Title Page i (PDF)
[Title page iii] (PDF)
Copyright Page (PDF)
Table of Contents (PDF)
Message from the IEEE TrustCom 2018 Program Chairs (PDF)
TrustCom 2018 Committee Members (PDF)
TrustCom 2018 Technical Program Committee (PDF)
Message from the BigDataSE 2018 Program Chairs (PDF)
BigDataSE 2018 Committee Members (PDF)
Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure (Abstract)
A Comprehensive Analysis of Packet Loss in MANETs (Abstract)
Testing Sequence Generation Method Based on Unrelated Behaviors Serializing (Abstract)
Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN (Abstract)
LUCON: Data Flow Control for Message-Based IoT Systems (Abstract)
An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis (Abstract)
Universal Optimality of Apollonian Cell Encoders (Abstract)
A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems (Abstract)
Data Mining Based Strategy for Detecting Malicious PDF Files (Abstract)
A Lightweight FourQ Primitive on ARM Cortex-M0 (Abstract)
Public Auditing for Network Coding Based Secure Cloud Storage (Abstract)
An Experimental Flow Secure File System (Abstract)
Energy Exhaustion Attack on Barrett's Reduction (Abstract)
Authentication of IoT Device and IoT Server Using Secure Vaults (Abstract)
Uninterrupted Video Surveillance in the Face of an Attack (Abstract)
A Case Study of Accelerating Apache Spark with FPGA (Abstract)
Steganographic Transports: A Vector for Hidden Secret Internets? (Abstract)
P-GENT: Privacy-Preserving Geocoding of Non-Geotagged Tweets (Abstract)
A Flow-Level Architecture for Balancing Accountability and Privacy (Abstract)
SDLI: Static Detection of Leaks Across Intents (Abstract)
Software System Representation Methods Based on Algebraic Component (Abstract)
A Systematic Method on PDF Privacy Leakage Issues (Abstract)
Website Fingerprinting by Power Estimation Based Side-Channel Attacks on Android 7 (Abstract)
Do You Like What I Like? Similarity Estimation in Proximity-Based Mobile Social Networks (Abstract)
Track me if you can? Query Based Dual Location Privacy in VANETs for V2V and V2I (Abstract)
Understanding the Performance and Challenges of DNS Query Name Minimization (Abstract)
Fast Time Series Discords Detection with Privacy Preserving (Abstract)
RZKPB: A Privacy-Preserving Blockchain-Based Fair Transaction Method for Sharing Economy (Abstract)
Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones (Abstract)
Monero Ring Attack: Recreating Zero Mixin Transaction Effect (Abstract)
Enabling Trust in Deep Learning Models: A Digital Forensics Case Study (Abstract)
Bluetooth Low Energy Used for Memory Acquisition from Smart Health Care Devices (Abstract)
Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and Transparency (Abstract)
Superscalar Encrypted RISC: The Measure of a Secret Computer (Abstract)
A Privacy-Preserving Principal Component Analysis Outsourcing Framework (Abstract)
Achieving Secure and Effective Search Services in Cloud Computing (Abstract)
Node Immunization in Networks with Uncertainty (Abstract)
Effective Mobile Web User Fingerprinting via Motion Sensors (Abstract)
Differential Power Analysis of 8-Bit Datapath AES for IoT Applications (Abstract)
A Power Analysis Attack Countermeasure Based on Random Execution (Abstract)
RNS-Based Embedding Scheme for Data Hiding in Digital Images (Abstract)
Partial Scan Design Against Scan-Based Side Channel Attacks (Abstract)
Behavioral Based Trust Metrics and the Smart Grid (Abstract)
Differential Power Attack on SM4 Block Cipher (Abstract)
Cryptanalysis of a Chaotic Ring Oscillator Based Random Number Generator (Abstract)
An Approach of Security Protection for VSAT Network (Abstract)
A Novel Identity Authentication for FPGA Based IP Designs (Abstract)
Detection and Prevention of Routing Attacks in Internet of Things (Abstract)
Proposal of Multi-channel Operation Technique Using PingPong256 (Abstract)
Energy Efficiency Analysis of Elliptic Curve Based Cryptosystems (Abstract)
Hierarchical Polynomial-Based Key Management Scheme in Fog Computing (Abstract)
Quantifying Information Exposure in Internet Routing (Abstract)
The Challenges of Big Data Governance in Healthcare (Abstract)
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions (Abstract)
Privacy-Preserving Sensory Data Recovery (Abstract)
Detecting Swimming Pools in 15-Minute Load Data (Abstract)
C2R Net: The Coarse to Refined Network for Image Forgery Detection (Abstract)
Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data (Abstract)
The Process of Reverse Engineering GPU Malware and Provide Protection to GPUS (Abstract)
The Blockchain for Domain Based Static Sharding (Abstract)
A Practical Machine Learning Approach for Dynamic Stock Recommendation (Abstract)
A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network (Abstract)
Forensic Analysis of Wear Leveling on Solid-State Media (Abstract)
A Public Key Based EDNS Privacy Tunnel for DNS (Abstract)
Emotion Artificial Intelligence Derived from Ensemble Learning (Abstract)
AMI Smart Meter Big Data Analytics for Time Series of Electricity Consumption (Abstract)
A Critical Analysis of the V-Model of Big Data (Abstract)
VeraGreg: A Framework for Verifiable Privacy-Preserving Data Aggregation (Abstract)
Obstacles to Implementation of Information Security Governance (Abstract)
Using Artificial Neurons in Evidence Based Trust Computation (Abstract)
Hardware Trojan Detection Utilizing Machine Learning Approaches (Abstract)
Handling Capabilities in Security Policies (Abstract)
Author Index (PDF)
Roster Page (PDF)