


default search action
6th NSS 2012: Wuyishan, Fujian, China
- Li Xu, Elisa Bertino, Yi Mu:

Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7645, Springer 2012, ISBN 978-3-642-34600-2
Network Security I
- Yuxin Meng

, Lam-for Kwok
:
Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection. 1-14 - Silvio Ranise

, Alessandro Armando
:
On the Automated Analysis of Safety in Usage Control: A New Decidability Result. 15-28 - Steffen Wagner, Sascha Wessel, Frederic Stumpf:

Attestation of Mobile Baseband Stacks. 29-43 - Tae-Gyu Lee, Gi-Soo Chung:

A Scalable Link Model for Local Optical Wireless Networks. 44-57 - Cristina Alcaraz

, Javier López
:
Addressing Situational Awareness in Critical Domains of a Smart Grid. 58-71 - Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy

, Mohamed Almorsy:
Identifying OS Kernel Objects for Run-Time Security Analysis. 72-85 - Tae-Gyu Lee, Gi-Soo Chung:

Background Transfer Method for Ubiquitous Computing. 86-99
Public Key Cryptography I
- Shengli Liu, Fangguo Zhang

, Kefei Chen:
Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption. 100-112 - Shaohua Tang, Lingling Xu:

Proxy Signature Scheme Based on Isomorphisms of Polynomials. 113-125 - Fei Tang, Changlu Lin, Pinhui Ke:

Universal Designated Verifier Signcryption. 126-134
Privacy I
- Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:

A Bird's Eye View on the I2P Anonymous File-Sharing Environment. 135-148 - Samaneh Mahdavifar, Mahdi Abadi

, Mohsen Kahani
, Hassan Mahdikhani:
A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data. 149-165 - Alif Wahid, Christopher Leckie

, Chenfeng Vincent Zhou:
Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity. 166-179
Authentication I
- Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, Jiaxiang Quan:

Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks. 180-191 - Yifan Zhao, Swee-Won Lo, Robert H. Deng

, Xuhua Ding
:
An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks. 192-205 - Kaiqi Xiong:

The Performance of Public Key-Based Authentication Protocols. 206-219
Network Security II
- Long-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu:

Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net. 220-232 - Yue Yu, Michael Fry, Bernhard Plattner, Paul Smith

, Alberto E. Schaeffer Filho
:
Resilience Strategies for Networked Malware Detection and Remediation. 233-247 - Eitan Menahem, Rami Puzis, Yuval Elovici:

Detecting Spammers via Aggregated Historical Data Set. 248-262
System Security II
- Amani S. Ibrahim, John Grundy

, James H. Hamlyn-Harris, Mohamed Almorsy:
Operating System Kernel Data Disambiguation to Support Security Analysis. 263-276 - Kristian Beilke, Volker Roth:

FlexCOS: An Open Smartcard Platform for Research and Education. 277-290 - Willy Susilo

, Yang-Wai Chow
, Rungrat Wiangsripanawan:
Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games. 291-304 - Lukasz Krzywiecki

, Miroslaw Kutylowski:
Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. 305-319
Public Key Cryptography II
- Wenjie Yang

, Futai Zhang, Limin Shen:
Practical Certificateless Public Key Encryption in the Standard Model. 320-333 - Yunmei Zhang, Man Ho Au

, Guomin Yang
, Willy Susilo
:
(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack. 334-347 - Leyou Zhang, Qing Wu, Yupu Hu:

Direct CCA Secure Identity-Based Broadcast Encryption. 348-360 - Yang Yang:

A Communication Efficient Group Key Distribution Scheme for MANETs. 361-372
Security Analysis
- Mu-En Wu, Raylin Tso

, Hung-Min Sun:
Cryptanalysis of Exhaustive Search on Attacking RSA. 373-379 - Mu-En Wu, Raylin Tso

, Hung-Min Sun:
On the Improvement of Fermat Factorization. 380-391 - Yuechuan Wei, Xiaoyuan Yang, Chao Li, Weidong Du:

Impossible Differential Cryptanalysis on Tweaked E2. 392-404 - Jing Guo, Zhuxiao Wang:

Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems with Channel Errors. 405-416
Privacy II
- Xilin Zhang, Yingjie Wu, Xiaodong Wang:

Differential Privacy Data Release through Adding Noise on Average Value. 417-429 - Roman Schlegel, Duncan S. Wong:

Private Friends on a Social Networking Site Operated by an Overly Curious SNP. 430-444 - Sushama Karumanchi, Anna Cinzia Squicciarini

, Dan Lin:
Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks. 445-461
Authentication II
- Ding Wang

, Chunguang Ma, De-li Gu, Zhen-shan Cui:
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture. 462-475 - Mohammad Saiful Islam Mamun, Atsuko Miyaji

, Mohammad Shahriar Rahman
:
A Secure and Private RFID Authentication Protocol under SLPN Problem. 476-489
Access Control
- Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia, Zheli Liu:

Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud. 490-502 - Huimin Shuai, Wen Tao Zhu:

Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks. 503-515 - Nima Mousavi, Mahesh V. Tripunitara:

Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC). 516-529

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














