IEEE 2015 - 2016 Information and Forensic Security
1.Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption





Abstracts Base Paper Enquiry
2.Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter





Abstracts Base Paper Enquiry
3.Key Updating for Leakage Resiliency with Application to AES Modes of Operation





Abstracts Base Paper Enquiry
4.Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks





Abstracts Base Paper Enquiry
5.Authenticated Key Exchange Protocols for Parallel Network File Systems





Abstracts Base Paper Enquiry
6.Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks





Abstracts Base Paper Enquiry
7.Effective Key Management in Dynamic Wireless Sensor Networks





Abstracts Base Paper Enquiry
8.Provable Multicopy Dynamic Data Possession in Cloud Computing Systems





Abstracts Base Paper Enquiry
9.A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations





Abstracts Base Paper Enquiry
10.An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration





Abstracts Base Paper Enquiry