Skip to main content
  • Conference proceedings
  • © 2014

Trustworthy Computing and Services

International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Conference proceedings info: ISCTCS 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (49 papers)

  1. Front Matter

    Pages I-XIV
  2. Security Memory System for Mobile Device or Computer Against Memory Attacks

    • Genxian Liu, Xi Zhang, Dongsheng Wang, Zhenyu Liu, Haixia Wang
    Pages 1-8
  3. Research on Technologies of Software Requirements Prioritization

    • Zhixiang Tong, Qiankun Zhuang, Qi Guo, Peijun Ma
    Pages 9-21
  4. MD5 Calculation and Decryption Using CUDA on GPU

    • Yanjun Jiang, Mingshan Lei
    Pages 22-28
  5. Imbalanced Chinese Text Classification Based on Weighted Sampling

    • Hu Li, Peng Zou, WeiHong Han, Rongze Xia
    Pages 38-45
  6. Hijacking Activity Technology Analysis and Research in Android System

    • Yunlong Ren, Yue Li, Fangfang Yuan, Fangjiao Zhang
    Pages 46-53
  7. A Mobile Botnet Model Based on Android System

    • Peng Wang, Chengwei Zhang, Xuanya Li, Can Zhang
    Pages 54-61
  8. An Improved Common Vulnerability Scoring System Based on K-means

    • Pingping Liu, Zhihong Tian, Xu Wu, Wei Liu
    Pages 62-69
  9. A Design of Linkage Security Defense System Based on Honeypot

    • Gangfu Feng, Chen Zhang, Quan Zhang
    Pages 70-77
  10. A Modified Single-Channel Blind Separation Method Using EMD and ICA

    • Jiao Wang, Yulin Liu, Zhichao Chao, Wei He
    Pages 78-85
  11. Flexible Mechanism Research of Workflow System Based on SOA

    • Shaopeng Wang, Yuan Zhang, Yan Peng
    Pages 86-92
  12. Effective Rate Control Algorithm for H.264 Based on Scene Change Detection

    • Yaoyao Guo, Songlin Sun, Xiaojun Jing, Hai Huang, Yueming Lu, Na Chen
    Pages 93-99
  13. Another Improvement of LMAP++: An RFID Authentication Protocol

    • Anqi Huang, Chen Zhang, Chaojing Tang
    Pages 100-106
  14. A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching

    • Chen Chen, Qingyun Liu, Hongzhou Sha, Zhou Zhou, Chao Zheng
    Pages 107-114
  15. An Anomaly Detection Model Based on Cloud Model and Danger Theory

    • Wenhao Wang, Chen Zhang, Quan Zhang
    Pages 115-122
  16. Generation and Distribution of Decoy Document System

    • Lei Wang, Chenglong Li, QingFeng Tan, XueBin Wang
    Pages 123-129
  17. Detecting the DGA-Based Malicious Domain Names

    • Ying Zhang, Yongzheng Zhang, Jun Xiao
    Pages 130-137
  18. Microblog Sentiment Classification Based on Supervised and Unsupervised Combination

    • Shaojie Pei, Lumin Zhang, Aiping Li, Yusha Liu
    Pages 138-145
  19. A Prefetching Mechanism Based on MooseFS

    • Xiaohong Shi, Ying Ji, Hui Xie, Yueming Lu
    Pages 146-153

Other Volumes

  1. Trustworthy Computing and Services

About this book

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2013, held in Beijing, China, in November 2013. The 49 revised full papers presented were carefully reviewed and selected from 267 papers. The topics covered are trustworthy infrastructure; security, survivability and fault tolerance; standards, evaluation and certification; trustworthiness of services.

Editors and Affiliations

  • Beijing University of Posts and Telecommunications, Beijing, China

    Yuyu Yuan, Xu Wu, Yueming Lu

Bibliographic Information

  • Book Title: Trustworthy Computing and Services

  • Book Subtitle: International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers

  • Editors: Yuyu Yuan, Xu Wu, Yueming Lu

  • Series Title: Communications in Computer and Information Science

  • DOI: https://doi.org/10.1007/978-3-662-43908-1

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2014

  • Softcover ISBN: 978-3-662-43907-4Published: 14 July 2014

  • eBook ISBN: 978-3-662-43908-1Published: 26 June 2014

  • Series ISSN: 1865-0929

  • Series E-ISSN: 1865-0937

  • Edition Number: 1

  • Number of Pages: XIV, 408

  • Number of Illustrations: 205 b/w illustrations

  • Topics: Systems and Data Security

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access