


default search action
CSS 2012: Melbourne, Australia
- Yang Xiang, Javier López, C.-C. Jay Kuo, Wanlei Zhou:

Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings. Lecture Notes in Computer Science 7672, Springer 2012, ISBN 978-3-642-35361-1 [contents]
CSS 2012 Regular Papers
- Fengling Han

, Ron G. van Schyndel:
M-Identity and Its Authentication Protocol for Secure Mobile Commerce Applications. 1-10 - Avinash Srinivasan, Jie Wu:

SafeCode - Safeguarding Security and Privacy of User Data on Stolen iOS Devices. 11-20 - Alexandre Melo Braga, Rafael Cividanes, Ismael M. A. Ávila, Cláudia de Andrade Tambascia:

Protection Aspects of Iconic Passwords on Mobile Devices. 21-32 - Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:

Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses. 33-47 - Jemal H. Abawajy, Andrei V. Kelarev:

A Multi-tier Ensemble Construction of Classifiers for Phishing Email Detection and Filtering. 48-56 - Yong Feng

, Bo Wang
, Fengling Han
, Xinghuo Yu
, Zahir Tari:
Chattering-Free Terminal Sliding-Mode Observer for Anomaly Detection. 57-65 - Paul A. Watters

, Nigel Phair:
Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA). 66-76 - Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:

Improving Content Availability in the I2P Anonymous File-Sharing Environment. 77-92 - Mark Stegelmann, Dogan Kesdogan:

V2GPriv: Vehicle-to-Grid Privacy in the Smart Grid. 93-107 - Daniel Angermeier, Konstantin Böttinger, Andreas Ibing, Dieter Schuster, Frederic Stumpf, Dirk Wacker:

A Secure Architecture for Smart Meter Systems. 108-122 - Geng Yang, Qiang Zhou, Xiaolong Xu, Jian Xu, Chunming Rong

:
A Novel Identity-Based Key Management and Encryption Scheme for Distributed System. 123-138 - Ferdous A. Barbhuiya, Tonmoy Saikia, Sukumar Nandi

:
An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics. 139-152 - Avinash Srinivasan, Lashidhar Chennupati:

Robust Authentication of Public Access Points Using Digital Certificates - A Novel Approach. 153-164 - Fei Han, Jing Qin

, Huawei Zhao, Jiankun Hu
:
A General Transformation from KP-ABE to Searchable Encryption. 165-178 - Luca Ferretti

, Michele Colajanni
, Mirco Marchetti
:
Supporting Security and Consistency for Cloud Database. 179-193 - Ronald Petrlic:

Proxy Re-encryption in a Privacy-Preserving Cloud Computing DRM Scheme. 194-211 - Satoru Akimoto, Yoshiaki Hori, Kouichi Sakurai:

Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic. 212-226 - Craig Valli

:
SSH - Somewhat Secure Host. 227-235 - Nimalaprakasan Skandhakumar

, Farzad Salim, Jason Reid, Ed Dawson
:
Physical Access Control Administration Using Building Information Models. 236-250 - Yongming Yang, Zulong Zhang, Fengling Han

, Kunming Lin:
Multiple Factors Based Evaluation of Fingerprint Images Quality. 251-264 - Yang Liu, Hongda Li, Qihua Niu:

A Leakage-Resilient Zero Knowledge Proof for Lattice Problem. 265-278 - Mohamed Almorsy, John Grundy

, Amani S. Ibrahim:
MDSE@R: Model-Driven Security Engineering at Runtime. 279-295 - Huawei Zhao, Jing Qin

, Minglei Shu, Jiankun Hu
:
A Hash Chains Based Key Management Scheme for Wireless Sensor Networks. 296-308 - Anderson Nunes Paiva Morais, Ana R. Cavalli

:
An Event-Based Packet Dropping Detection Scheme for Wireless Mesh Networks. 309-323 - Kaleb Lee, Juan Manuel González Nieto, Colin Boyd:

A State-Aware RFID Privacy Model with Reader Corruption. 324-338 - Leyi Shi, Xiaorui Wang, Wenjing Fu, Xin Liu, Zhen Qin:

An Improved Anti-collision Algorithm for ISO15693 RFID Systems. 339-351 - Xin-Wen Wu

, Alan Wee-Chung Liew
:
Near-Optimal Collusion-Secure Fingerprinting Codes for Efficiently Tracing Illegal Re-distribution. 352-361 - Jiguo Li, Yichen Zhang, Huiyun Teng:

A Forward-Secure Certificate-Based Signature Scheme in the Standard Model. 362-376 - Jan Muhammad

, Thomas Doherty, Sardar Hussain, Richard O. Sinnott
:
Policy-Based Vulnerability Assessment for Virtual Organisations. 377-399 - Atsuko Miyaji

, Phuong V. X. Tran:
Constant-Ciphertext-Size Dual Policy Attribute Based Encryption. 400-413 - Max-Emanuel Maurer, Lukas Höfer:

Sophisticated Phishers Make More Spelling Mistakes: Using URL Similarity against Phishing. 414-426 - Younchan Jung

, Enrique Festijo:
Secure Mobility Management Based on Session Key Agreements. 427-440 - Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari

, Joaquim Celestino Júnior:
Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing. 441-458 - Alexandre Melo Braga, Erick N. Nascimento:

Portability Evaluation of Cryptographic Libraries on Android Smartphones. 459-469 - Eduardo B. Fernández, Anton V. Uzunov:

Secure Middleware Patterns. 470-482 - Yuxin Meng

, Lam-for Kwok
:
Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction. 483-497 - Michael N. Johnstone, Andrew Woodward:

Towards Effective Algorithms for Intelligent Defense Systems. 498-508

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














