Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2017 Third International Conference on Mobile and Secure Services (MobiSecServ)

11-12 Feb. 2017

Filter Results

Displaying Results 1 - 25 of 26
  • [Back cover]

    Publication Year: 2017, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • [Back inside cover]

    Publication Year: 2017, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • [Front inside cover]

    Publication Year: 2017, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Session 2

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Session 3

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Tutorial 1: IoT, big (input) data, and learning complexity

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Summary form only given. The Internet of Things (IoT) comprises objects that have the ability to communicate with other objects that are ultimately connected to the Internet. A majority of IoT objects in use at the moment are RFID (Radio-Frequency Identification) tags. These tags generate a large amount of data due to their real-time communication ability as well as the amount of data generated du... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial 2: Blockchain and CryptoMoney, towards IP money and blockchain computing

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Summary form only given, as follows. The complete presentation was not made available for publication as part of the conference proceedings. The bitcoin digital currency was introduced in 2008 in a paper written by an anonymous author Satoshi Nakamoto. In 2017 the bitcoin market is about 10 billion$. In 2013 Vitalik Buterin, defines a new blockhain system named Ethereum, which provides the Ether d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote speech

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (55 KB)

    Recently the "Cloud Security Spotlight Report" showed that "90 percent of organizations are very or moderately concerned about public cloud security". These concerns run the gamut from vulnerability to hijacked accounts to malicious insiders to full-scale data breaches. Although cloud services have ushered in a new age of transmitting and storing data, many companies are still hesitant or make the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Title page]

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Publication Year: 2017, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    The advent of smartphones and the flexibility to have multiple applications serving the user's needs, has started a convergence of different services into a single device. Traditional services provided by mobile phones like voice and text communication became secondary to other domains like Online Social Network (OSN) and entertainment applications on smartphones. A similar trend is also happening... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards secure Bitcoin fast trading: Designing secure elements for digital currency

    Publication Year: 2017, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1112 KB) | HTML iconHTML

    This paper analyses the Bitcoin system and attempts to split the production costs and the market valorization. This analysis is performed from public data and technical research papers. We introduce the design of secure elements dedicated to Bitcoin transactions. Such devices will available trusted and fast transactions, and should avoid Bitcoin address hijacking. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Instant payment versus smartphone payment: The big fight?

    Publication Year: 2017, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    The digitalization of our economy, with the spread of smartphones and of electronic commerce, entails a general acceleration of payments. On the one hand, new technologies lead to changes in customer habits, who make Internet purchases anywhere and at any time. Customers also expect to pay for and receive their purchases as fast as possible. Suppliers, on the other hand, wish to have the certainty... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyber Threat Information sharing: A category-theoretic approach

    Publication Year: 2017, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (904 KB) | HTML iconHTML

    In this paper, we present the use of a category theory based approach to cyber threat information sharing. This choice is motivated by the fact that category theory allows an abstraction that can be used when one has to deal with diverse systems and it is also useful in describing an existing structure like STIX (Structured Threat Information eXpression). STIX will be described, a brief review of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling enhanced data security for aquaculture management services

    Publication Year: 2017, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB) | HTML iconHTML

    Aquaculture farmers and exporters usually face concerns related to data privacy and security of their farm data while using digital apps (Mobile Applications). Existing applications encrypt data by transmitting the keys over the network to achieve data security. However if this key is pilfered, there arises a risk of compromise in data security. To overcome this risk, we have proposed a method to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CoSINcheck to protect users from installing potentially harmful Android applications

    Publication Year: 2017, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (779 KB) | HTML iconHTML

    Android inherited its core security from the Linux operating system where applications run with different unique system identities. Another level of security based on “permission” model is present in Android, for controlling the accessibility of resources and operations that a given process can execute. Applications with no explicit permission request should not be able to influence ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks

    Publication Year: 2017, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (984 KB) | HTML iconHTML

    In Vehicular networks, privacy, especially the vehicles' location privacy is highly concerned. Several pseudonymous based privacy protection mechanisms have been established and standardized in the past few years by IEEE and ETSI. However, vehicular networks are still vulnerable to Sybil attack. In this paper, a Sybil attack detection method based on k-Nearest Neighbours (kNN) classification algor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stronger authentication for password credential Internet Services

    Publication Year: 2017, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (91 KB) | HTML iconHTML

    Most Web and other on-line service providers (“Internet Services”) only support legacy ID (or email) and password (ID/PW) credential authentication. However, there are numerous vulnerabilities concerning ID/PW credentials. Scholars and the industry have proposed several improved security solutions, such as MFA, however most of the Internet Services have refused to adopt these solutio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating clustering algorithm DBSCAN to self select locations for power based malicious code detection on smartphones

    Publication Year: 2017, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    There is a growing number of viruses, malware, and other threats designed to gain access to system resources and information stored on smartphones. Previous work has shown that combining naive location identification with power-based malicious code detection can successfully detect certain kinds of power-hungry malware. This paper will discuss the effectiveness of using clustering, a more sophisti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NFC-based ubiquitous monitoring system for e-industry

    Publication Year: 2017, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    The use of new technologies such as the Internet of Things has become a necessity for support future e-industry. This technology opens up new perspectives in terms of proper functioning of the production and monitoring of personnel working in adverse environments where the slightest inadvertence can be fatal. Near Field Communication (NFC) has shown a practical relevance in various domains of IT a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.