This event is endorsed
and organized by

The First EAI International Conference on Security and Privacy in New Computing Environments

December 15–16, 2016 | Guangzhou, People's Republic of China

Adaptive Reversible Data Hiding for JPEG Images

Zhang, Hao (Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230601, P.R. China); Yin, Zhaoxia (Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230601, P.R. China); Zhang, Xinpeng (School of Communication and Information Engineering, Shanghai University, Shanghai 200072, P.R. China); Chen, Jianpeng (Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230601, P.R. China); Wang, Ruonan (Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230601, P.R. China); Chen, Xianyi (School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, China); Luo, Bin (Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230601, P.R. China)

A Survey Study on Mobile Phone Usage and Security Concerns of Young Generation

Zhang, Sonya ; Costa, Saree (Cal Poly Pomona)

Analysis of network audit in the environment of electronic commerce

hu, yan-ling

Delay-tolerant Network Based Secure Transmission System Design

Ming, Gang (School of information Science and Engineering, University of Jinan); Chen, Zhenxiang (Shandong Provincial Key Laboratory of Network Based Intelligent Computing)

An Internal Waves Detection Method Based on PCANet for Images Captured from UAV

Wang, Shengke (Ocean University of China); Dong, Qinghong (Ocean University of China); Dong, Junyu (Ocean University of China)

A Revocable Outsourcing Attribute-based Encryption Scheme

Jiang, Zoe L. (Harbin Institute of Technology Shenzhen Graduate School); Zhang, Ruoqing (The University of Hong Kong); Liu, Zechao (Harbin Institute of Technology Shenzhen Graduate School); Yiu, SM (The University of Hong Kong); Hui, Lucas (The University of Hong Kong); Fang, Junbin (Jinan University); Wang, Xuan (Harbin Institute of Technology Shenzhen Graduate School)

Generalized Format-preserving Encryption for Character Data

Guo, Jia (Nankai University); Liu, Zheli (Nankai University)

Efficiency Improved Format-Preserving Encryption Method for Integer

Guo, Jia (Nankai University); Liu, Zheli (Nankai University)

Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System

Li, Zhen (Shandong University); Zhao, Minghao (Shandong University); Xu, Qiuliang (Shandong University)

Operational-behavior Auditing in Cloud Storage

Chen, Zhaoyi (National Huaqiao University); Tian, Hui (National Huaqiao University); Lu, Jing (National Huaqiao University); Cai, Yiqiao (National Huaqiao University); Wang, Tian (National Huaqiao University); Chen, Yonghong (National Huaqiao University)

Face Recognition based on the Fusion of Wavelet Packet Sub-images and Fisher Linear Discriminant

Tang, Wenjing (College of Information and Electrical Engineering, Ludong University); Gong, Fei (Faculty of Electrical Engineering and Computer Science, Ningbo University); Dong, Renren (College of Information and Electrical Engineering, Ludong University); Wang, Yilei (College of Information and Electrical Engineering, Ludong University); Sun, Yujuan (College of Information and Electrical Engineering, Ludong University)

One Algorithm for Image Segmentation Based on Improved Pixel Relevance and Non-local Information

Song, Lihua (Ludong Unviersity); Sun, Yujuan (Ludong Unviersity); Zhang, xiaofeng (Ludong University)

Ring Signature Scheme from Multilinear Maps in The Standard Model

Han, Hongzhang (Department of Computer Engineering, Jiangsu University of Technology)

ID-based Multi-Recipient Public Key Encryption Scheme in the Standard Model

Jing, Zheng Jun (Department of Computer Engineering, Jiangsu University of Technology); Li, Jin (Department of Computer, Guangzhou University); Gu, Chunsheng (Department of Computer Engineering, Jiangsu University of Technology); Qian, Jin (Department of Computer Science, City University of Hong Kong); Wu, Fangsheng (Department of Computer Engineering, Jiangsu University of Technology)

Verifiable public key encryption with keyword search secure against continual memory attacks

Hu, Chengyu (School of Computer Science and Technology, Shandong University); Liu, Pengtao (Shandong University of Political Science and Law); Yang, Rupeng (School of Computer Science and Technology, Shandong University); Guo, Shanqing (School of Computer Science and Technology, Shandong University)

Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud

Chen, Lanxiang (School of Mathematics and Computer Science, Fujian Normal University); Zhang, Nan (School of Mathematics and Computer Science, Fujian Normal University)

Secure Searchable Public-Key Encryption for Cloud Storage

run, xie (School of Computer Science and Engineering , University of Electronic Science and Technology of China); Chunxiang, Xu (School of Computer Science and Engineering , University of Electronic Science and Technology of China); Fagen, Li (School of Computer Science and Engineering , University of Electronic Science and Technology of China); Changlian, He (School of Computer and Information Engineering, Yibin University, Yibin, China)

Contactless Multiple Palm Features Extraction Method

wei, li ; qi, Yuanwei (Computer Vision Group, Shenyang University of Technology, Shenyang 110870, China)

A Semantic Orientation Distinction Method for Opinion Mining in Tibetan Language

wangyi, lei

Kernel Bilinear Discriminant Analysis for Face Recognition

Liu, Xiaozhang

Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks

Shi, Run-hua (School of Computer Science and Technology, Anhui University); Zhang, Shun(School of Computer Science and Technology, Anhui University)