All Stories

  1. Implementation and Evaluation of PartyCrasherBLE: An Energy-Efficient and Privacy-Preserving Authentication Protocol for BLE Devices
  2. OpenK: An Elastic Data Cleansing System with A Clustering-based Data Anomaly Detection Approach
  3. Machine Learning Based on Resampling Approaches and Deep Reinforcement Learning for Credit Card Fraud Detection Systems
  4. Guest editorial
  5. A lightweight authentication protocol for D2D-enabled IoT systems with privacy
  6. An effective and elastic blockchain-based provenance preserving solution for the open data
  7. Intermediate Data Format for the Elastic Data Conversion Framework
  8. Machine Learning for Prediction of Imbalanced Data: Credit Fraud Detection
  9. Non-Invertibility for Random Projection based Biometric Template Protection Scheme
  10. A Data Union Method Using Hierarchical Clustering and Set Unionability
  11. A Hybrid Approach Using Decision Tree and Multiple Linear Regression for Predicting Students’ Performance
  12. Comprehensive Analysis of Privacy in Black-Box and White-Box Inference Attacks Against Generative Adversarial Network
  13. Motorbike Counting in Heavily Crowded Scenes
  14. On Using Cryptographic Technologies in Privacy Protection of Online Conferencing Systems
  15. Privacy-Preserving Attribute-Based Access Control in Education Information Systems
  16. Data Poisoning Attack on Deep Neural Network and Some Defense Methods
  17. Interaction and Visualization Design for User Privacy Interface on Online Social Networks
  18. Security and Privacy Issues in Deep Learning: A Brief Review
  19. A Comparative Study of the Some Methods Used in Constructing Coresets for Clustering Large Datasets
  20. A Study of Deep Learning-Based Approaches for Session-Based Recommendation Systems
  21. A pragmatic elliptic curve cryptography-based extension for energy-efficient device-to-device communications in smart cities
  22. A Farthest First Traversal based Sampling Algorithm for k-clustering
  23. A Pragmatic Blockchain Based Solution for Managing Provenance and Characteristics in the Open Data Context
  24. A Three-Way Energy Efficient Authentication Protocol Using Bluetooth Low Energy
  25. An Elastic Anonymization Framework for Open Data
  26. An Elastic Data Conversion Framework for Data Integration System
  27. Differential Privacy in Deep Learning: An Overview
  28. Visualizing Access Logs of a Scientific Digital Library Effectively as Multiple Time Series Using Modified Horizon Graphs
  29. On verifying the authenticity of e-commercial crawling data by a semi-crosschecking method
  30. A Lightweight Indexing Approach for Efficient Batch Similarity Processing with MapReduce
  31. The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach
  32. Flow Aggregation for SDN-Based Delay-Insensitive Traffic Control in Mobile Core Networks
  33. A Comparative Study of the Use of Coresets for Clustering Large Datasets
  34. A New Biometric Template Protection Using Random Orthonormal Projection and Fuzzy Commitment
  35. A Parallel Incremental Frequent Itemsets Mining IFIN+: Improvement and Extensive Evaluation
  36. Dynamic Data Management Strategy on Cloud Network by Fog Computing Model
  37. Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains
  38. Resource-Constrained IoT Authentication Protocol: An ECC-Based Hybrid Scheme for Device-to-Server and Device-to-Device Communications
  39. A Context-Aware Privacy-Preserving Solution for Location-Based Services
  40. Message from General Chairs
  41. Privacy Preserving Biometric-based Remote Authentication with Secure Processing Unit on Untrusted Server
  42. A Light-Weight Tightening Authentication Scheme for the Objects’ Encounters in the Meetings
  43. An effective flow aggregation for SDN-based background and foreground traffic control
  44. An Efficient Batch Similarity Processing with MapReduce
  45. Interactive Visual Decision Tree for Developing Detection Rules of Attacks on Web Applications
  46. Motorbike Detection in Urban Environment
  47. Message from Program Chairs
  48. A NoSQL Data-Based Personalized Recommendation System for C2C e-Commerce
  49. An Iterative Algorithm for Computing Shortest Paths Through Line Segments in 3D
  50. IFIN+: A Parallel Incremental Frequent Itemsets Mining in Shared-Memory Environment
  51. Incremental Frequent Itemsets Mining with IPPC Tree
  52. REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies
  53. Towards a Fine-Grained Privacy-Enabled Attribute-Based Access Control Mechanism
  54. Using JSON to Specify Privacy Preserving-Enabled Attribute-Based Access Control Policies
  55. Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol
  56. A Cross-Checking Based Method for Fraudulent Detection on E-Commercial Crawling Data
  57. Message from the Program Chairs
  58. Rew-XAC: An Approach to Rewriting Request for Elastic ABAC Enforcement with Dynamic Policies
  59. Delay-insensitive traffic detection and transfer on network edges
  60. Cancellable fuzzy vault with periodic transformation for biometric template protection
  61. Chaff point generation mechanism for improving fuzzy vault security
  62. eHSim: An Efficient Hybrid Similarity Search with MapReduce
  63. Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII
  64. An Adaptive Similarity Search in Massive Datasets
  65. Enhance fuzzy vault security using nonrandom chaff point generator
  66. Face Quality Measure for Face Authentication
  67. Fine Grained Attribute Based Access Control Model for Privacy Protection
  68. Extending Web Application IDS Interface: Visualizing Intrusions in Geographic and Web Space
  69. Combining Fuzzy Extractor in Biometric-Kerberos Based Authentication Protocol
  70. Message from Program Chairs
  71. Future Data and Security Engineering
  72. KUR-Algorithm: From Position to Trajectory Privacy Protection in Location-Based Applications
  73. A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation
  74. An Efficient Document Indexing-Based Similarity Search in Large Datasets
  75. Towards a flexible framework to support a generalized extension of XACML for spatio-temporal RBAC model with reasoning ability
  76. B dHCO -tree
  77. An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis
  78. Visualizing Web Attack Scenarios in Space and Time Coordinate Systems
  79. Future Data and Security Engineering
  80. Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI
  81. An Elastic Approximate Similarity Search in Very Large Datasets with MapReduce
  82. A Hash-Based Index Method for Securing Biometric Fuzzy Vaults
  83. Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication Systems
  84. An Efficient Similarity Search in Large Data Collections with MapReduce
  85. Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator
  86. Supporting Authorization Reasoning Based on Role and Resource Hierarchies in an Ontology-Enriched XACML Model
  87. Protecting Biometric Features by Periodic Function-Based Transformation and Fuzzy Vault
  88. An OpenLS privacy-aware middleware supporting location-based applications
  89. Hybrid Stop Discovery in Trajectory Records
  90. Utilizing Spatio-temporal Data Index for Location Privacy Protection
  91. Visualization of web form submissions for security analysis
  92. Enhanced security in internet voting protocol using blind signature and dynamic ballots
  93. A survey on security visualization techniques for web information systems
  94. Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch
  95. On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries
  96. Semantic-Aware Obfuscation for Location Privacy at Database Level
  97. A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network
  98. A Hilbert-based framework for preserving privacy in location-based services
  99. Towards a Flexible Framework to Support a Generalized Extension of XACML for Spatio-temporal RBAC Model with Reasoning Ability
  100. Anonymizing but Deteriorating Location Databases
  101. X-STROWL: A generalized extension of XACML for context-aware spatio-temporal RBAC model with OWL
  102. Welcome message from general chairs and program chairs
  103. An open design privacy-enhancing platform supporting location-based applications
  104. Detecting, Monitoring and Preventing Database Security Breaches in a Housing-Based Outsourcing Model
  105. STRoBAC – Spatial Temporal Role Based Access Control
  106. A Novel Trajectory Privacy-Preserving Future Time Index Structure in Moving Object Databases
  107. Semantic Bob-tree
  108. Enhanced security in internet voting protocol using blind signatures and dynamic ballots
  109. OST-Tree: An Access Method for Obfuscating Spatio-Temporal Data in Location Based Services
  110. Protecting Privacy While Discovering and Maintaining Association Rules
  111. On Guaranteeing k-Anonymity in Location Databases
  112. Bob-Tree: An Efficient B + -Tree Based Index Structure for Geographic-Aware Obfuscation
  113. PREFACE
  114. Two Novel Adaptive Symbolic Representations for Similarity Search in Time Series Databases
  115. eM2: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss
  116. HOT aSAX: A Novel Adaptive Symbolic Representation for Time Series Discords Discovery
  117. An Adaptive Grid-Based Approach to Location Privacy Preservation
  118. Memorizing Algorithm
  119. An Extended Payment Model for M-Commerce with Fair Non-Repudiation Protocols
  120. Privacy preserving through a memorizing algorithm in location-based services
  121. BiB+-tree
  122. An Extended Video Database Model for Supporting Finer-Grained Multi-Policy and Multi-Level Access Controls
  123. A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases
  124. Providing Query Assurance for Outsourced Tree-Indexed Data
  125. Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
  126. A Novel Approach to Fine-grained Content-based Access Control for Video Databases
  127. A Novel Approach to Fine-grained Content-based Access Control for Video Databases
  128. Query Assurance Verification for Dynamic Outsourced XML Databases
  129. Security Protocols for Outsourcing Database Services
  130. Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers
  131. Privacy-Preserving Basic Operations on Outsourced Search Trees
  132. A Quick Review: What Have Been Presented at DEXA International Conferences?
  133. An Efficient Incremental Lower Bound Approach for Solving Approximate Nearest-Neighbor Problem of Complex Vague Queries
  134. A General and Efficient Approach for Solving Nearest Neighbor Problem in the Vague Query System
  135. ISA - An Incremental Hyper-sphere Approach for Efficiently Solving Complex Vague Queries
  136. The SH-tree: A Super Hybrid Index Structure for Multidimensional Data
  137. Security Issues in Outsourced XML Databases
  138. Security Issues in Outsourced XML Databases
  139. Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
  140. Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
  141. Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
  142. Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
  143. Security Issues in Outsourced XML Databases
  144. Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
  145. Memorizing Algorithm
  146. Memorizing Algorithm
  147. Memorizing Algorithm