyrielle Feron, Vianney Lapotre, Loïc Lagadec. 1-5 [doi]
- Horizontal Address-Bit DEMA against ECDSAIevgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer. 1-7 [doi]
- Policy-Controlled Signature from NTRU LatticeZi-Yuan Liu, Jen-Chieh Hsu, Raylin Tso, Tzong-Chen Wu. 1-5 [doi]
- Improving Flexibility in Wireless Sensor Networks via API. An Application in Environmental MonitoringM. J. Espinosa-Gavira, A. Jimenez-Pro, Juan José González de la Rosa, A. Agüera Pérez, O. Florencias-Oliveros, José Carlos Palomares Salas, José María Sierra Fernández. 1-4 [doi]
- Penetration and Security of OpenSSH Remote Secure Shell Service on Raspberry Pi 2Hesham H. Alsaadi, Monther Aldwairi, May Al Taei, Mansoor AlBuainain, Maktoom AlKubaisi. 1-5 [doi]
- A Fragment Hashing Approach for Scalable and Cloud-Aware Network File DetectionJohan Garcia. 1-5 [doi]
- Quantitative Description of Internal Activity on the Ethereum Public BlockchainAndra Anoaica, Hugo Levard. 1-5 [doi]
- Localization of Sensors in Indoor Wireless Networks: An Observation Model Using WiFi RSSDaniel AlShamaa, Farah Mourad-Chehade, Paul Honeine. 1-5 [doi]
- Wireless Vital Signal Tracking for Drivers Using Micro-Doppler Seatback RadarDong Kyoo Kim. 1-5 [doi]
- Comparison of the Performance Sensitivity to the Primary and Secondary Service Time Distribution in Cognitive Radio NetworksFelipe A. Cruz-Pérez, Jose Serrano-Chavez, S. Lirio Castellanos-Lopez, Genaro Hernández-Valdez. 1-4 [doi]
- Phone Application for Indoor Localization Based on Ble Signal FingerprintBrahim Benaissa, Filip Hendrichovsky, Kaori Yishida, Mario Köppen, Peter Sincak. 1-5 [doi]
- Privacy Preserving Queries on Directed GraphSara Ramezanian, Tommi Meskanen, Valtteri Niemi. 1-5 [doi]
- A Blockchain Framework for Insurance ProcessesMayank Raikwar, Subhra Mazumdar 0001, Sushmita Ruj, Sourav Sen Gupta, Anupam Chattopadhyay, Kwok-Yan Lam. 1-4 [doi]
- Multi-Provider Secure Virtual Network EmbeddingFrancois Boutigny, Stéphane Betgé-Brezetz, Hervé Debar, Grégory Blanc, Antoine Lavignotte, Ion Popescu. 1-5 [doi]
- An InfiniBand-Based Mechanism to Enhance QoS in Multipath Routing Protocols in MANETsRaid Zaghal, Saeed Salah, Mohammad Ismail. 1-5 [doi]
- Drone Forensics: Challenges and New InsightsHana Bouafif, Faouzi Kamoun, Farkhund Iqbal, Andrew Marrington. 1-6 [doi]
- Federated Publish/Subscribe ServicesEirik Bertelsen, Gabriel Berthling-Hansen, Trude Hafsøe Bloebaum, Christian Duvholt, Einar Hov, Frank T. Johnsen, Eivind Morch, Andreas H. Weisethaunet. 1-5 [doi]
- ProsocialLearn: A Prosocial Games MarketplaceFrancesco D'Andria, Jose Miguel Garrido, Michael Boniface, Stefano Modafferi, Simon Crowle, Lee Middleton, Konstantinos C. Apostolakis, Kosmas Dimitropoulos, Petros Daras. 1-5 [doi]
- Star Projection Technologies in the Modern Planetarium IndustryAlexander Adli. 1-4 [doi]
- A Trust-by-Design Framework for the Internet of ThingsDavide Ferraris, M. Carmen Fernández Gago, Javier Lopez. 1-4 [doi]
- Formal Verification of Smart Contracts Based on Users and Blockchain Behaviors ModelsTesnim Abdellatif, Kei-Léo Brousmiche. 1-5 [doi]
- Spectrum Sharing in Cognitive Radio SystemsRaouia Masmoudi. 1-5 [doi]
- Remote Data Acquisition Using Raspberry Pi3Saeed Ibrahim, Nawwaf Al Harmi, Ebrahim Al Naqbi, Farkhund Iqbal, Djedjiga Mouheb, Omar Alfandi. 1-5 [doi]
- Digitizing, Securing and Sharing Vehicles Life-cycle over a Consortium Blockchain: Lessons LearnedKei-Léo Brousmiche, Thomas Heno, Christian Poulain, Antoine Dalmieres, Elyes Ben Hamida. 1-5 [doi]
- Using Dynamic Occupancy Patterns for Improved Presence Detection in Intelligent BuildingsCharikleia Papatsimpa, Jean-Paul M. G. Linnartz. 1-5 [doi]
- Towards a New Opportunistic IoT Network Architecture for Wildlife Monitoring SystemEyuel D. Ayele, Nirvana Meratnia, Paul J. M. Havinga. 1-5 [doi]
- Identifying Vulnerabilities in APT Attacks: A Simulated ApproachMathew Nicho, Adelaiye Oluwasegun, Faouzi Kamoun. 1-4 [doi]
- A Many-To-One Matching Game Approach to Achieve Low-Latency Exploiting Fogs and CachingBouchaib Assila, Abdellatif Kobbane, Mohammed El Koutbi. 1-2 [doi]
- An Authenticated Encrypted Compressive Sensing based Imaging MechanismTao Wu, Christoph Ruland. 1-4 [doi]
- In-Store Payments Using BitcoinMikael Asplund, Jakob Lovhall, Simin Nadjm-Tehrani. 1-6 [doi]
- A New Dynamic Trust Model for "On Cloud" Federated Identity ManagementKeltoum Bendiab, Stavros Shiaeles, Samia Boucherkha. 1-5 [doi]
- A Graph Theory Based Network Selection Algorithm in Heterogeneous Wireless NetworksMohamed Lahby, Abderrahim Sekkaki. 1-4 [doi]
- SDN-based Mobility Management: Handover Performance Impact in Constrained DevicesFlavio Meneses, Carlos Guimarães, Daniel Corujo, Rui L. Aguiar. 1-5 [doi]
- Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection SystemsSajjad Dadkhah, Mario Koeppen, Somayeh Sadeghi, Kaori Yoshida. 1-5 [doi]
- MapReduce Approach to Build Network User Profiles with Top-k Rankings for Network SecurityAlvaro Parres-Peredo, Iván Piza-Dávila, Francisco Cervantes. 1-5 [doi]
- Oblivious Transfer Protocols Based on Commutative EncryptionJen-Chieh Hsu, Raylin Tso, Yu-Chi Chen, Mu-En Wu. 1-5 [doi]
- Lessons Learned from Implementing a Privacy-Preserving Smart Contract in EthereumAndreas Unterweger, Fabian Knirsch, Christoph Leixnering, Dominik Engel. 1-5 [doi]
- Mobility-based Tracking Using WiFi RSS in Indoor Wireless Sensor NetworksDaniel AlShamaa, Farah Mourad-Chehade, Paul Honeine. 1-5 [doi]
- A Network Management Framework for SDNSarah Abdallah, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi. 1-4 [doi]
- Bézier Curves Based Novel Calibration Technique of Beamformers in IEEE 802.11 WLAN NetworksMehdi Guessous, Lahbib Zenkouar. 1-5 [doi]