Skip to main content
  • Conference proceedings
  • © 2017

Trusted Computing and Information Security

11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

Editors:

Conference proceedings info: CTCIS 2017.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

    Pages I-XIII
  2. Homology Analysis Method of Worms Based on Attack and Propagation Features

    • Liyan Wang, Jingfeng Xue, Yan Cui, Yong Wang, Chun Shan
    Pages 1-15
  3. A Trusted VM Live Migration Protocol in IaaS

    • Xinfeng He, Junfeng Tian
    Pages 41-52
  4. Double-Layered Predictor for High-Fidelity Reversible Data Hiding

    • Fuqiang Di, Junyi Duan, Jia Liu, Guangwei Su, Yingnan Zhang
    Pages 53-65
  5. A New FPGA PUF Based on Transition Probability Delay Measurement

    • Zhenyu Guan, Yuyao Qin, Junming Liu
    Pages 66-75
  6. Real-Time Trusted Computing Technology for Xenomai

    • Mingdi Xu, Xueyuan Gao, Yang Gao, Fan Zhang
    Pages 87-96
  7. Cryptanalysis of Rijndael-192/224 in Single Key Setting

    • Jingyi Cui, Jiansheng Guo, Yipeng Liu
    Pages 97-111
  8. Exception Detection of Data Stream Based on Improved Maximal Frequent Itemsets Mining

    • Saihua Cai, Ruizhi Sun, Chunming Cheng, Gang Wu
    Pages 112-125
  9. The Analysis of Malicious Group Based on Suspicious Communication Behavior Aggregation

    • Guolin Shao, Xingshu Chen, Xuemei Zeng, Xueyuan Yin, Xiaoming Ye, Yonggang Luo
    Pages 143-164
  10. Analysis of Vulnerability Correlation Based on Data Fitting

    • Long Wang, Rui Ma, HaoRan Gao, XiaJing Wang, ChangZhen Hu
    Pages 165-180
  11. Tracking the Mobile Jammer in Wireless Sensor Network by Using Meanshift Based Method

    • Liang Pang, Pengze Guo, Zhi Xue, Xiao Chen
    Pages 181-197
  12. New Upper Bounds on Degrees of Freedom for G-MIMO Relay Channel

    • Xiao Chen, Liang Pang, Pengze Guo, Xingping Sun, Zhi Xue
    Pages 198-212
  13. Formalizing and Verifying GP TEE TA Interface Specification Using Coq

    • Xia Yang, Zheng Yang, Haiyong Sun, Jingyu Liu
    Pages 213-226
  14. Research on Malicious Code Analysis Method Based on Semi-supervised Learning

    • Tingting He, Jingfeng Xue, Jianwen Fu, Yong Wang, Chun Shan
    Pages 227-241
  15. Reliable Topology Control Algorithm in Cognitive Radio Networks

    • Yali Zeng, Li Xu, Xiaoding Wang, Xu Yang
    Pages 242-254
  16. Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud

    • Guangzhi Zhang, Shaobin Cai, Chunhua Ma, Dongqiu Zhang
    Pages 255-274

Other Volumes

  1. Trusted Computing and Information Security

About this book

This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017.

The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.

Editors and Affiliations

  • National University of Defense Technology, Changsha, China

    Ming Xu, Shaojing Fu

  • Hunan University, Changsha, China

    Zheng Qin

  • Wuhan University, Wuhan, China

    Fei Yan

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access