default search action
6th NSS 2012: Wuyishan, Fujian, China
- Li Xu, Elisa Bertino, Yi Mu:
Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7645, Springer 2012, ISBN 978-3-642-34600-2
Network Security I
- Yuxin Meng, Lam-for Kwok:
Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection. 1-14 - Silvio Ranise, Alessandro Armando:
On the Automated Analysis of Safety in Usage Control: A New Decidability Result. 15-28 - Steffen Wagner, Sascha Wessel, Frederic Stumpf:
Attestation of Mobile Baseband Stacks. 29-43 - Tae-Gyu Lee, Gi-Soo Chung:
A Scalable Link Model for Local Optical Wireless Networks. 44-57 - Cristina Alcaraz, Javier López:
Addressing Situational Awareness in Critical Domains of a Smart Grid. 58-71 - Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy:
Identifying OS Kernel Objects for Run-Time Security Analysis. 72-85 - Tae-Gyu Lee, Gi-Soo Chung:
Background Transfer Method for Ubiquitous Computing. 86-99
Public Key Cryptography I
- Shengli Liu, Fangguo Zhang, Kefei Chen:
Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption. 100-112 - Shaohua Tang, Lingling Xu:
Proxy Signature Scheme Based on Isomorphisms of Polynomials. 113-125 - Fei Tang, Changlu Lin, Pinhui Ke:
Universal Designated Verifier Signcryption. 126-134
Privacy I
- Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:
A Bird's Eye View on the I2P Anonymous File-Sharing Environment. 135-148 - Samaneh Mahdavifar, Mahdi Abadi, Mohsen Kahani, Hassan Mahdikhani:
A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data. 149-165 - Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou:
Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity. 166-179
Authentication I
- Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, Jiaxiang Quan:
Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks. 180-191 - Yifan Zhao, Swee-Won Lo, Robert H. Deng, Xuhua Ding:
An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks. 192-205 - Kaiqi Xiong:
The Performance of Public Key-Based Authentication Protocols. 206-219
Network Security II
- Long-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu:
Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net. 220-232 - Yue Yu, Michael Fry, Bernhard Plattner, Paul Smith, Alberto E. Schaeffer Filho:
Resilience Strategies for Networked Malware Detection and Remediation. 233-247 - Eitan Menahem, Rami Puzis, Yuval Elovici:
Detecting Spammers via Aggregated Historical Data Set. 248-262
System Security II
- Amani S. Ibrahim, John Grundy, James H. Hamlyn-Harris, Mohamed Almorsy:
Operating System Kernel Data Disambiguation to Support Security Analysis. 263-276 - Kristian Beilke, Volker Roth:
FlexCOS: An Open Smartcard Platform for Research and Education. 277-290 - Willy Susilo, Yang-Wai Chow, Rungrat Wiangsripanawan:
Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games. 291-304 - Lukasz Krzywiecki, Miroslaw Kutylowski:
Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. 305-319
Public Key Cryptography II
- Wenjie Yang, Futai Zhang, Limin Shen:
Practical Certificateless Public Key Encryption in the Standard Model. 320-333 - Yunmei Zhang, Man Ho Au, Guomin Yang, Willy Susilo:
(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack. 334-347 - Leyou Zhang, Qing Wu, Yupu Hu:
Direct CCA Secure Identity-Based Broadcast Encryption. 348-360 - Yang Yang:
A Communication Efficient Group Key Distribution Scheme for MANETs. 361-372
Security Analysis
- Mu-En Wu, Raylin Tso, Hung-Min Sun:
Cryptanalysis of Exhaustive Search on Attacking RSA. 373-379 - Mu-En Wu, Raylin Tso, Hung-Min Sun:
On the Improvement of Fermat Factorization. 380-391 - Yuechuan Wei, Xiaoyuan Yang, Chao Li, Weidong Du:
Impossible Differential Cryptanalysis on Tweaked E2. 392-404 - Jing Guo, Zhuxiao Wang:
Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems with Channel Errors. 405-416
Privacy II
- Xilin Zhang, Yingjie Wu, Xiaodong Wang:
Differential Privacy Data Release through Adding Noise on Average Value. 417-429 - Roman Schlegel, Duncan S. Wong:
Private Friends on a Social Networking Site Operated by an Overly Curious SNP. 430-444 - Sushama Karumanchi, Anna Cinzia Squicciarini, Dan Lin:
Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks. 445-461
Authentication II
- Ding Wang, Chunguang Ma, De-li Gu, Zhen-shan Cui:
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture. 462-475 - Mohammad Saiful Islam Mamun, Atsuko Miyaji, Mohammad Shahriar Rahman:
A Secure and Private RFID Authentication Protocol under SLPN Problem. 476-489
Access Control
- Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia, Zheli Liu:
Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud. 490-502 - Huimin Shuai, Wen Tao Zhu:
Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks. 503-515 - Nima Mousavi, Mahesh V. Tripunitara:
Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC). 516-529
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.