default search action
7th NSS 2013: Madrid, Spain
- Javier López, Xinyi Huang, Ravi S. Sandhu:
Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lecture Notes in Computer Science 7873, Springer 2013, ISBN 978-3-642-38630-5
NSS 2013 Regular Papers
- Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro:
Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study. 1-13 - Fudong Li, Nathan L. Clarke, Steven Furnell:
A Technology Independent Security Gateway for Real-Time Multimedia Communication. 14-25 - Y. Sreenivasa Rao, Ratna Dutta:
Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network. 26-39 - Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. 40-53 - Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi:
Model the Influence of Sybil Nodes in P2P Botnets. 54-67 - Mahdi Aiash:
A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture. 68-79 - Kent Are Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang, Johann Vincent, Laurent Miralabé:
The OffPAD: Requirements and Usage. 80-93 - Sashi Gurung, Dan Lin, Anna Cinzia Squicciarini, Elisa Bertino:
Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. 94-108 - Christoph Krauß, Volker Fusenig:
Using Trusted Platform Modules for Location Assurance in Cloud Networking. 109-121 - Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James:
Tracing Sources of Anonymous Slow Suspicious Activities. 122-134 - James Kirrage, Asiri Rathnayake, Hayo Thielecke:
Static Analysis for Regular Expression Denial-of-Service Attacks. 135-148 - Gabriel Cartier, Jean-François Cartier, José M. Fernandez:
Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding. 149-163 - Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias:
Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning. 164-177 - Borja Sanz, Igor Santos, Javier Nieves, Carlos Laorden, Iñigo Alonso-Gonzalez, Pablo García Bringas:
MADS: Malicious Android Applications Detection through String Analysis. 178-191 - Sebastian Vogl, Fatih Kiliç, Christian A. Schneider, Claudia Eckert:
X-TIER: Kernel Module Injection. 192-205 - Jonas Pfoh, Christian A. Schneider, Claudia Eckert:
Leveraging String Kernels for Malware Detection. 206-219 - Miltiadis Kandias, Konstantina Galbogini, Lilian Mitrou, Dimitris Gritzalis:
Insiders Trapped in the Mirror Reveal Themselves in Social Media. 220-235 - George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis:
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework. 236-249 - Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
Using the Smart Card Web Server in Secure Branchless Banking. 250-263 - Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto:
Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach. 264-277 - Giovanni Di Crescenzo, Jim Burns, Brian A. Coan, John L. Schultz, Jonathan Robert Stanton, Simon Tsang, Rebecca N. Wright:
Efficient and Private Three-Party Publish/Subscribe. 278-292 - Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino:
Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks. 293-306 - Wei Feng, Yu Qin, Dengguo Feng, Ge Wei, Lihui Xue, Dexian Chang:
Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform. 307-320 - Suaad S. Alarifi, Stephen D. Wolthusen:
Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines. 321-335 - Benoît Bertholon, Sébastien Varrette, Pascal Bouvry:
JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms. 336-349 - Jiguo Li, Yanqiong Li, Yichen Zhang:
Forward Secure Certificateless Proxy Signature Scheme. 350-364 - Hongda Li, Qihua Niu, Bei Liang:
Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP. 365-380 - Yan Zhang, Dengguo Feng, Zhengfeng Zhang, Liwu Zhang:
On the Security of an Efficient Attribute-Based Signature. 381-392 - Yao Lu, Rui Zhang, Dongdai Lin:
Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method. 393-404 - Naoki Nishikawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Performance Prediction Model for Block Ciphers on GPU Architectures. 405-423 - Yang Wang, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Willy Susilo:
Threshold-Oriented Optimistic Fair Exchange. 424-438 - Zheli Liu, Haoyu Ma, Jin Li, Chunfu Jia, Jingwei Li, Ke Yuan:
Secure Storage and Fuzzy Query over Encrypted Databases. 439-450 - Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie:
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation. 451-464 - Mohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro P. Buchmann:
Privacy Preserving Context Aware Publish Subscribe Systems. 465-478 - Anjia Yang, Yunhui Zhuang, Duncan S. Wong, Guomin Yang:
A New Unpredictability-Based RFID Privacy Model. 479-492 - Florian Weingarten, Georg Neugebauer, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption. 493-506 - Weijia Wang, Lei Hu, Yong Li:
Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting. 507-520 - Jianwei Liu, Abdur Rashid Sangi, Ruiying Du, Qianhong Wu:
Light Weight Network Coding Based Key Distribution Scheme for MANETs. 521-534 - Chao Wang, Kefei Mao, Jianwei Liu, Jianhua Liu:
Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network. 535-548 - Shaohua Tang, Lingling Xu:
Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards. 549-562 - Elisavet Konstantinou:
An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks. 563-574
NSS 2013 Short Papers
- Xu Huang, Salahiddin Altahat, Dat Tran, Shutao Li:
Human Identification with Electroencephalogram (EEG) for the Future Network Security. 575-581 - Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Building Better Unsupervised Anomaly Detector with S-Transform. 582-589 - Jing Chen, Ruiying Du, Li Zhao, Chiheng Wang, Minghui Zheng, Yang Xiang:
Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs. 590-598 - Kannan Karthik:
Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens. 599-606 - James Alderman, Jason Crampton:
On the Use of Key Assignment Schemes in Authentication Protocols. 607-613 - Idalides J. Vergara-Laurens, Diego Mendez-Chaves, Miguel A. Labrador:
On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems. 614-620 - Ahmad Alomari:
Security Authentication of AODV Protocols in MANETs. 621-627 - Markus Gruber, Christian Schanes, Florian Fankhauser, Martin Moutran, Thomas Grechenig:
Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach. 628-634 - Qiang Tang:
Towards a Privacy-Preserving Solution for OSNs. 635-641 - Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng:
Measuring and Comparing the Protection Quality in Different Operating Systems. 642-648 - Julien Bringer, Hervé Chabanne, Alain Patey:
Collusion-Resistant Domain-Specific Pseudonymous Signatures. 649-655 - Raphael Spreitzer, Thomas Plos:
On the Applicability of Time-Driven Cache Attacks on Mobile Devices. 656-662 - Fan Zhang, Hua Guo, Zhoujun Li:
Ancestor Excludable Hierarchical ID-Based Encryption Revisited. 663-670 - Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng:
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks. 671-677 - Jia Hu, Hui Lin, Li Xu:
A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks. 678-684 - Jörg Daubert, Mathias Fischer, Stefan Schiffner, Max Mühlhäuser:
Distributed and Anonymous Publish-Subscribe. 685-691 - Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale:
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs. 692-698
NSS 2013 Industrial Track Papers
- Shun-Wen Hsiao, Yi-Ning Chen, Yeali S. Sun, Meng Chang Chen:
Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments. 699-706 - Jorge de-la-Peña-Sordo, Igor Santos, Iker Pastor-López, Pablo García Bringas:
Filtering Trolling Comments through Collective Classification. 707-713 - Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto:
Security Analysis of Touch Inputted Passwords - A Preliminary Study Based on the Resistance against Brute Force Attacks. 714-720 - Dheerendra Mishra, Vinod Kumar, Sourav Mukhopadhyay:
A Pairing-Free Identity Based Authentication Framework for Cloud Computing. 721-727 - Alessandro Armando, Roberto Carbone, Luca Zanetti:
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols. 728-734 - Jason Cohen, Subatra Acharya:
Towards a More Secure Apache Hadoop HDFS Infrastructure - Anatomy of a Targeted Advanced Persistent Threat against HDFS and Analysis of Trusted Computing Based Countermeasures. 735-741 - Mahdi Aiash:
A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR. 742-748 - Muhammad I. Sarfraz, Peter Baker, Jia Xu, Elisa Bertino:
A Comprehensive Access Control System for Scientific Applications. 749-755 - Wei Zhou, Jiankun Hu, Ian R. Petersen, Mohammed Bennamoun:
Partial Fingerprint Reconstruction with Improved Smooth Extension. 756-762 - Sheng Wen, Yang Xiang, Wanlei Zhou:
Modeling and Analysis for Thwarting Worm Propagation in Email Networks. 763-769 - Sana Ullah, Waleed Alsalih:
On Secure and Power-Efficient RFID-Based Wireless Body Area Network. 770-776 - Daniele Midi, Ashish Kundu, Elisa Bertino:
Towards Authenticated Objects. 777-783 - Wencheng Yang, Jiankun Hu, Song Wang:
A Finger-Vein Based Cancellable Bio-cryptosystem. 784-790
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.